2025-11-26 12:17:37,120 p=31228 u=zuul n=ansible | Starting galaxy collection install process 2025-11-26 12:17:37,120 p=31228 u=zuul n=ansible | Process install dependency map 2025-11-26 12:17:51,465 p=31228 u=zuul n=ansible | Starting collection install process 2025-11-26 12:17:51,466 p=31228 u=zuul n=ansible | Installing 'cifmw.general:1.0.0+54687150' to '/home/zuul/.ansible/collections/ansible_collections/cifmw/general' 2025-11-26 12:17:51,903 p=31228 u=zuul n=ansible | Created collection for cifmw.general:1.0.0+54687150 at /home/zuul/.ansible/collections/ansible_collections/cifmw/general 2025-11-26 12:17:51,903 p=31228 u=zuul n=ansible | cifmw.general:1.0.0+54687150 was installed successfully 2025-11-26 12:17:51,903 p=31228 u=zuul n=ansible | Installing 'containers.podman:1.16.2' to '/home/zuul/.ansible/collections/ansible_collections/containers/podman' 2025-11-26 12:17:51,952 p=31228 u=zuul n=ansible | Created collection for containers.podman:1.16.2 at /home/zuul/.ansible/collections/ansible_collections/containers/podman 2025-11-26 12:17:51,952 p=31228 u=zuul n=ansible | containers.podman:1.16.2 was installed successfully 2025-11-26 12:17:51,952 p=31228 u=zuul n=ansible | Installing 'community.general:10.0.1' to '/home/zuul/.ansible/collections/ansible_collections/community/general' 2025-11-26 12:17:52,601 p=31228 u=zuul n=ansible | Created collection for community.general:10.0.1 at /home/zuul/.ansible/collections/ansible_collections/community/general 2025-11-26 12:17:52,602 p=31228 u=zuul n=ansible | community.general:10.0.1 was installed successfully 2025-11-26 12:17:52,602 p=31228 u=zuul n=ansible | Installing 'ansible.posix:1.6.2' to '/home/zuul/.ansible/collections/ansible_collections/ansible/posix' 2025-11-26 12:17:52,646 p=31228 u=zuul n=ansible | Created collection for ansible.posix:1.6.2 at /home/zuul/.ansible/collections/ansible_collections/ansible/posix 2025-11-26 12:17:52,646 p=31228 u=zuul n=ansible | ansible.posix:1.6.2 was installed successfully 2025-11-26 12:17:52,646 p=31228 u=zuul n=ansible | Installing 'ansible.utils:5.1.2' to '/home/zuul/.ansible/collections/ansible_collections/ansible/utils' 2025-11-26 12:17:52,733 p=31228 u=zuul n=ansible | Created collection for ansible.utils:5.1.2 at /home/zuul/.ansible/collections/ansible_collections/ansible/utils 2025-11-26 12:17:52,733 p=31228 u=zuul n=ansible | ansible.utils:5.1.2 was installed successfully 2025-11-26 12:17:52,733 p=31228 u=zuul n=ansible | Installing 'community.libvirt:1.3.0' to '/home/zuul/.ansible/collections/ansible_collections/community/libvirt' 2025-11-26 12:17:52,754 p=31228 u=zuul n=ansible | Created collection for community.libvirt:1.3.0 at /home/zuul/.ansible/collections/ansible_collections/community/libvirt 2025-11-26 12:17:52,754 p=31228 u=zuul n=ansible | community.libvirt:1.3.0 was installed successfully 2025-11-26 12:17:52,754 p=31228 u=zuul n=ansible | Installing 'community.crypto:2.22.3' to '/home/zuul/.ansible/collections/ansible_collections/community/crypto' 2025-11-26 12:17:52,880 p=31228 u=zuul n=ansible | Created collection for community.crypto:2.22.3 at /home/zuul/.ansible/collections/ansible_collections/community/crypto 2025-11-26 12:17:52,880 p=31228 u=zuul n=ansible | community.crypto:2.22.3 was installed successfully 2025-11-26 12:17:52,880 p=31228 u=zuul n=ansible | Installing 'kubernetes.core:5.0.0' to '/home/zuul/.ansible/collections/ansible_collections/kubernetes/core' 2025-11-26 12:17:52,985 p=31228 u=zuul n=ansible | Created collection for kubernetes.core:5.0.0 at /home/zuul/.ansible/collections/ansible_collections/kubernetes/core 2025-11-26 12:17:52,985 p=31228 u=zuul n=ansible | kubernetes.core:5.0.0 was installed successfully 2025-11-26 12:17:52,985 p=31228 u=zuul n=ansible | Installing 'ansible.netcommon:7.1.0' to '/home/zuul/.ansible/collections/ansible_collections/ansible/netcommon' 2025-11-26 12:17:53,045 p=31228 u=zuul n=ansible | Created collection for ansible.netcommon:7.1.0 at /home/zuul/.ansible/collections/ansible_collections/ansible/netcommon 2025-11-26 12:17:53,045 p=31228 u=zuul n=ansible | ansible.netcommon:7.1.0 was installed successfully 2025-11-26 12:17:53,046 p=31228 u=zuul n=ansible | Installing 'openstack.config_template:2.1.1' to '/home/zuul/.ansible/collections/ansible_collections/openstack/config_template' 2025-11-26 12:17:53,061 p=31228 u=zuul n=ansible | Created collection for openstack.config_template:2.1.1 at /home/zuul/.ansible/collections/ansible_collections/openstack/config_template 2025-11-26 12:17:53,061 p=31228 u=zuul n=ansible | openstack.config_template:2.1.1 was installed successfully 2025-11-26 12:17:53,061 p=31228 u=zuul n=ansible | Installing 'junipernetworks.junos:9.1.0' to '/home/zuul/.ansible/collections/ansible_collections/junipernetworks/junos' 2025-11-26 12:17:53,265 p=31228 u=zuul n=ansible | Created collection for junipernetworks.junos:9.1.0 at /home/zuul/.ansible/collections/ansible_collections/junipernetworks/junos 2025-11-26 12:17:53,265 p=31228 u=zuul n=ansible | junipernetworks.junos:9.1.0 was installed successfully 2025-11-26 12:17:53,265 p=31228 u=zuul n=ansible | Installing 'cisco.ios:9.0.3' to '/home/zuul/.ansible/collections/ansible_collections/cisco/ios' 2025-11-26 12:17:53,490 p=31228 u=zuul n=ansible | Created collection for cisco.ios:9.0.3 at /home/zuul/.ansible/collections/ansible_collections/cisco/ios 2025-11-26 12:17:53,490 p=31228 u=zuul n=ansible | cisco.ios:9.0.3 was installed successfully 2025-11-26 12:17:53,490 p=31228 u=zuul n=ansible | Installing 'mellanox.onyx:1.0.0' to '/home/zuul/.ansible/collections/ansible_collections/mellanox/onyx' 2025-11-26 12:17:53,520 p=31228 u=zuul n=ansible | Created collection for mellanox.onyx:1.0.0 at /home/zuul/.ansible/collections/ansible_collections/mellanox/onyx 2025-11-26 12:17:53,520 p=31228 u=zuul n=ansible | mellanox.onyx:1.0.0 was installed successfully 2025-11-26 12:17:53,520 p=31228 u=zuul n=ansible | Installing 'community.okd:4.0.0' to '/home/zuul/.ansible/collections/ansible_collections/community/okd' 2025-11-26 12:17:53,546 p=31228 u=zuul n=ansible | Created collection for community.okd:4.0.0 at /home/zuul/.ansible/collections/ansible_collections/community/okd 2025-11-26 12:17:53,546 p=31228 u=zuul n=ansible | community.okd:4.0.0 was installed successfully 2025-11-26 12:17:53,546 p=31228 u=zuul n=ansible | Installing '@NAMESPACE@.@NAME@:3.1.4' to '/home/zuul/.ansible/collections/ansible_collections/@NAMESPACE@/@NAME@' 2025-11-26 12:17:53,629 p=31228 u=zuul n=ansible | Created collection for @NAMESPACE@.@NAME@:3.1.4 at /home/zuul/.ansible/collections/ansible_collections/@NAMESPACE@/@NAME@ 2025-11-26 12:17:53,629 p=31228 u=zuul n=ansible | @NAMESPACE@.@NAME@:3.1.4 was installed successfully 2025-11-26 12:18:02,181 p=31864 u=zuul n=ansible | PLAY [Remove status flag] ****************************************************** 2025-11-26 12:18:02,199 p=31864 u=zuul n=ansible | TASK [Gathering Facts ] ******************************************************** 2025-11-26 12:18:02,199 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:02 +0000 (0:00:00.033) 0:00:00.033 **** 2025-11-26 12:18:02,199 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:02 +0000 (0:00:00.031) 0:00:00.031 **** 2025-11-26 12:18:03,098 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:18:03,112 p=31864 u=zuul n=ansible | TASK [Delete success flag if exists path={{ ansible_user_dir }}/cifmw-success, state=absent] *** 2025-11-26 12:18:03,112 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:03 +0000 (0:00:00.913) 0:00:00.946 **** 2025-11-26 12:18:03,112 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:03 +0000 (0:00:00.913) 0:00:00.945 **** 2025-11-26 12:18:03,359 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:18:03,365 p=31864 u=zuul n=ansible | TASK [Inherit from parent scenarios if needed _raw_params=ci/playbooks/tasks/inherit_parent_scenario.yml] *** 2025-11-26 12:18:03,365 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:03 +0000 (0:00:00.252) 0:00:01.199 **** 2025-11-26 12:18:03,365 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:03 +0000 (0:00:00.252) 0:00:01.198 **** 2025-11-26 12:18:03,386 p=31864 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/ci/playbooks/tasks/inherit_parent_scenario.yml for localhost 2025-11-26 12:18:03,428 p=31864 u=zuul n=ansible | TASK [Inherit from parent parameter file if instructed file={{ item }}] ******** 2025-11-26 12:18:03,428 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:03 +0000 (0:00:00.062) 0:00:01.262 **** 2025-11-26 12:18:03,428 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:03 +0000 (0:00:00.062) 0:00:01.260 **** 2025-11-26 12:18:03,447 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:18:03,453 p=31864 u=zuul n=ansible | TASK [cifmw_setup : Set custom cifmw PATH reusable fact cifmw_path={{ ansible_user_dir }}/.crc/bin:{{ ansible_user_dir }}/.crc/bin/oc:{{ ansible_user_dir }}/bin:{{ ansible_env.PATH }}, cacheable=True] *** 2025-11-26 12:18:03,453 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:03 +0000 (0:00:00.025) 0:00:01.287 **** 2025-11-26 12:18:03,453 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:03 +0000 (0:00:00.025) 0:00:01.286 **** 2025-11-26 12:18:03,477 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:18:03,483 p=31864 u=zuul n=ansible | TASK [cifmw_setup : Get customized parameters ci_framework_params={{ hostvars[inventory_hostname] | dict2items | selectattr("key", "match", "^(cifmw|pre|post)_(?!install_yamls|openshift_token|openshift_login|openshift_kubeconfig).*") | list | items2dict }}] *** 2025-11-26 12:18:03,483 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:03 +0000 (0:00:00.029) 0:00:01.317 **** 2025-11-26 12:18:03,483 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:03 +0000 (0:00:00.029) 0:00:01.316 **** 2025-11-26 12:18:03,539 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:18:03,546 p=31864 u=zuul n=ansible | TASK [install_ca : Ensure target directory exists path={{ cifmw_install_ca_trust_dir }}, state=directory, mode=0755] *** 2025-11-26 12:18:03,547 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:03 +0000 (0:00:00.063) 0:00:01.380 **** 2025-11-26 12:18:03,547 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:03 +0000 (0:00:00.063) 0:00:01.379 **** 2025-11-26 12:18:03,727 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:18:03,733 p=31864 u=zuul n=ansible | TASK [install_ca : Install internal CA from url url={{ cifmw_install_ca_url }}, dest={{ cifmw_install_ca_trust_dir }}, validate_certs={{ cifmw_install_ca_url_validate_certs | default(omit) }}, mode=0644] *** 2025-11-26 12:18:03,733 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:03 +0000 (0:00:00.186) 0:00:01.567 **** 2025-11-26 12:18:03,734 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:03 +0000 (0:00:00.186) 0:00:01.566 **** 2025-11-26 12:18:03,753 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:18:03,759 p=31864 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from inline dest={{ cifmw_install_ca_trust_dir }}/cifmw_inline_ca_bundle.crt, content={{ cifmw_install_ca_bundle_inline }}, mode=0644] *** 2025-11-26 12:18:03,759 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:03 +0000 (0:00:00.025) 0:00:01.593 **** 2025-11-26 12:18:03,760 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:03 +0000 (0:00:00.026) 0:00:01.592 **** 2025-11-26 12:18:03,779 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:18:03,785 p=31864 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from file dest={{ cifmw_install_ca_trust_dir }}/{{ cifmw_install_ca_bundle_src | basename }}, src={{ cifmw_install_ca_bundle_src }}, mode=0644] *** 2025-11-26 12:18:03,785 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:03 +0000 (0:00:00.025) 0:00:01.619 **** 2025-11-26 12:18:03,785 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:03 +0000 (0:00:00.025) 0:00:01.618 **** 2025-11-26 12:18:03,804 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:18:03,811 p=31864 u=zuul n=ansible | TASK [install_ca : Update ca bundle _raw_params=update-ca-trust] *************** 2025-11-26 12:18:03,811 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:03 +0000 (0:00:00.025) 0:00:01.645 **** 2025-11-26 12:18:03,811 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:03 +0000 (0:00:00.025) 0:00:01.644 **** 2025-11-26 12:18:05,074 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:18:05,084 p=31864 u=zuul n=ansible | TASK [repo_setup : Ensure directories are present path={{ cifmw_repo_setup_basedir }}/{{ item }}, state=directory, mode=0755] *** 2025-11-26 12:18:05,084 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:05 +0000 (0:00:01.273) 0:00:02.918 **** 2025-11-26 12:18:05,084 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:05 +0000 (0:00:01.273) 0:00:02.917 **** 2025-11-26 12:18:05,247 p=31864 u=zuul n=ansible | changed: [localhost] => (item=tmp) 2025-11-26 12:18:05,406 p=31864 u=zuul n=ansible | changed: [localhost] => (item=artifacts/repositories) 2025-11-26 12:18:05,549 p=31864 u=zuul n=ansible | changed: [localhost] => (item=venv/repo_setup) 2025-11-26 12:18:05,556 p=31864 u=zuul n=ansible | TASK [repo_setup : Make sure git-core package is installed name=git-core, state=present] *** 2025-11-26 12:18:05,556 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:05 +0000 (0:00:00.471) 0:00:03.390 **** 2025-11-26 12:18:05,556 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:05 +0000 (0:00:00.471) 0:00:03.388 **** 2025-11-26 12:18:06,325 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:18:06,331 p=31864 u=zuul n=ansible | TASK [repo_setup : Get repo-setup repository accept_hostkey=True, dest={{ cifmw_repo_setup_basedir }}/tmp/repo-setup, repo={{ cifmw_repo_setup_src }}] *** 2025-11-26 12:18:06,331 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:06 +0000 (0:00:00.775) 0:00:04.165 **** 2025-11-26 12:18:06,331 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:06 +0000 (0:00:00.775) 0:00:04.164 **** 2025-11-26 12:18:07,367 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:18:07,372 p=31864 u=zuul n=ansible | TASK [repo_setup : Initialize python venv and install requirements virtualenv={{ cifmw_repo_setup_venv }}, requirements={{ cifmw_repo_setup_basedir }}/tmp/repo-setup/requirements.txt, virtualenv_command=python3 -m venv --system-site-packages --upgrade-deps] *** 2025-11-26 12:18:07,372 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:07 +0000 (0:00:01.040) 0:00:05.206 **** 2025-11-26 12:18:07,372 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:07 +0000 (0:00:01.041) 0:00:05.205 **** 2025-11-26 12:18:15,604 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:18:15,610 p=31864 u=zuul n=ansible | TASK [repo_setup : Install repo-setup package chdir={{ cifmw_repo_setup_basedir }}/tmp/repo-setup, creates={{ cifmw_repo_setup_venv }}/bin/repo-setup, _raw_params={{ cifmw_repo_setup_venv }}/bin/python setup.py install] *** 2025-11-26 12:18:15,610 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:15 +0000 (0:00:08.238) 0:00:13.444 **** 2025-11-26 12:18:15,611 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:15 +0000 (0:00:08.238) 0:00:13.443 **** 2025-11-26 12:18:16,279 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:18:16,286 p=31864 u=zuul n=ansible | TASK [repo_setup : Set cifmw_repo_setup_dlrn_hash_tag from content provider cifmw_repo_setup_dlrn_hash_tag={{ content_provider_dlrn_md5_hash }}] *** 2025-11-26 12:18:16,286 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:16 +0000 (0:00:00.675) 0:00:14.120 **** 2025-11-26 12:18:16,286 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:16 +0000 (0:00:00.675) 0:00:14.119 **** 2025-11-26 12:18:16,303 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:18:16,309 p=31864 u=zuul n=ansible | TASK [repo_setup : Run repo-setup _raw_params={{ cifmw_repo_setup_venv }}/bin/repo-setup {{ cifmw_repo_setup_promotion }} {{ cifmw_repo_setup_additional_repos }} -d {{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }} -b {{ cifmw_repo_setup_branch }} --rdo-mirror {{ cifmw_repo_setup_rdo_mirror }} {% if cifmw_repo_setup_dlrn_hash_tag | length > 0 %} --dlrn-hash-tag {{ cifmw_repo_setup_dlrn_hash_tag }} {% endif %} -o {{ cifmw_repo_setup_output }}] *** 2025-11-26 12:18:16,309 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:16 +0000 (0:00:00.022) 0:00:14.143 **** 2025-11-26 12:18:16,309 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:16 +0000 (0:00:00.022) 0:00:14.141 **** 2025-11-26 12:18:17,059 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:18:17,065 p=31864 u=zuul n=ansible | TASK [repo_setup : Get component repo url={{ cifmw_repo_setup_dlrn_uri }}/{{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }}-{{ cifmw_repo_setup_branch }}/component/{{ cifmw_repo_setup_component_name }}/{{ cifmw_repo_setup_component_promotion_tag }}/delorean.repo, dest={{ cifmw_repo_setup_output }}/{{ cifmw_repo_setup_component_name }}_{{ cifmw_repo_setup_component_promotion_tag }}_delorean.repo, mode=0644] *** 2025-11-26 12:18:17,065 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:17 +0000 (0:00:00.756) 0:00:14.899 **** 2025-11-26 12:18:17,065 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:17 +0000 (0:00:00.756) 0:00:14.898 **** 2025-11-26 12:18:17,091 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:18:17,096 p=31864 u=zuul n=ansible | TASK [repo_setup : Rename component repo path={{ cifmw_repo_setup_output }}/{{ cifmw_repo_setup_component_name }}_{{ cifmw_repo_setup_component_promotion_tag }}_delorean.repo, regexp=delorean-component-{{ cifmw_repo_setup_component_name }}, replace={{ cifmw_repo_setup_component_name }}-{{ cifmw_repo_setup_component_promotion_tag }}] *** 2025-11-26 12:18:17,096 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:17 +0000 (0:00:00.031) 0:00:14.930 **** 2025-11-26 12:18:17,097 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:17 +0000 (0:00:00.031) 0:00:14.929 **** 2025-11-26 12:18:17,122 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:18:17,127 p=31864 u=zuul n=ansible | TASK [repo_setup : Disable component repo in current-podified dlrn repo path={{ cifmw_repo_setup_output }}/delorean.repo, section=delorean-component-{{ cifmw_repo_setup_component_name }}, option=enabled, value=0, mode=0644] *** 2025-11-26 12:18:17,127 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:17 +0000 (0:00:00.030) 0:00:14.961 **** 2025-11-26 12:18:17,127 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:17 +0000 (0:00:00.030) 0:00:14.960 **** 2025-11-26 12:18:17,152 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:18:17,158 p=31864 u=zuul n=ansible | TASK [repo_setup : Run repo-setup-get-hash _raw_params={{ cifmw_repo_setup_venv }}/bin/repo-setup-get-hash --dlrn-url {{ cifmw_repo_setup_dlrn_uri[:-1] }} --os-version {{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }} --release {{ cifmw_repo_setup_branch }} {% if cifmw_repo_setup_component_name | length > 0 -%} --component {{ cifmw_repo_setup_component_name }} --tag {{ cifmw_repo_setup_component_promotion_tag }} {% else -%} --tag {{cifmw_repo_setup_promotion }} {% endif -%} {% if (cifmw_repo_setup_dlrn_hash_tag | length > 0) and (cifmw_repo_setup_component_name | length <= 0) -%} --dlrn-hash-tag {{ cifmw_repo_setup_dlrn_hash_tag }} {% endif -%} --json] *** 2025-11-26 12:18:17,158 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:17 +0000 (0:00:00.030) 0:00:14.992 **** 2025-11-26 12:18:17,158 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:17 +0000 (0:00:00.030) 0:00:14.991 **** 2025-11-26 12:18:17,654 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:18:17,660 p=31864 u=zuul n=ansible | TASK [repo_setup : Dump full hash in delorean.repo.md5 file content={{ _repo_setup_json['full_hash'] }} , dest={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5, mode=0644] *** 2025-11-26 12:18:17,660 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:17 +0000 (0:00:00.502) 0:00:15.494 **** 2025-11-26 12:18:17,660 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:17 +0000 (0:00:00.502) 0:00:15.493 **** 2025-11-26 12:18:18,199 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:18:18,205 p=31864 u=zuul n=ansible | TASK [repo_setup : Dump current-podified hash url={{ cifmw_repo_setup_dlrn_uri }}/{{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }}-{{ cifmw_repo_setup_branch }}/current-podified/delorean.repo.md5, dest={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5, mode=0644] *** 2025-11-26 12:18:18,205 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.544) 0:00:16.039 **** 2025-11-26 12:18:18,205 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.544) 0:00:16.037 **** 2025-11-26 12:18:18,219 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:18:18,225 p=31864 u=zuul n=ansible | TASK [repo_setup : Slurp current podified hash src={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5] *** 2025-11-26 12:18:18,225 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.019) 0:00:16.059 **** 2025-11-26 12:18:18,225 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.019) 0:00:16.057 **** 2025-11-26 12:18:18,238 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:18:18,244 p=31864 u=zuul n=ansible | TASK [repo_setup : Update the value of full_hash _repo_setup_json={{ _repo_setup_json | combine({'full_hash': _hash}, recursive=true) }}] *** 2025-11-26 12:18:18,244 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.019) 0:00:16.078 **** 2025-11-26 12:18:18,244 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.019) 0:00:16.077 **** 2025-11-26 12:18:18,257 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:18:18,263 p=31864 u=zuul n=ansible | TASK [repo_setup : Export hashes facts for further use cifmw_repo_setup_full_hash={{ _repo_setup_json['full_hash'] }}, cifmw_repo_setup_commit_hash={{ _repo_setup_json['commit_hash'] }}, cifmw_repo_setup_distro_hash={{ _repo_setup_json['distro_hash'] }}, cifmw_repo_setup_extended_hash={{ _repo_setup_json['extended_hash'] }}, cifmw_repo_setup_dlrn_api_url={{ _repo_setup_json['dlrn_api_url'] }}, cifmw_repo_setup_dlrn_url={{ _repo_setup_json['dlrn_url'] }}, cifmw_repo_setup_release={{ _repo_setup_json['release'] }}, cacheable=True] *** 2025-11-26 12:18:18,263 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.018) 0:00:16.097 **** 2025-11-26 12:18:18,263 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.018) 0:00:16.096 **** 2025-11-26 12:18:18,286 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:18:18,291 p=31864 u=zuul n=ansible | TASK [repo_setup : Create download directory path={{ cifmw_repo_setup_rhos_release_path }}, state=directory, mode=0755] *** 2025-11-26 12:18:18,291 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.027) 0:00:16.125 **** 2025-11-26 12:18:18,291 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.027) 0:00:16.123 **** 2025-11-26 12:18:18,302 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:18:18,308 p=31864 u=zuul n=ansible | TASK [repo_setup : Print the URL to request msg={{ cifmw_repo_setup_rhos_release_rpm }}] *** 2025-11-26 12:18:18,309 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.017) 0:00:16.142 **** 2025-11-26 12:18:18,309 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.017) 0:00:16.141 **** 2025-11-26 12:18:18,320 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:18:18,326 p=31864 u=zuul n=ansible | TASK [Download the RPM name=krb_request] *************************************** 2025-11-26 12:18:18,326 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.017) 0:00:16.160 **** 2025-11-26 12:18:18,326 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.017) 0:00:16.159 **** 2025-11-26 12:18:18,338 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:18:18,344 p=31864 u=zuul n=ansible | TASK [repo_setup : Install RHOS Release tool name={{ cifmw_repo_setup_rhos_release_rpm if cifmw_repo_setup_rhos_release_rpm is not url else cifmw_krb_request_out.path }}, state=present, disable_gpg_check={{ cifmw_repo_setup_rhos_release_gpg_check | bool }}] *** 2025-11-26 12:18:18,344 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.017) 0:00:16.178 **** 2025-11-26 12:18:18,344 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.017) 0:00:16.176 **** 2025-11-26 12:18:18,355 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:18:18,361 p=31864 u=zuul n=ansible | TASK [repo_setup : Get rhos-release tool version _raw_params=rhos-release --version] *** 2025-11-26 12:18:18,361 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.017) 0:00:16.195 **** 2025-11-26 12:18:18,361 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.017) 0:00:16.194 **** 2025-11-26 12:18:18,373 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:18:18,378 p=31864 u=zuul n=ansible | TASK [repo_setup : Print rhos-release tool version msg={{ rr_version.stdout }}] *** 2025-11-26 12:18:18,378 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.017) 0:00:16.212 **** 2025-11-26 12:18:18,379 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.017) 0:00:16.211 **** 2025-11-26 12:18:18,389 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:18:18,398 p=31864 u=zuul n=ansible | TASK [repo_setup : Generate repos using rhos-release {{ cifmw_repo_setup_rhos_release_args }} _raw_params=rhos-release {{ cifmw_repo_setup_rhos_release_args }} \ -t {{ cifmw_repo_setup_output }}] *** 2025-11-26 12:18:18,398 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.019) 0:00:16.232 **** 2025-11-26 12:18:18,398 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.019) 0:00:16.230 **** 2025-11-26 12:18:18,409 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:18:18,415 p=31864 u=zuul n=ansible | TASK [repo_setup : Check for /etc/ci/mirror_info.sh path=/etc/ci/mirror_info.sh] *** 2025-11-26 12:18:18,415 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.016) 0:00:16.248 **** 2025-11-26 12:18:18,415 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.016) 0:00:16.247 **** 2025-11-26 12:18:18,564 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:18:18,571 p=31864 u=zuul n=ansible | TASK [repo_setup : Use RDO proxy mirrors chdir={{ cifmw_repo_setup_output }}, _raw_params=set -o pipefail source /etc/ci/mirror_info.sh sed -i -e "s|https://trunk.rdoproject.org|$NODEPOOL_RDO_PROXY|g" *.repo ] *** 2025-11-26 12:18:18,571 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.156) 0:00:16.405 **** 2025-11-26 12:18:18,571 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.156) 0:00:16.403 **** 2025-11-26 12:18:18,739 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:18:18,745 p=31864 u=zuul n=ansible | TASK [repo_setup : Use RDO CentOS mirrors (remove CentOS 10 conditional when Nodepool mirrors exist) chdir={{ cifmw_repo_setup_output }}, _raw_params=set -o pipefail source /etc/ci/mirror_info.sh sed -i -e "s|http://mirror.stream.centos.org|$NODEPOOL_CENTOS_MIRROR|g" *.repo ] *** 2025-11-26 12:18:18,745 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.174) 0:00:16.579 **** 2025-11-26 12:18:18,745 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.174) 0:00:16.578 **** 2025-11-26 12:18:18,920 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:18:18,926 p=31864 u=zuul n=ansible | TASK [repo_setup : Check for gating.repo file on content provider url=http://{{ content_provider_registry_ip }}:8766/gating.repo] *** 2025-11-26 12:18:18,926 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.181) 0:00:16.760 **** 2025-11-26 12:18:18,927 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:18 +0000 (0:00:00.181) 0:00:16.759 **** 2025-11-26 12:18:49,373 p=31864 u=zuul n=ansible | fatal: [localhost]: FAILED! => changed: false elapsed: 30 msg: 'Status code was -1 and not [200]: Request failed: ' redirected: false status: -1 url: http://38.102.83.98:8766/gating.repo 2025-11-26 12:18:49,374 p=31864 u=zuul n=ansible | ...ignoring 2025-11-26 12:18:49,379 p=31864 u=zuul n=ansible | TASK [repo_setup : Populate gating repo from content provider ip content=[gating-repo] baseurl=http://{{ content_provider_registry_ip }}:8766/ enabled=1 gpgcheck=0 priority=1 , dest={{ cifmw_repo_setup_output }}/gating.repo, mode=0644] *** 2025-11-26 12:18:49,379 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:49 +0000 (0:00:30.452) 0:00:47.213 **** 2025-11-26 12:18:49,379 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:49 +0000 (0:00:30.452) 0:00:47.212 **** 2025-11-26 12:18:49,401 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:18:49,407 p=31864 u=zuul n=ansible | TASK [repo_setup : Check for DLRN repo at the destination path={{ cifmw_repo_setup_output }}/delorean.repo] *** 2025-11-26 12:18:49,407 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:49 +0000 (0:00:00.028) 0:00:47.241 **** 2025-11-26 12:18:49,407 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:49 +0000 (0:00:00.028) 0:00:47.240 **** 2025-11-26 12:18:49,430 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:18:49,435 p=31864 u=zuul n=ansible | TASK [repo_setup : Lower the priority of DLRN repos to allow installation from gating repo path={{ cifmw_repo_setup_output }}/delorean.repo, regexp=priority=1, replace=priority=20] *** 2025-11-26 12:18:49,436 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:49 +0000 (0:00:00.028) 0:00:47.269 **** 2025-11-26 12:18:49,436 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:49 +0000 (0:00:00.028) 0:00:47.268 **** 2025-11-26 12:18:49,458 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:18:49,464 p=31864 u=zuul n=ansible | TASK [repo_setup : Check for DLRN component repo path={{ cifmw_repo_setup_output }}/{{ _comp_repo }}] *** 2025-11-26 12:18:49,464 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:49 +0000 (0:00:00.028) 0:00:47.298 **** 2025-11-26 12:18:49,464 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:49 +0000 (0:00:00.028) 0:00:47.296 **** 2025-11-26 12:18:49,486 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:18:49,491 p=31864 u=zuul n=ansible | TASK [repo_setup : Lower the priority of componennt repos to allow installation from gating repo path={{ cifmw_repo_setup_output }}//{{ _comp_repo }}, regexp=priority=1, replace=priority=2] *** 2025-11-26 12:18:49,491 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:49 +0000 (0:00:00.027) 0:00:47.325 **** 2025-11-26 12:18:49,492 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:49 +0000 (0:00:00.027) 0:00:47.324 **** 2025-11-26 12:18:49,513 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:18:49,518 p=31864 u=zuul n=ansible | TASK [repo_setup : Find existing repos from /etc/yum.repos.d directory paths=/etc/yum.repos.d/, patterns=*.repo, recurse=False] *** 2025-11-26 12:18:49,518 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:49 +0000 (0:00:00.026) 0:00:47.352 **** 2025-11-26 12:18:49,519 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:49 +0000 (0:00:00.026) 0:00:47.351 **** 2025-11-26 12:18:49,776 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:18:49,781 p=31864 u=zuul n=ansible | TASK [repo_setup : Remove existing repos from /etc/yum.repos.d directory path={{ item }}, state=absent] *** 2025-11-26 12:18:49,781 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:49 +0000 (0:00:00.262) 0:00:47.615 **** 2025-11-26 12:18:49,781 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:49 +0000 (0:00:00.262) 0:00:47.614 **** 2025-11-26 12:18:49,958 p=31864 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/centos-addons.repo) 2025-11-26 12:18:50,115 p=31864 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/centos.repo) 2025-11-26 12:18:50,122 p=31864 u=zuul n=ansible | TASK [repo_setup : Cleanup existing metadata _raw_params=dnf clean metadata] *** 2025-11-26 12:18:50,122 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:50 +0000 (0:00:00.340) 0:00:47.956 **** 2025-11-26 12:18:50,122 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:50 +0000 (0:00:00.340) 0:00:47.955 **** 2025-11-26 12:18:50,478 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:18:50,484 p=31864 u=zuul n=ansible | TASK [repo_setup : Copy generated repos to /etc/yum.repos.d directory mode=0755, remote_src=True, src={{ cifmw_repo_setup_output }}/, dest=/etc/yum.repos.d] *** 2025-11-26 12:18:50,484 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:50 +0000 (0:00:00.362) 0:00:48.318 **** 2025-11-26 12:18:50,484 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:50 +0000 (0:00:00.362) 0:00:48.317 **** 2025-11-26 12:18:50,716 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:18:50,725 p=31864 u=zuul n=ansible | TASK [ci_setup : Gather variables for each operating system _raw_params={{ item }}] *** 2025-11-26 12:18:50,725 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:50 +0000 (0:00:00.241) 0:00:48.559 **** 2025-11-26 12:18:50,726 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:50 +0000 (0:00:00.241) 0:00:48.558 **** 2025-11-26 12:18:50,754 p=31864 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/ci_setup/vars/redhat.yml) 2025-11-26 12:18:50,761 p=31864 u=zuul n=ansible | TASK [ci_setup : List packages to install var=cifmw_ci_setup_packages] ********* 2025-11-26 12:18:50,761 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:50 +0000 (0:00:00.035) 0:00:48.595 **** 2025-11-26 12:18:50,761 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:50 +0000 (0:00:00.035) 0:00:48.593 **** 2025-11-26 12:18:50,773 p=31864 u=zuul n=ansible | ok: [localhost] => cifmw_ci_setup_packages: - bash-completion - ca-certificates - git-core - make - tar - tmux - python3-pip 2025-11-26 12:18:50,779 p=31864 u=zuul n=ansible | TASK [ci_setup : Install needed packages name={{ cifmw_ci_setup_packages }}, state=latest] *** 2025-11-26 12:18:50,779 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:50 +0000 (0:00:00.018) 0:00:48.613 **** 2025-11-26 12:18:50,779 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:18:50 +0000 (0:00:00.018) 0:00:48.612 **** 2025-11-26 12:19:15,224 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:19:15,230 p=31864 u=zuul n=ansible | TASK [ci_setup : Gather version of openshift client _raw_params=oc version --client -o yaml] *** 2025-11-26 12:19:15,230 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:15 +0000 (0:00:24.450) 0:01:13.064 **** 2025-11-26 12:19:15,230 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:15 +0000 (0:00:24.450) 0:01:13.062 **** 2025-11-26 12:19:15,383 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:19:15,389 p=31864 u=zuul n=ansible | TASK [ci_setup : Ensure openshift client install path is present path={{ cifmw_ci_setup_oc_install_path }}, state=directory, mode=0755] *** 2025-11-26 12:19:15,389 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:15 +0000 (0:00:00.159) 0:01:13.223 **** 2025-11-26 12:19:15,389 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:15 +0000 (0:00:00.159) 0:01:13.221 **** 2025-11-26 12:19:15,550 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:19:15,556 p=31864 u=zuul n=ansible | TASK [ci_setup : Install openshift client src={{ cifmw_ci_setup_openshift_client_download_uri }}/{{ cifmw_ci_setup_openshift_client_version }}/openshift-client-linux.tar.gz, dest={{ cifmw_ci_setup_oc_install_path }}, remote_src=True, mode=0755, creates={{ cifmw_ci_setup_oc_install_path }}/oc] *** 2025-11-26 12:19:15,556 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:15 +0000 (0:00:00.167) 0:01:13.390 **** 2025-11-26 12:19:15,556 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:15 +0000 (0:00:00.167) 0:01:13.389 **** 2025-11-26 12:19:21,707 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:19:21,713 p=31864 u=zuul n=ansible | TASK [ci_setup : Add the OC path to cifmw_path if needed cifmw_path={{ cifmw_ci_setup_oc_install_path }}:{{ ansible_env.PATH }}, cacheable=True] *** 2025-11-26 12:19:21,713 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:21 +0000 (0:00:06.157) 0:01:19.547 **** 2025-11-26 12:19:21,713 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:21 +0000 (0:00:06.157) 0:01:19.546 **** 2025-11-26 12:19:21,733 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:19:21,739 p=31864 u=zuul n=ansible | TASK [ci_setup : Create completion file] *************************************** 2025-11-26 12:19:21,739 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:21 +0000 (0:00:00.025) 0:01:19.573 **** 2025-11-26 12:19:21,739 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:21 +0000 (0:00:00.025) 0:01:19.572 **** 2025-11-26 12:19:21,979 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:19:21,985 p=31864 u=zuul n=ansible | TASK [ci_setup : Source completion from within .bashrc create=True, mode=0644, path={{ ansible_user_dir }}/.bashrc, block=if [ -f ~/.oc_completion ]; then source ~/.oc_completion fi] *** 2025-11-26 12:19:21,986 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:21 +0000 (0:00:00.246) 0:01:19.819 **** 2025-11-26 12:19:21,986 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:21 +0000 (0:00:00.246) 0:01:19.818 **** 2025-11-26 12:19:22,237 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:19:22,243 p=31864 u=zuul n=ansible | TASK [ci_setup : Check rhsm status _raw_params=subscription-manager status] **** 2025-11-26 12:19:22,243 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:22 +0000 (0:00:00.257) 0:01:20.077 **** 2025-11-26 12:19:22,243 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:22 +0000 (0:00:00.257) 0:01:20.075 **** 2025-11-26 12:19:22,256 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:19:22,261 p=31864 u=zuul n=ansible | TASK [ci_setup : Gather the repos to be enabled _repos={{ cifmw_ci_setup_rhel_rhsm_default_repos + (cifmw_ci_setup_rhel_rhsm_extra_repos | default([])) }}] *** 2025-11-26 12:19:22,261 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:22 +0000 (0:00:00.018) 0:01:20.095 **** 2025-11-26 12:19:22,262 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:22 +0000 (0:00:00.018) 0:01:20.094 **** 2025-11-26 12:19:22,273 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:19:22,279 p=31864 u=zuul n=ansible | TASK [ci_setup : Enabling the required repositories. name={{ item }}, state={{ rhsm_repo_state | default('enabled') }}] *** 2025-11-26 12:19:22,279 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:22 +0000 (0:00:00.017) 0:01:20.113 **** 2025-11-26 12:19:22,279 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:22 +0000 (0:00:00.017) 0:01:20.112 **** 2025-11-26 12:19:22,291 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:19:22,297 p=31864 u=zuul n=ansible | TASK [ci_setup : Get current /etc/redhat-release _raw_params=cat /etc/redhat-release] *** 2025-11-26 12:19:22,297 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:22 +0000 (0:00:00.018) 0:01:20.131 **** 2025-11-26 12:19:22,297 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:22 +0000 (0:00:00.018) 0:01:20.130 **** 2025-11-26 12:19:22,309 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:19:22,315 p=31864 u=zuul n=ansible | TASK [ci_setup : Print current /etc/redhat-release msg={{ _current_rh_release.stdout }}] *** 2025-11-26 12:19:22,315 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:22 +0000 (0:00:00.017) 0:01:20.149 **** 2025-11-26 12:19:22,315 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:22 +0000 (0:00:00.017) 0:01:20.147 **** 2025-11-26 12:19:22,326 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:19:22,332 p=31864 u=zuul n=ansible | TASK [ci_setup : Ensure the repos are enabled in the system using yum name={{ item.name }}, baseurl={{ item.baseurl }}, description={{ item.description | default(item.name) }}, gpgcheck={{ item.gpgcheck | default(false) }}, enabled=True, state={{ yum_repo_state | default('present') }}] *** 2025-11-26 12:19:22,332 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:22 +0000 (0:00:00.016) 0:01:20.166 **** 2025-11-26 12:19:22,332 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:22 +0000 (0:00:00.016) 0:01:20.164 **** 2025-11-26 12:19:22,349 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:19:22,355 p=31864 u=zuul n=ansible | TASK [ci_setup : Manage directories path={{ item }}, state={{ directory_state }}, mode=0755, owner={{ ansible_user_id }}, group={{ ansible_user_id }}] *** 2025-11-26 12:19:22,355 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:22 +0000 (0:00:00.023) 0:01:20.189 **** 2025-11-26 12:19:22,356 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:22 +0000 (0:00:00.023) 0:01:20.188 **** 2025-11-26 12:19:22,560 p=31864 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/manifests/openstack/cr) 2025-11-26 12:19:22,725 p=31864 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/logs) 2025-11-26 12:19:22,898 p=31864 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/tmp) 2025-11-26 12:19:23,059 p=31864 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/volumes) 2025-11-26 12:19:23,224 p=31864 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters) 2025-11-26 12:19:23,236 p=31864 u=zuul n=ansible | TASK [Prepare install_yamls make targets name=install_yamls, apply={'tags': ['bootstrap']}] *** 2025-11-26 12:19:23,236 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:23 +0000 (0:00:00.880) 0:01:21.070 **** 2025-11-26 12:19:23,236 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:23 +0000 (0:00:00.880) 0:01:21.069 **** 2025-11-26 12:19:23,345 p=31864 u=zuul n=ansible | TASK [install_yamls : Ensure directories exist path={{ item }}, state=directory, mode=0755] *** 2025-11-26 12:19:23,345 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:23 +0000 (0:00:00.109) 0:01:21.179 **** 2025-11-26 12:19:23,345 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:23 +0000 (0:00:00.109) 0:01:21.178 **** 2025-11-26 12:19:23,513 p=31864 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts) 2025-11-26 12:19:23,664 p=31864 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/roles/install_yamls_makes/tasks) 2025-11-26 12:19:23,804 p=31864 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters) 2025-11-26 12:19:23,811 p=31864 u=zuul n=ansible | TASK [Create variables with local repos based on Zuul items name=install_yamls, tasks_from=zuul_set_operators_repo.yml] *** 2025-11-26 12:19:23,811 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:23 +0000 (0:00:00.465) 0:01:21.645 **** 2025-11-26 12:19:23,811 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:23 +0000 (0:00:00.465) 0:01:21.644 **** 2025-11-26 12:19:23,842 p=31864 u=zuul n=ansible | TASK [install_yamls : Set fact with local repos based on Zuul items cifmw_install_yamls_operators_repo={{ cifmw_install_yamls_operators_repo | default({}) | combine(_repo_operator_info | items2dict) }}] *** 2025-11-26 12:19:23,842 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:23 +0000 (0:00:00.030) 0:01:21.676 **** 2025-11-26 12:19:23,842 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:23 +0000 (0:00:00.030) 0:01:21.674 **** 2025-11-26 12:19:23,881 p=31864 u=zuul n=ansible | ok: [localhost] => (item={'branch': 'main', 'change': '373', 'change_url': 'https://github.com/openstack-k8s-operators/test-operator/pull/373', 'commit_id': '68b77c48042be317ac8e0bb694f24ff66dc1b517', 'patchset': '68b77c48042be317ac8e0bb694f24ff66dc1b517', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/test-operator', 'name': 'openstack-k8s-operators/test-operator', 'short_name': 'test-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/test-operator'}, 'topic': None}) 2025-11-26 12:19:23,888 p=31864 u=zuul n=ansible | TASK [install_yamls : Print helpful data for debugging msg=_repo_operator_name: {{ _repo_operator_name }} _repo_operator_info: {{ _repo_operator_info }} cifmw_install_yamls_operators_repo: {{ cifmw_install_yamls_operators_repo }} ] *** 2025-11-26 12:19:23,888 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:23 +0000 (0:00:00.046) 0:01:21.722 **** 2025-11-26 12:19:23,888 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:23 +0000 (0:00:00.046) 0:01:21.721 **** 2025-11-26 12:19:23,927 p=31864 u=zuul n=ansible | ok: [localhost] => (item={'branch': 'main', 'change': '373', 'change_url': 'https://github.com/openstack-k8s-operators/test-operator/pull/373', 'commit_id': '68b77c48042be317ac8e0bb694f24ff66dc1b517', 'patchset': '68b77c48042be317ac8e0bb694f24ff66dc1b517', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/test-operator', 'name': 'openstack-k8s-operators/test-operator', 'short_name': 'test-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/test-operator'}, 'topic': None}) => msg: | _repo_operator_name: test _repo_operator_info: [{'key': 'TEST_REPO', 'value': '/home/zuul/src/github.com/openstack-k8s-operators/test-operator'}, {'key': 'TEST_BRANCH', 'value': ''}] cifmw_install_yamls_operators_repo: {'TEST_REPO': '/home/zuul/src/github.com/openstack-k8s-operators/test-operator', 'TEST_BRANCH': ''} 2025-11-26 12:19:23,938 p=31864 u=zuul n=ansible | TASK [Customize install_yamls devsetup vars if needed name=install_yamls, tasks_from=customize_devsetup_vars.yml] *** 2025-11-26 12:19:23,938 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:23 +0000 (0:00:00.049) 0:01:21.772 **** 2025-11-26 12:19:23,938 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:23 +0000 (0:00:00.049) 0:01:21.771 **** 2025-11-26 12:19:23,974 p=31864 u=zuul n=ansible | TASK [install_yamls : Update opm_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^opm_version:, line=opm_version: {{ cifmw_install_yamls_opm_version }}, state=present] *** 2025-11-26 12:19:23,975 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:23 +0000 (0:00:00.036) 0:01:21.809 **** 2025-11-26 12:19:23,975 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:23 +0000 (0:00:00.036) 0:01:21.807 **** 2025-11-26 12:19:23,992 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:19:23,998 p=31864 u=zuul n=ansible | TASK [install_yamls : Update sdk_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^sdk_version:, line=sdk_version: {{ cifmw_install_yamls_sdk_version }}, state=present] *** 2025-11-26 12:19:23,998 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:23 +0000 (0:00:00.023) 0:01:21.832 **** 2025-11-26 12:19:23,998 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:23 +0000 (0:00:00.023) 0:01:21.830 **** 2025-11-26 12:19:24,014 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:19:24,020 p=31864 u=zuul n=ansible | TASK [install_yamls : Update go_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^go_version:, line=go_version: {{ cifmw_install_yamls_go_version }}, state=present] *** 2025-11-26 12:19:24,020 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:24 +0000 (0:00:00.022) 0:01:21.854 **** 2025-11-26 12:19:24,020 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:24 +0000 (0:00:00.022) 0:01:21.853 **** 2025-11-26 12:19:24,036 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:19:24,042 p=31864 u=zuul n=ansible | TASK [install_yamls : Update kustomize_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^kustomize_version:, line=kustomize_version: {{ cifmw_install_yamls_kustomize_version }}, state=present] *** 2025-11-26 12:19:24,042 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:24 +0000 (0:00:00.022) 0:01:21.876 **** 2025-11-26 12:19:24,042 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:24 +0000 (0:00:00.022) 0:01:21.875 **** 2025-11-26 12:19:24,059 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:19:24,069 p=31864 u=zuul n=ansible | TASK [install_yamls : Compute the cifmw_install_yamls_vars final value _install_yamls_override_vars={{ _install_yamls_override_vars | default({}) | combine(item, recursive=True) }}] *** 2025-11-26 12:19:24,069 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:24 +0000 (0:00:00.027) 0:01:21.903 **** 2025-11-26 12:19:24,069 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:24 +0000 (0:00:00.027) 0:01:21.902 **** 2025-11-26 12:19:24,125 p=31864 u=zuul n=ansible | ok: [localhost] => (item={'BMO_SETUP': False, 'INSTALL_CERT_MANAGER': False}) 2025-11-26 12:19:24,133 p=31864 u=zuul n=ansible | TASK [install_yamls : Set environment override cifmw_install_yamls_environment fact cifmw_install_yamls_environment={{ _install_yamls_override_vars.keys() | map('upper') | zip(_install_yamls_override_vars.values()) | items2dict(key_name=0, value_name=1) | combine({ 'OUT': cifmw_install_yamls_manifests_dir, 'OUTPUT_DIR': cifmw_install_yamls_edpm_dir, 'CHECKOUT_FROM_OPENSTACK_REF': cifmw_install_yamls_checkout_openstack_ref, 'OPENSTACK_K8S_BRANCH': (zuul is defined and not zuul.branch |regex_search('master|antelope|rhos')) | ternary(zuul.branch, 'main') }) | combine(install_yamls_operators_repos) }}, cacheable=True] *** 2025-11-26 12:19:24,133 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:24 +0000 (0:00:00.063) 0:01:21.967 **** 2025-11-26 12:19:24,133 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:24 +0000 (0:00:00.063) 0:01:21.965 **** 2025-11-26 12:19:24,167 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:19:24,172 p=31864 u=zuul n=ansible | TASK [install_yamls : Get environment structure base_path={{ cifmw_install_yamls_repo }}] *** 2025-11-26 12:19:24,172 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:24 +0000 (0:00:00.039) 0:01:22.006 **** 2025-11-26 12:19:24,172 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:24 +0000 (0:00:00.039) 0:01:22.005 **** 2025-11-26 12:19:24,636 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:19:24,643 p=31864 u=zuul n=ansible | TASK [install_yamls : Ensure Output directory exists path={{ cifmw_install_yamls_out_dir }}, state=directory, mode=0755] *** 2025-11-26 12:19:24,643 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:24 +0000 (0:00:00.471) 0:01:22.477 **** 2025-11-26 12:19:24,643 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:24 +0000 (0:00:00.471) 0:01:22.476 **** 2025-11-26 12:19:24,802 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:19:24,809 p=31864 u=zuul n=ansible | TASK [install_yamls : Ensure user cifmw_install_yamls_vars contains existing Makefile variables that=_cifmw_install_yamls_unmatched_vars | length == 0, msg=cifmw_install_yamls_vars contains a variable that is not defined in install_yamls Makefile nor cifmw_install_yamls_whitelisted_vars: {{ _cifmw_install_yamls_unmatched_vars | join(', ')}}, quiet=True] *** 2025-11-26 12:19:24,809 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:24 +0000 (0:00:00.165) 0:01:22.643 **** 2025-11-26 12:19:24,809 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:24 +0000 (0:00:00.165) 0:01:22.642 **** 2025-11-26 12:19:24,838 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:19:24,850 p=31864 u=zuul n=ansible | TASK [install_yamls : Generate /home/zuul/ci-framework-data/artifacts/install_yamls.sh dest={{ cifmw_install_yamls_out_dir }}/{{ cifmw_install_yamls_envfile }}, content={% for k,v in cifmw_install_yamls_environment.items() %} export {{ k }}={{ v }} {% endfor %}, mode=0644] *** 2025-11-26 12:19:24,850 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:24 +0000 (0:00:00.041) 0:01:22.684 **** 2025-11-26 12:19:24,851 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:24 +0000 (0:00:00.041) 0:01:22.683 **** 2025-11-26 12:19:25,177 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:19:25,182 p=31864 u=zuul n=ansible | TASK [install_yamls : Set install_yamls default values cifmw_install_yamls_defaults={{ get_makefiles_env_output.makefiles_values | combine(cifmw_install_yamls_environment) }}, cacheable=True] *** 2025-11-26 12:19:25,183 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:25 +0000 (0:00:00.332) 0:01:23.016 **** 2025-11-26 12:19:25,183 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:25 +0000 (0:00:00.332) 0:01:23.015 **** 2025-11-26 12:19:25,203 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:19:25,210 p=31864 u=zuul n=ansible | TASK [install_yamls : Show the env structure var=cifmw_install_yamls_environment] *** 2025-11-26 12:19:25,210 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:25 +0000 (0:00:00.027) 0:01:23.044 **** 2025-11-26 12:19:25,210 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:25 +0000 (0:00:00.027) 0:01:23.043 **** 2025-11-26 12:19:25,227 p=31864 u=zuul n=ansible | ok: [localhost] => cifmw_install_yamls_environment: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm TEST_BRANCH: '' TEST_REPO: /home/zuul/src/github.com/openstack-k8s-operators/test-operator 2025-11-26 12:19:25,233 p=31864 u=zuul n=ansible | TASK [install_yamls : Show the env structure defaults var=cifmw_install_yamls_defaults] *** 2025-11-26 12:19:25,233 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:25 +0000 (0:00:00.022) 0:01:23.067 **** 2025-11-26 12:19:25,233 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:25 +0000 (0:00:00.022) 0:01:23.066 **** 2025-11-26 12:19:25,285 p=31864 u=zuul n=ansible | ok: [localhost] => cifmw_install_yamls_defaults: ADOPTED_EXTERNAL_NETWORK: 172.21.1.0/24 ADOPTED_INTERNALAPI_NETWORK: 172.17.1.0/24 ADOPTED_STORAGEMGMT_NETWORK: 172.20.1.0/24 ADOPTED_STORAGE_NETWORK: 172.18.1.0/24 ADOPTED_TENANT_NETWORK: 172.9.1.0/24 ANSIBLEEE: config/samples/_v1beta1_ansibleee.yaml ANSIBLEEE_BRANCH: main ANSIBLEEE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/config/samples/_v1beta1_ansibleee.yaml ANSIBLEEE_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-operator-index:latest ANSIBLEEE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/kuttl-test.yaml ANSIBLEEE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/test/kuttl/tests ANSIBLEEE_KUTTL_NAMESPACE: ansibleee-kuttl-tests ANSIBLEEE_REPO: https://github.com/openstack-k8s-operators/openstack-ansibleee-operator ANSIBLEE_COMMIT_HASH: '' BARBICAN: config/samples/barbican_v1beta1_barbican.yaml BARBICAN_BRANCH: main BARBICAN_COMMIT_HASH: '' BARBICAN_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/config/samples/barbican_v1beta1_barbican.yaml BARBICAN_DEPL_IMG: unused BARBICAN_IMG: quay.io/openstack-k8s-operators/barbican-operator-index:latest BARBICAN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/kuttl-test.yaml BARBICAN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/test/kuttl/tests BARBICAN_KUTTL_NAMESPACE: barbican-kuttl-tests BARBICAN_REPO: https://github.com/openstack-k8s-operators/barbican-operator.git BARBICAN_SERVICE_ENABLED: 'true' BARBICAN_SIMPLE_CRYPTO_ENCRYPTION_KEY: sE**********U= BAREMETAL_BRANCH: main BAREMETAL_COMMIT_HASH: '' BAREMETAL_IMG: quay.io/openstack-k8s-operators/openstack-baremetal-operator-index:latest BAREMETAL_OS_CONTAINER_IMG: '' BAREMETAL_OS_IMG: '' BAREMETAL_REPO: https://github.com/openstack-k8s-operators/openstack-baremetal-operator.git BAREMETAL_TIMEOUT: 20m BASH_IMG: quay.io/openstack-k8s-operators/bash:latest BGP_ASN: '64999' BGP_LEAF_1: 100.65.4.1 BGP_LEAF_2: 100.64.4.1 BGP_OVN_ROUTING: 'false' BGP_PEER_ASN: '64999' BGP_SOURCE_IP: 172.30.4.2 BGP_SOURCE_IP6: f00d:f00d:f00d:f00d:f00d:f00d:f00d:42 BMAAS_BRIDGE_IPV4_PREFIX: 172.20.1.2/24 BMAAS_BRIDGE_IPV6_PREFIX: fd00:bbbb::2/64 BMAAS_INSTANCE_DISK_SIZE: '20' BMAAS_INSTANCE_MEMORY: '4096' BMAAS_INSTANCE_NAME_PREFIX: crc-bmaas BMAAS_INSTANCE_NET_MODEL: virtio BMAAS_INSTANCE_OS_VARIANT: centos-stream9 BMAAS_INSTANCE_VCPUS: '2' BMAAS_INSTANCE_VIRT_TYPE: kvm BMAAS_IPV4: 'true' BMAAS_IPV6: 'false' BMAAS_LIBVIRT_USER: sushyemu BMAAS_METALLB_ADDRESS_POOL: 172.20.1.64/26 BMAAS_METALLB_POOL_NAME: baremetal BMAAS_NETWORK_IPV4_PREFIX: 172.20.1.1/24 BMAAS_NETWORK_IPV6_PREFIX: fd00:bbbb::1/64 BMAAS_NETWORK_NAME: crc-bmaas BMAAS_NODE_COUNT: '1' BMAAS_OCP_INSTANCE_NAME: crc BMAAS_REDFISH_PASSWORD: password BMAAS_REDFISH_USERNAME: admin BMAAS_ROUTE_LIBVIRT_NETWORKS: crc-bmaas,crc,default BMAAS_SUSHY_EMULATOR_DRIVER: libvirt BMAAS_SUSHY_EMULATOR_IMAGE: quay.io/metal3-io/sushy-tools:latest BMAAS_SUSHY_EMULATOR_NAMESPACE: sushy-emulator BMAAS_SUSHY_EMULATOR_OS_CLIENT_CONFIG_FILE: /etc/openstack/clouds.yaml BMAAS_SUSHY_EMULATOR_OS_CLOUD: openstack BMH_NAMESPACE: openstack BMO_BRANCH: release-0.9 BMO_CLEANUP: 'true' BMO_COMMIT_HASH: '' BMO_IPA_BRANCH: stable/2024.1 BMO_IRONIC_HOST: 192.168.122.10 BMO_PROVISIONING_INTERFACE: '' BMO_REPO: https://github.com/metal3-io/baremetal-operator BMO_SETUP: false BMO_SETUP_ROUTE_REPLACE: 'true' BM_CTLPLANE_INTERFACE: enp1s0 BM_INSTANCE_MEMORY: '8192' BM_INSTANCE_NAME_PREFIX: edpm-compute-baremetal BM_INSTANCE_NAME_SUFFIX: '0' BM_NETWORK_NAME: default BM_NODE_COUNT: '1' BM_ROOT_PASSWORD: '' BM_ROOT_PASSWORD_SECRET: '' CEILOMETER_CENTRAL_DEPL_IMG: unused CEILOMETER_NOTIFICATION_DEPL_IMG: unused CEPH_BRANCH: release-1.15 CEPH_CLIENT: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/toolbox.yaml CEPH_COMMON: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/common.yaml CEPH_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/cluster-test.yaml CEPH_CRDS: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/crds.yaml CEPH_IMG: quay.io/ceph/demo:latest-squid CEPH_OP: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/operator-openshift.yaml CEPH_REPO: https://github.com/rook/rook.git CERTMANAGER_TIMEOUT: 300s CHECKOUT_FROM_OPENSTACK_REF: 'true' CINDER: config/samples/cinder_v1beta1_cinder.yaml CINDERAPI_DEPL_IMG: unused CINDERBKP_DEPL_IMG: unused CINDERSCH_DEPL_IMG: unused CINDERVOL_DEPL_IMG: unused CINDER_BRANCH: main CINDER_COMMIT_HASH: '' CINDER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/config/samples/cinder_v1beta1_cinder.yaml CINDER_IMG: quay.io/openstack-k8s-operators/cinder-operator-index:latest CINDER_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/kuttl-test.yaml CINDER_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/test/kuttl/tests CINDER_KUTTL_NAMESPACE: cinder-kuttl-tests CINDER_REPO: https://github.com/openstack-k8s-operators/cinder-operator.git CLEANUP_DIR_CMD: rm -Rf CRC_BGP_NIC_1_MAC: '52:54:00:11:11:11' CRC_BGP_NIC_2_MAC: '52:54:00:11:11:12' CRC_HTTPS_PROXY: '' CRC_HTTP_PROXY: '' CRC_STORAGE_NAMESPACE: crc-storage CRC_STORAGE_RETRIES: '3' CRC_URL: '''https://developers.redhat.com/content-gateway/rest/mirror/pub/openshift-v4/clients/crc/latest/crc-linux-amd64.tar.xz''' CRC_VERSION: latest DATAPLANE_ANSIBLE_SECRET: dataplane-ansible-ssh-private-key-secret DATAPLANE_ANSIBLE_USER: '' DATAPLANE_COMPUTE_IP: 192.168.122.100 DATAPLANE_CONTAINER_PREFIX: openstack DATAPLANE_CONTAINER_TAG: current-podified DATAPLANE_CUSTOM_SERVICE_RUNNER_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-runner:latest DATAPLANE_DEFAULT_GW: 192.168.122.1 DATAPLANE_EXTRA_NOVA_CONFIG_FILE: /dev/null DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=100% DATAPLANE_KUSTOMIZE_SCENARIO: preprovisioned DATAPLANE_NETWORKER_IP: 192.168.122.200 DATAPLANE_NETWORK_INTERFACE_NAME: eth0 DATAPLANE_NOVA_NFS_PATH: '' DATAPLANE_NTP_SERVER: pool.ntp.org DATAPLANE_PLAYBOOK: osp.edpm.download_cache DATAPLANE_REGISTRY_URL: quay.io/podified-antelope-centos9 DATAPLANE_RUNNER_IMG: '' DATAPLANE_SERVER_ROLE: compute DATAPLANE_SSHD_ALLOWED_RANGES: '[''192.168.122.0/24'']' DATAPLANE_TIMEOUT: 30m DATAPLANE_TLS_ENABLED: 'true' DATAPLANE_TOTAL_NETWORKER_NODES: '1' DATAPLANE_TOTAL_NODES: '1' DBSERVICE: galera DESIGNATE: config/samples/designate_v1beta1_designate.yaml DESIGNATE_BRANCH: main DESIGNATE_COMMIT_HASH: '' DESIGNATE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/config/samples/designate_v1beta1_designate.yaml DESIGNATE_IMG: quay.io/openstack-k8s-operators/designate-operator-index:latest DESIGNATE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/kuttl-test.yaml DESIGNATE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/test/kuttl/tests DESIGNATE_KUTTL_NAMESPACE: designate-kuttl-tests DESIGNATE_REPO: https://github.com/openstack-k8s-operators/designate-operator.git DNSDATA: config/samples/network_v1beta1_dnsdata.yaml DNSDATA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsdata.yaml DNSMASQ: config/samples/network_v1beta1_dnsmasq.yaml DNSMASQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsmasq.yaml DNS_DEPL_IMG: unused DNS_DOMAIN: localdomain DOWNLOAD_TOOLS_SELECTION: all EDPM_ATTACH_EXTNET: 'true' EDPM_COMPUTE_ADDITIONAL_HOST_ROUTES: '''[]''' EDPM_COMPUTE_ADDITIONAL_NETWORKS: '''[]''' EDPM_COMPUTE_CELLS: '1' EDPM_COMPUTE_CEPH_ENABLED: 'true' EDPM_COMPUTE_CEPH_NOVA: 'true' EDPM_COMPUTE_DHCP_AGENT_ENABLED: 'true' EDPM_COMPUTE_SRIOV_ENABLED: 'true' EDPM_COMPUTE_SUFFIX: '0' EDPM_CONFIGURE_DEFAULT_ROUTE: 'true' EDPM_CONFIGURE_HUGEPAGES: 'false' EDPM_CONFIGURE_NETWORKING: 'true' EDPM_FIRSTBOOT_EXTRA: /tmp/edpm-firstboot-extra EDPM_NETWORKER_SUFFIX: '0' EDPM_TOTAL_NETWORKERS: '1' EDPM_TOTAL_NODES: '1' GALERA_REPLICAS: '' GENERATE_SSH_KEYS: 'true' GIT_CLONE_OPTS: '' GLANCE: config/samples/glance_v1beta1_glance.yaml GLANCEAPI_DEPL_IMG: unused GLANCE_BRANCH: main GLANCE_COMMIT_HASH: '' GLANCE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/config/samples/glance_v1beta1_glance.yaml GLANCE_IMG: quay.io/openstack-k8s-operators/glance-operator-index:latest GLANCE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/kuttl-test.yaml GLANCE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/test/kuttl/tests GLANCE_KUTTL_NAMESPACE: glance-kuttl-tests GLANCE_REPO: https://github.com/openstack-k8s-operators/glance-operator.git HEAT: config/samples/heat_v1beta1_heat.yaml HEATAPI_DEPL_IMG: unused HEATCFNAPI_DEPL_IMG: unused HEATENGINE_DEPL_IMG: unused HEAT_AUTH_ENCRYPTION_KEY: 76**********f0 HEAT_BRANCH: main HEAT_COMMIT_HASH: '' HEAT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/config/samples/heat_v1beta1_heat.yaml HEAT_IMG: quay.io/openstack-k8s-operators/heat-operator-index:latest HEAT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/kuttl-test.yaml HEAT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/test/kuttl/tests HEAT_KUTTL_NAMESPACE: heat-kuttl-tests HEAT_REPO: https://github.com/openstack-k8s-operators/heat-operator.git HEAT_SERVICE_ENABLED: 'true' HORIZON: config/samples/horizon_v1beta1_horizon.yaml HORIZON_BRANCH: main HORIZON_COMMIT_HASH: '' HORIZON_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/config/samples/horizon_v1beta1_horizon.yaml HORIZON_DEPL_IMG: unused HORIZON_IMG: quay.io/openstack-k8s-operators/horizon-operator-index:latest HORIZON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/kuttl-test.yaml HORIZON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/test/kuttl/tests HORIZON_KUTTL_NAMESPACE: horizon-kuttl-tests HORIZON_REPO: https://github.com/openstack-k8s-operators/horizon-operator.git INFRA_BRANCH: main INFRA_COMMIT_HASH: '' INFRA_IMG: quay.io/openstack-k8s-operators/infra-operator-index:latest INFRA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/kuttl-test.yaml INFRA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/test/kuttl/tests INFRA_KUTTL_NAMESPACE: infra-kuttl-tests INFRA_REPO: https://github.com/openstack-k8s-operators/infra-operator.git INSTALL_CERT_MANAGER: false INSTALL_NMSTATE: true || false INSTALL_NNCP: true || false INTERNALAPI_HOST_ROUTES: '' IPV6_LAB_IPV4_NETWORK_IPADDRESS: 172.30.0.1/24 IPV6_LAB_IPV6_NETWORK_IPADDRESS: fd00:abcd:abcd:fc00::1/64 IPV6_LAB_LIBVIRT_STORAGE_POOL: default IPV6_LAB_MANAGE_FIREWALLD: 'true' IPV6_LAB_NAT64_HOST_IPV4: 172.30.0.2/24 IPV6_LAB_NAT64_HOST_IPV6: fd00:abcd:abcd:fc00::2/64 IPV6_LAB_NAT64_INSTANCE_NAME: nat64-router IPV6_LAB_NAT64_IPV6_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_NAT64_TAYGA_DYNAMIC_POOL: 192.168.255.0/24 IPV6_LAB_NAT64_TAYGA_IPV4: 192.168.255.1 IPV6_LAB_NAT64_TAYGA_IPV6: fd00:abcd:abcd:fc00::3 IPV6_LAB_NAT64_TAYGA_IPV6_PREFIX: fd00:abcd:abcd:fcff::/96 IPV6_LAB_NAT64_UPDATE_PACKAGES: 'false' IPV6_LAB_NETWORK_NAME: nat64 IPV6_LAB_SNO_CLUSTER_NETWORK: fd00:abcd:0::/48 IPV6_LAB_SNO_HOST_IP: fd00:abcd:abcd:fc00::11 IPV6_LAB_SNO_HOST_PREFIX: '64' IPV6_LAB_SNO_INSTANCE_NAME: sno IPV6_LAB_SNO_MACHINE_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_SNO_OCP_MIRROR_URL: https://mirror.openshift.com/pub/openshift-v4/clients/ocp IPV6_LAB_SNO_OCP_VERSION: latest-4.14 IPV6_LAB_SNO_SERVICE_NETWORK: fd00:abcd:abcd:fc03::/112 IPV6_LAB_SSH_PUB_KEY: /home/zuul/.ssh/id_rsa.pub IPV6_LAB_WORK_DIR: /home/zuul/.ipv6lab IRONIC: config/samples/ironic_v1beta1_ironic.yaml IRONICAPI_DEPL_IMG: unused IRONICCON_DEPL_IMG: unused IRONICINS_DEPL_IMG: unused IRONICNAG_DEPL_IMG: unused IRONICPXE_DEPL_IMG: unused IRONIC_BRANCH: main IRONIC_COMMIT_HASH: '' IRONIC_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/config/samples/ironic_v1beta1_ironic.yaml IRONIC_IMAGE_TAG: release-24.1 IRONIC_IMG: quay.io/openstack-k8s-operators/ironic-operator-index:latest IRONIC_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/kuttl-test.yaml IRONIC_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/test/kuttl/tests IRONIC_KUTTL_NAMESPACE: ironic-kuttl-tests IRONIC_REPO: https://github.com/openstack-k8s-operators/ironic-operator.git KEYSTONEAPI: config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_DEPL_IMG: unused KEYSTONE_BRANCH: main KEYSTONE_COMMIT_HASH: '' KEYSTONE_FEDERATION_CLIENT_SECRET: CO**********6f KEYSTONE_FEDERATION_CRYPTO_PASSPHRASE: openstack KEYSTONE_IMG: quay.io/openstack-k8s-operators/keystone-operator-index:latest KEYSTONE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/kuttl-test.yaml KEYSTONE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/test/kuttl/tests KEYSTONE_KUTTL_NAMESPACE: keystone-kuttl-tests KEYSTONE_REPO: https://github.com/openstack-k8s-operators/keystone-operator.git KUBEADMIN_PWD: '12345678' LIBVIRT_SECRET: libvirt-secret LOKI_DEPLOY_MODE: openshift-network LOKI_DEPLOY_NAMESPACE: netobserv LOKI_DEPLOY_SIZE: 1x.demo LOKI_NAMESPACE: openshift-operators-redhat LOKI_OPERATOR_GROUP: openshift-operators-redhat-loki LOKI_SUBSCRIPTION: loki-operator LVMS_CR: '1' MANILA: config/samples/manila_v1beta1_manila.yaml MANILAAPI_DEPL_IMG: unused MANILASCH_DEPL_IMG: unused MANILASHARE_DEPL_IMG: unused MANILA_BRANCH: main MANILA_COMMIT_HASH: '' MANILA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/config/samples/manila_v1beta1_manila.yaml MANILA_IMG: quay.io/openstack-k8s-operators/manila-operator-index:latest MANILA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/kuttl-test.yaml MANILA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/test/kuttl/tests MANILA_KUTTL_NAMESPACE: manila-kuttl-tests MANILA_REPO: https://github.com/openstack-k8s-operators/manila-operator.git MANILA_SERVICE_ENABLED: 'true' MARIADB: config/samples/mariadb_v1beta1_galera.yaml MARIADB_BRANCH: main MARIADB_CHAINSAW_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/chainsaw/config.yaml MARIADB_CHAINSAW_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/chainsaw/tests MARIADB_CHAINSAW_NAMESPACE: mariadb-chainsaw-tests MARIADB_COMMIT_HASH: '' MARIADB_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/config/samples/mariadb_v1beta1_galera.yaml MARIADB_DEPL_IMG: unused MARIADB_IMG: quay.io/openstack-k8s-operators/mariadb-operator-index:latest MARIADB_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/kuttl-test.yaml MARIADB_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/kuttl/tests MARIADB_KUTTL_NAMESPACE: mariadb-kuttl-tests MARIADB_REPO: https://github.com/openstack-k8s-operators/mariadb-operator.git MEMCACHED: config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_DEPL_IMG: unused METADATA_SHARED_SECRET: '12**********42' METALLB_IPV6_POOL: fd00:aaaa::80-fd00:aaaa::90 METALLB_POOL: 192.168.122.80-192.168.122.90 MICROSHIFT: '0' NAMESPACE: openstack NETCONFIG: config/samples/network_v1beta1_netconfig.yaml NETCONFIG_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_netconfig.yaml NETCONFIG_DEPL_IMG: unused NETOBSERV_DEPLOY_NAMESPACE: netobserv NETOBSERV_NAMESPACE: openshift-netobserv-operator NETOBSERV_OPERATOR_GROUP: openshift-netobserv-operator-net NETOBSERV_SUBSCRIPTION: netobserv-operator NETWORK_BGP: 'false' NETWORK_DESIGNATE_ADDRESS_PREFIX: 172.28.0 NETWORK_DESIGNATE_EXT_ADDRESS_PREFIX: 172.50.0 NETWORK_INTERNALAPI_ADDRESS_PREFIX: 172.17.0 NETWORK_ISOLATION: 'true' NETWORK_ISOLATION_INSTANCE_NAME: crc NETWORK_ISOLATION_IPV4: 'true' NETWORK_ISOLATION_IPV4_ADDRESS: 172.16.1.1/24 NETWORK_ISOLATION_IPV4_NAT: 'true' NETWORK_ISOLATION_IPV6: 'false' NETWORK_ISOLATION_IPV6_ADDRESS: fd00:aaaa::1/64 NETWORK_ISOLATION_IP_ADDRESS: 192.168.122.10 NETWORK_ISOLATION_MAC: '52:54:00:11:11:10' NETWORK_ISOLATION_NETWORK_NAME: net-iso NETWORK_ISOLATION_NET_NAME: default NETWORK_ISOLATION_USE_DEFAULT_NETWORK: 'true' NETWORK_MTU: '1500' NETWORK_STORAGEMGMT_ADDRESS_PREFIX: 172.20.0 NETWORK_STORAGE_ADDRESS_PREFIX: 172.18.0 NETWORK_STORAGE_MACVLAN: '' NETWORK_TENANT_ADDRESS_PREFIX: 172.19.0 NETWORK_VLAN_START: '20' NETWORK_VLAN_STEP: '1' NEUTRONAPI: config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_DEPL_IMG: unused NEUTRON_BRANCH: main NEUTRON_COMMIT_HASH: '' NEUTRON_IMG: quay.io/openstack-k8s-operators/neutron-operator-index:latest NEUTRON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/kuttl-test.yaml NEUTRON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/test/kuttl/tests NEUTRON_KUTTL_NAMESPACE: neutron-kuttl-tests NEUTRON_REPO: https://github.com/openstack-k8s-operators/neutron-operator.git NFS_HOME: /home/nfs NMSTATE_NAMESPACE: openshift-nmstate NMSTATE_OPERATOR_GROUP: openshift-nmstate-tn6k8 NMSTATE_SUBSCRIPTION: kubernetes-nmstate-operator NNCP_ADDITIONAL_HOST_ROUTES: '' NNCP_BGP_1_INTERFACE: enp7s0 NNCP_BGP_1_IP_ADDRESS: 100.65.4.2 NNCP_BGP_2_INTERFACE: enp8s0 NNCP_BGP_2_IP_ADDRESS: 100.64.4.2 NNCP_BRIDGE: ospbr NNCP_CLEANUP_TIMEOUT: 120s NNCP_CTLPLANE_IPV6_ADDRESS_PREFIX: 'fd00:aaaa::' NNCP_CTLPLANE_IPV6_ADDRESS_SUFFIX: '10' NNCP_CTLPLANE_IP_ADDRESS_PREFIX: 192.168.122 NNCP_CTLPLANE_IP_ADDRESS_SUFFIX: '10' NNCP_DNS_SERVER: 192.168.122.1 NNCP_DNS_SERVER_IPV6: fd00:aaaa::1 NNCP_GATEWAY: 192.168.122.1 NNCP_GATEWAY_IPV6: fd00:aaaa::1 NNCP_INTERFACE: enp6s0 NNCP_NODES: '' NNCP_TIMEOUT: 240s NOVA: config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_BRANCH: main NOVA_COMMIT_HASH: '' NOVA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/nova-operator/config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_IMG: quay.io/openstack-k8s-operators/nova-operator-index:latest NOVA_REPO: https://github.com/openstack-k8s-operators/nova-operator.git NUMBER_OF_INSTANCES: '1' OCP_NETWORK_NAME: crc OCTAVIA: config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_BRANCH: main OCTAVIA_COMMIT_HASH: '' OCTAVIA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_IMG: quay.io/openstack-k8s-operators/octavia-operator-index:latest OCTAVIA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/kuttl-test.yaml OCTAVIA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/test/kuttl/tests OCTAVIA_KUTTL_NAMESPACE: octavia-kuttl-tests OCTAVIA_REPO: https://github.com/openstack-k8s-operators/octavia-operator.git OKD: 'false' OPENSTACK_BRANCH: main OPENSTACK_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-bundle:latest OPENSTACK_COMMIT_HASH: '' OPENSTACK_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_CRDS_DIR: openstack_crds OPENSTACK_CTLPLANE: config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_IMG: quay.io/openstack-k8s-operators/openstack-operator-index:latest OPENSTACK_K8S_BRANCH: main OPENSTACK_K8S_TAG: latest OPENSTACK_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/kuttl-test.yaml OPENSTACK_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests OPENSTACK_KUTTL_NAMESPACE: openstack-kuttl-tests OPENSTACK_NEUTRON_CUSTOM_CONF: '' OPENSTACK_REPO: https://github.com/openstack-k8s-operators/openstack-operator.git OPENSTACK_STORAGE_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-storage-bundle:latest OPERATOR_BASE_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator OPERATOR_CHANNEL: '' OPERATOR_NAMESPACE: openstack-operators OPERATOR_SOURCE: '' OPERATOR_SOURCE_NAMESPACE: '' OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm OVNCONTROLLER: config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_NMAP: 'true' OVNDBS: config/samples/ovn_v1beta1_ovndbcluster.yaml OVNDBS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovndbcluster.yaml OVNNORTHD: config/samples/ovn_v1beta1_ovnnorthd.yaml OVNNORTHD_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovnnorthd.yaml OVN_BRANCH: main OVN_COMMIT_HASH: '' OVN_IMG: quay.io/openstack-k8s-operators/ovn-operator-index:latest OVN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/kuttl-test.yaml OVN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/test/kuttl/tests OVN_KUTTL_NAMESPACE: ovn-kuttl-tests OVN_REPO: https://github.com/openstack-k8s-operators/ovn-operator.git PASSWORD: '12**********78' PLACEMENTAPI: config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_DEPL_IMG: unused PLACEMENT_BRANCH: main PLACEMENT_COMMIT_HASH: '' PLACEMENT_IMG: quay.io/openstack-k8s-operators/placement-operator-index:latest PLACEMENT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/kuttl-test.yaml PLACEMENT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/test/kuttl/tests PLACEMENT_KUTTL_NAMESPACE: placement-kuttl-tests PLACEMENT_REPO: https://github.com/openstack-k8s-operators/placement-operator.git PULL_SECRET: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/pull-secret.txt RABBITMQ: docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_BRANCH: patches RABBITMQ_COMMIT_HASH: '' RABBITMQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rabbitmq-operator/docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_DEPL_IMG: unused RABBITMQ_IMG: quay.io/openstack-k8s-operators/rabbitmq-cluster-operator-index:latest RABBITMQ_REPO: https://github.com/openstack-k8s-operators/rabbitmq-cluster-operator.git REDHAT_OPERATORS: 'false' REDIS: config/samples/redis_v1beta1_redis.yaml REDIS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator-redis/config/samples/redis_v1beta1_redis.yaml REDIS_DEPL_IMG: unused RH_REGISTRY_PWD: '' RH_REGISTRY_USER: '' SECRET: os**********et SG_CORE_DEPL_IMG: unused STANDALONE_COMPUTE_DRIVER: libvirt STANDALONE_EXTERNAL_NET_PREFFIX: 172.21.0 STANDALONE_INTERNALAPI_NET_PREFIX: 172.17.0 STANDALONE_STORAGEMGMT_NET_PREFIX: 172.20.0 STANDALONE_STORAGE_NET_PREFIX: 172.18.0 STANDALONE_TENANT_NET_PREFIX: 172.19.0 STORAGEMGMT_HOST_ROUTES: '' STORAGE_CLASS: local-storage STORAGE_HOST_ROUTES: '' SWIFT: config/samples/swift_v1beta1_swift.yaml SWIFT_BRANCH: main SWIFT_COMMIT_HASH: '' SWIFT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/config/samples/swift_v1beta1_swift.yaml SWIFT_IMG: quay.io/openstack-k8s-operators/swift-operator-index:latest SWIFT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/kuttl-test.yaml SWIFT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/test/kuttl/tests SWIFT_KUTTL_NAMESPACE: swift-kuttl-tests SWIFT_REPO: https://github.com/openstack-k8s-operators/swift-operator.git TELEMETRY: config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_BRANCH: main TELEMETRY_COMMIT_HASH: '' TELEMETRY_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_IMG: quay.io/openstack-k8s-operators/telemetry-operator-index:latest TELEMETRY_KUTTL_BASEDIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator TELEMETRY_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/kuttl-test.yaml TELEMETRY_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/test/kuttl/suites TELEMETRY_KUTTL_NAMESPACE: telemetry-kuttl-tests TELEMETRY_KUTTL_RELPATH: test/kuttl/suites TELEMETRY_REPO: https://github.com/openstack-k8s-operators/telemetry-operator.git TENANT_HOST_ROUTES: '' TEST_BRANCH: '' TEST_REPO: /home/zuul/src/github.com/openstack-k8s-operators/test-operator TIMEOUT: 300s TLS_ENABLED: 'false' tripleo_deploy: 'export REGISTRY_PWD:' 2025-11-26 12:19:25,291 p=31864 u=zuul n=ansible | TASK [install_yamls : Generate make targets install_yamls_path={{ cifmw_install_yamls_repo }}, output_directory={{ cifmw_install_yamls_tasks_out }}] *** 2025-11-26 12:19:25,291 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:25 +0000 (0:00:00.058) 0:01:23.125 **** 2025-11-26 12:19:25,291 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:25 +0000 (0:00:00.058) 0:01:23.124 **** 2025-11-26 12:19:25,535 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:19:25,542 p=31864 u=zuul n=ansible | TASK [install_yamls : Debug generate_make module var=cifmw_generate_makes] ***** 2025-11-26 12:19:25,543 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:25 +0000 (0:00:00.251) 0:01:23.376 **** 2025-11-26 12:19:25,543 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:25 +0000 (0:00:00.251) 0:01:23.375 **** 2025-11-26 12:19:25,562 p=31864 u=zuul n=ansible | ok: [localhost] => cifmw_generate_makes: changed: false debug: /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/Makefile: - all - help - cleanup - deploy_cleanup - wait - crc_storage - crc_storage_cleanup - crc_storage_release - crc_storage_with_retries - crc_storage_cleanup_with_retries - operator_namespace - namespace - namespace_cleanup - input - input_cleanup - crc_bmo_setup - crc_bmo_cleanup - openstack_prep - openstack - openstack_wait - openstack_init - openstack_cleanup - openstack_repo - openstack_deploy_prep - openstack_deploy - openstack_wait_deploy - openstack_deploy_cleanup - openstack_update_run - update_services - update_system - openstack_patch_version - edpm_deploy_generate_keys - edpm_patch_ansible_runner_image - edpm_deploy_prep - edpm_deploy_cleanup - edpm_deploy - edpm_deploy_baremetal_prep - edpm_deploy_baremetal - edpm_wait_deploy_baremetal - edpm_wait_deploy - edpm_register_dns - edpm_nova_discover_hosts - openstack_crds - openstack_crds_cleanup - edpm_deploy_networker_prep - edpm_deploy_networker_cleanup - edpm_deploy_networker - infra_prep - infra - infra_cleanup - dns_deploy_prep - dns_deploy - dns_deploy_cleanup - netconfig_deploy_prep - netconfig_deploy - netconfig_deploy_cleanup - memcached_deploy_prep - memcached_deploy - memcached_deploy_cleanup - keystone_prep - keystone - keystone_cleanup - keystone_deploy_prep - keystone_deploy - keystone_deploy_cleanup - barbican_prep - barbican - barbican_cleanup - barbican_deploy_prep - barbican_deploy - barbican_deploy_validate - barbican_deploy_cleanup - mariadb - mariadb_cleanup - mariadb_deploy_prep - mariadb_deploy - mariadb_deploy_cleanup - placement_prep - placement - placement_cleanup - placement_deploy_prep - placement_deploy - placement_deploy_cleanup - glance_prep - glance - glance_cleanup - glance_deploy_prep - glance_deploy - glance_deploy_cleanup - ovn_prep - ovn - ovn_cleanup - ovn_deploy_prep - ovn_deploy - ovn_deploy_cleanup - neutron_prep - neutron - neutron_cleanup - neutron_deploy_prep - neutron_deploy - neutron_deploy_cleanup - cinder_prep - cinder - cinder_cleanup - cinder_deploy_prep - cinder_deploy - cinder_deploy_cleanup - rabbitmq_prep - rabbitmq - rabbitmq_cleanup - rabbitmq_deploy_prep - rabbitmq_deploy - rabbitmq_deploy_cleanup - ironic_prep - ironic - ironic_cleanup - ironic_deploy_prep - ironic_deploy - ironic_deploy_cleanup - octavia_prep - octavia - octavia_cleanup - octavia_deploy_prep - octavia_deploy - octavia_deploy_cleanup - designate_prep - designate - designate_cleanup - designate_deploy_prep - designate_deploy - designate_deploy_cleanup - nova_prep - nova - nova_cleanup - nova_deploy_prep - nova_deploy - nova_deploy_cleanup - mariadb_kuttl_run - mariadb_kuttl - kuttl_db_prep - kuttl_db_cleanup - kuttl_common_prep - kuttl_common_cleanup - keystone_kuttl_run - keystone_kuttl - barbican_kuttl_run - barbican_kuttl - placement_kuttl_run - placement_kuttl - cinder_kuttl_run - cinder_kuttl - neutron_kuttl_run - neutron_kuttl - octavia_kuttl_run - octavia_kuttl - designate_kuttl - designate_kuttl_run - ovn_kuttl_run - ovn_kuttl - infra_kuttl_run - infra_kuttl - ironic_kuttl_run - ironic_kuttl - ironic_kuttl_crc - heat_kuttl_run - heat_kuttl - heat_kuttl_crc - ansibleee_kuttl_run - ansibleee_kuttl_cleanup - ansibleee_kuttl_prep - ansibleee_kuttl - glance_kuttl_run - glance_kuttl - manila_kuttl_run - manila_kuttl - swift_kuttl_run - swift_kuttl - horizon_kuttl_run - horizon_kuttl - openstack_kuttl_run - openstack_kuttl - mariadb_chainsaw_run - mariadb_chainsaw - horizon_prep - horizon - horizon_cleanup - horizon_deploy_prep - horizon_deploy - horizon_deploy_cleanup - heat_prep - heat - heat_cleanup - heat_deploy_prep - heat_deploy - heat_deploy_cleanup - ansibleee_prep - ansibleee - ansibleee_cleanup - baremetal_prep - baremetal - baremetal_cleanup - ceph_help - ceph - ceph_cleanup - rook_prep - rook - rook_deploy_prep - rook_deploy - rook_crc_disk - rook_cleanup - lvms - nmstate - nncp - nncp_cleanup - netattach - netattach_cleanup - metallb - metallb_config - metallb_config_cleanup - metallb_cleanup - loki - loki_cleanup - loki_deploy - loki_deploy_cleanup - netobserv - netobserv_cleanup - netobserv_deploy - netobserv_deploy_cleanup - manila_prep - manila - manila_cleanup - manila_deploy_prep - manila_deploy - manila_deploy_cleanup - telemetry_prep - telemetry - telemetry_cleanup - telemetry_deploy_prep - telemetry_deploy - telemetry_deploy_cleanup - telemetry_kuttl_run - telemetry_kuttl - swift_prep - swift - swift_cleanup - swift_deploy_prep - swift_deploy - swift_deploy_cleanup - certmanager - certmanager_cleanup - validate_marketplace - redis_deploy_prep - redis_deploy - redis_deploy_cleanup - set_slower_etcd_profile /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/Makefile: - help - download_tools - nfs - nfs_cleanup - crc - crc_cleanup - crc_scrub - crc_attach_default_interface - crc_attach_default_interface_cleanup - ipv6_lab_network - ipv6_lab_network_cleanup - ipv6_lab_nat64_router - ipv6_lab_nat64_router_cleanup - ipv6_lab_sno - ipv6_lab_sno_cleanup - ipv6_lab - ipv6_lab_cleanup - attach_default_interface - attach_default_interface_cleanup - network_isolation_bridge - network_isolation_bridge_cleanup - edpm_baremetal_compute - edpm_compute - edpm_compute_bootc - edpm_ansible_runner - edpm_computes_bgp - edpm_compute_repos - edpm_compute_cleanup - edpm_networker - edpm_networker_cleanup - edpm_deploy_instance - tripleo_deploy - standalone_deploy - standalone_sync - standalone - standalone_cleanup - standalone_snapshot - standalone_revert - cifmw_prepare - cifmw_cleanup - bmaas_network - bmaas_network_cleanup - bmaas_route_crc_and_crc_bmaas_networks - bmaas_route_crc_and_crc_bmaas_networks_cleanup - bmaas_crc_attach_network - bmaas_crc_attach_network_cleanup - bmaas_crc_baremetal_bridge - bmaas_crc_baremetal_bridge_cleanup - bmaas_baremetal_net_nad - bmaas_baremetal_net_nad_cleanup - bmaas_metallb - bmaas_metallb_cleanup - bmaas_virtual_bms - bmaas_virtual_bms_cleanup - bmaas_sushy_emulator - bmaas_sushy_emulator_cleanup - bmaas_sushy_emulator_wait - bmaas_generate_nodes_yaml - bmaas - bmaas_cleanup failed: false success: true 2025-11-26 12:19:25,569 p=31864 u=zuul n=ansible | TASK [install_yamls : Create the install_yamls parameters file dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml, content={{ { 'cifmw_install_yamls_environment': cifmw_install_yamls_environment, 'cifmw_install_yamls_defaults': cifmw_install_yamls_defaults } | to_nice_yaml }}, mode=0644] *** 2025-11-26 12:19:25,569 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:25 +0000 (0:00:00.026) 0:01:23.403 **** 2025-11-26 12:19:25,569 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:25 +0000 (0:00:00.026) 0:01:23.402 **** 2025-11-26 12:19:25,896 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:19:25,903 p=31864 u=zuul n=ansible | TASK [install_yamls : Create empty cifmw_install_yamls_environment if needed cifmw_install_yamls_environment={}] *** 2025-11-26 12:19:25,903 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:25 +0000 (0:00:00.333) 0:01:23.737 **** 2025-11-26 12:19:25,903 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:25 +0000 (0:00:00.333) 0:01:23.735 **** 2025-11-26 12:19:25,918 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:19:25,931 p=31864 u=zuul n=ansible | TASK [discover_latest_image : Get latest image url={{ cifmw_discover_latest_image_base_url }}, image_prefix={{ cifmw_discover_latest_image_qcow_prefix }}, images_file={{ cifmw_discover_latest_image_images_file }}] *** 2025-11-26 12:19:25,931 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:25 +0000 (0:00:00.028) 0:01:23.765 **** 2025-11-26 12:19:25,931 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:25 +0000 (0:00:00.028) 0:01:23.764 **** 2025-11-26 12:19:27,400 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:19:27,407 p=31864 u=zuul n=ansible | TASK [discover_latest_image : Export facts accordingly cifmw_discovered_image_name={{ discovered_image['data']['image_name'] }}, cifmw_discovered_image_url={{ discovered_image['data']['image_url'] }}, cifmw_discovered_hash={{ discovered_image['data']['hash'] }}, cifmw_discovered_hash_algorithm={{ discovered_image['data']['hash_algorithm'] }}, cacheable=True] *** 2025-11-26 12:19:27,407 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:27 +0000 (0:00:01.475) 0:01:25.241 **** 2025-11-26 12:19:27,407 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:27 +0000 (0:00:01.475) 0:01:25.240 **** 2025-11-26 12:19:27,424 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:19:27,434 p=31864 u=zuul n=ansible | TASK [cifmw_setup : Create artifacts with custom params mode=0644, dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/custom-params.yml, content={{ ci_framework_params | to_nice_yaml }}] *** 2025-11-26 12:19:27,434 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:27 +0000 (0:00:00.027) 0:01:25.268 **** 2025-11-26 12:19:27,434 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:27 +0000 (0:00:00.027) 0:01:25.267 **** 2025-11-26 12:19:27,750 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:19:27,761 p=31864 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-11-26 12:19:27,761 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:27 +0000 (0:00:00.326) 0:01:25.595 **** 2025-11-26 12:19:27,761 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:27 +0000 (0:00:00.326) 0:01:25.594 **** 2025-11-26 12:19:27,808 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:19:27,814 p=31864 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-11-26 12:19:27,814 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:27 +0000 (0:00:00.053) 0:01:25.648 **** 2025-11-26 12:19:27,815 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:27 +0000 (0:00:00.053) 0:01:25.647 **** 2025-11-26 12:19:27,877 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:19:27,884 p=31864 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_infra _raw_params={{ hook.type }}.yml] *** 2025-11-26 12:19:27,884 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:27 +0000 (0:00:00.069) 0:01:25.718 **** 2025-11-26 12:19:27,884 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:27 +0000 (0:00:00.069) 0:01:25.717 **** 2025-11-26 12:19:27,970 p=31864 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Download needed tools', 'inventory': 'localhost,', 'connection': 'local', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'}) 2025-11-26 12:19:27,979 p=31864 u=zuul n=ansible | TASK [run_hook : Set playbook path for Download needed tools cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-11-26 12:19:27,980 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:27 +0000 (0:00:00.095) 0:01:25.813 **** 2025-11-26 12:19:27,980 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:27 +0000 (0:00:00.095) 0:01:25.812 **** 2025-11-26 12:19:28,017 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:19:28,024 p=31864 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-11-26 12:19:28,024 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:28 +0000 (0:00:00.044) 0:01:25.858 **** 2025-11-26 12:19:28,024 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:28 +0000 (0:00:00.044) 0:01:25.857 **** 2025-11-26 12:19:28,180 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:19:28,187 p=31864 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-11-26 12:19:28,187 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:28 +0000 (0:00:00.162) 0:01:26.021 **** 2025-11-26 12:19:28,187 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:28 +0000 (0:00:00.162) 0:01:26.020 **** 2025-11-26 12:19:28,200 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:19:28,207 p=31864 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-11-26 12:19:28,207 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:28 +0000 (0:00:00.019) 0:01:26.041 **** 2025-11-26 12:19:28,207 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:28 +0000 (0:00:00.019) 0:01:26.039 **** 2025-11-26 12:19:28,361 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:19:28,368 p=31864 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-11-26 12:19:28,368 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:28 +0000 (0:00:00.160) 0:01:26.202 **** 2025-11-26 12:19:28,368 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:28 +0000 (0:00:00.160) 0:01:26.200 **** 2025-11-26 12:19:28,383 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:19:28,389 p=31864 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-11-26 12:19:28,389 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:28 +0000 (0:00:00.021) 0:01:26.223 **** 2025-11-26 12:19:28,389 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:28 +0000 (0:00:00.021) 0:01:26.222 **** 2025-11-26 12:19:28,543 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:19:28,549 p=31864 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-11-26 12:19:28,549 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:28 +0000 (0:00:00.160) 0:01:26.383 **** 2025-11-26 12:19:28,549 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:28 +0000 (0:00:00.160) 0:01:26.382 **** 2025-11-26 12:19:28,706 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:19:28,715 p=31864 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Download needed tools] *************** 2025-11-26 12:19:28,715 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:28 +0000 (0:00:00.166) 0:01:26.549 **** 2025-11-26 12:19:28,715 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:28 +0000 (0:00:00.166) 0:01:26.548 **** 2025-11-26 12:19:28,760 p=31864 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_000_run_hook_without_retry.log 2025-11-26 12:19:58,991 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:19:58,998 p=31864 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Download needed tools] ****************** 2025-11-26 12:19:58,998 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:58 +0000 (0:00:30.282) 0:01:56.832 **** 2025-11-26 12:19:58,998 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:58 +0000 (0:00:30.282) 0:01:56.831 **** 2025-11-26 12:19:59,013 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:19:59,020 p=31864 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-11-26 12:19:59,020 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.022) 0:01:56.854 **** 2025-11-26 12:19:59,020 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.022) 0:01:56.853 **** 2025-11-26 12:19:59,168 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:19:59,175 p=31864 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-11-26 12:19:59,175 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.154) 0:01:57.009 **** 2025-11-26 12:19:59,175 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.154) 0:01:57.008 **** 2025-11-26 12:19:59,188 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:19:59,217 p=31864 u=zuul n=ansible | PLAY [Prepare host virtualization] ********************************************* 2025-11-26 12:19:59,232 p=31864 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-11-26 12:19:59,232 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.056) 0:01:57.066 **** 2025-11-26 12:19:59,232 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.056) 0:01:57.064 **** 2025-11-26 12:19:59,271 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:19:59,279 p=31864 u=zuul n=ansible | TASK [Ensure libvirt is present/configured name=libvirt_manager] *************** 2025-11-26 12:19:59,279 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.047) 0:01:57.113 **** 2025-11-26 12:19:59,279 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.047) 0:01:57.112 **** 2025-11-26 12:19:59,296 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:19:59,303 p=31864 u=zuul n=ansible | TASK [Perpare OpenShift provisioner node name=openshift_provisioner_node] ****** 2025-11-26 12:19:59,303 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.024) 0:01:57.137 **** 2025-11-26 12:19:59,303 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.024) 0:01:57.136 **** 2025-11-26 12:19:59,319 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:19:59,349 p=31864 u=zuul n=ansible | PLAY [Run cifmw_setup infra, build package, container and operators, deploy EDPM] *** 2025-11-26 12:19:59,379 p=31864 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-11-26 12:19:59,379 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.076) 0:01:57.213 **** 2025-11-26 12:19:59,379 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.076) 0:01:57.212 **** 2025-11-26 12:19:59,451 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:19:59,459 p=31864 u=zuul n=ansible | TASK [networking_mapper : Check for Networking Environment Definition file existence path={{ cifmw_networking_mapper_networking_env_def_path }}] *** 2025-11-26 12:19:59,459 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.079) 0:01:57.293 **** 2025-11-26 12:19:59,459 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.079) 0:01:57.292 **** 2025-11-26 12:19:59,641 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:19:59,647 p=31864 u=zuul n=ansible | TASK [networking_mapper : Check for Networking Definition file existance that=['_net_env_def_stat.stat.exists'], msg=Ensure that the Networking Environment Definition file exists in {{ cifmw_networking_mapper_networking_env_def_path }}, quiet=True] *** 2025-11-26 12:19:59,647 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.187) 0:01:57.481 **** 2025-11-26 12:19:59,647 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.187) 0:01:57.479 **** 2025-11-26 12:19:59,666 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:19:59,673 p=31864 u=zuul n=ansible | TASK [networking_mapper : Load the Networking Definition from file path={{ cifmw_networking_mapper_networking_env_def_path }}] *** 2025-11-26 12:19:59,673 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.026) 0:01:57.507 **** 2025-11-26 12:19:59,673 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.026) 0:01:57.506 **** 2025-11-26 12:19:59,691 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:19:59,699 p=31864 u=zuul n=ansible | TASK [networking_mapper : Set cifmw_networking_env_definition is present cifmw_networking_env_definition={{ _net_env_def_slurp['content'] | b64decode | from_yaml }}, cacheable=True] *** 2025-11-26 12:19:59,699 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.025) 0:01:57.533 **** 2025-11-26 12:19:59,699 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.025) 0:01:57.531 **** 2025-11-26 12:19:59,717 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:19:59,729 p=31864 u=zuul n=ansible | TASK [Deploy OCP using Hive name=hive] ***************************************** 2025-11-26 12:19:59,729 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.030) 0:01:57.563 **** 2025-11-26 12:19:59,729 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.030) 0:01:57.561 **** 2025-11-26 12:19:59,746 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:19:59,753 p=31864 u=zuul n=ansible | TASK [Prepare CRC name=rhol_crc] *********************************************** 2025-11-26 12:19:59,753 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.024) 0:01:57.587 **** 2025-11-26 12:19:59,753 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.024) 0:01:57.585 **** 2025-11-26 12:19:59,772 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:19:59,779 p=31864 u=zuul n=ansible | TASK [Deploy OpenShift cluster using dev-scripts name=devscripts] ************** 2025-11-26 12:19:59,779 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.026) 0:01:57.613 **** 2025-11-26 12:19:59,779 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.026) 0:01:57.612 **** 2025-11-26 12:19:59,796 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:19:59,804 p=31864 u=zuul n=ansible | TASK [openshift_login : Ensure output directory exists path={{ cifmw_openshift_login_basedir }}/artifacts, state=directory, mode=0755] *** 2025-11-26 12:19:59,804 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.024) 0:01:57.638 **** 2025-11-26 12:19:59,804 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.024) 0:01:57.637 **** 2025-11-26 12:19:59,962 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:19:59,970 p=31864 u=zuul n=ansible | TASK [openshift_login : OpenShift login _raw_params=login.yml] ***************** 2025-11-26 12:19:59,970 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.166) 0:01:57.804 **** 2025-11-26 12:19:59,970 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:19:59 +0000 (0:00:00.166) 0:01:57.803 **** 2025-11-26 12:19:59,995 p=31864 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/login.yml for localhost 2025-11-26 12:20:00,006 p=31864 u=zuul n=ansible | TASK [openshift_login : Check if the password file is present path={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] *** 2025-11-26 12:20:00,006 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.036) 0:01:57.840 **** 2025-11-26 12:20:00,006 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.036) 0:01:57.839 **** 2025-11-26 12:20:00,025 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:00,032 p=31864 u=zuul n=ansible | TASK [openshift_login : Fetch user password content src={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] *** 2025-11-26 12:20:00,032 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.026) 0:01:57.866 **** 2025-11-26 12:20:00,032 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.026) 0:01:57.865 **** 2025-11-26 12:20:00,051 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:00,058 p=31864 u=zuul n=ansible | TASK [openshift_login : Set user password as a fact cifmw_openshift_login_password={{ cifmw_openshift_login_password_file_slurp.content | b64decode }}, cacheable=True] *** 2025-11-26 12:20:00,058 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.025) 0:01:57.892 **** 2025-11-26 12:20:00,058 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.025) 0:01:57.891 **** 2025-11-26 12:20:00,076 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:00,084 p=31864 u=zuul n=ansible | TASK [openshift_login : Set role variables cifmw_openshift_login_kubeconfig={{ cifmw_openshift_login_kubeconfig | default(cifmw_openshift_kubeconfig) | default( ansible_env.KUBECONFIG if 'KUBECONFIG' in ansible_env else cifmw_openshift_login_kubeconfig_default_path ) | trim }}, cifmw_openshift_login_user={{ cifmw_openshift_login_user | default(cifmw_openshift_user) | default(omit) }}, cifmw_openshift_login_password={{********** cifmw_openshift_login_password | default(cifmw_openshift_password) | default(omit) }}, cifmw_openshift_login_api={{ cifmw_openshift_login_api | default(cifmw_openshift_api) | default(omit) }}, cifmw_openshift_login_cert_login={{ cifmw_openshift_login_cert_login | default(false)}}, cifmw_openshift_login_provided_token={{ cifmw_openshift_provided_token | default(omit) }}, cacheable=True] *** 2025-11-26 12:20:00,084 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.025) 0:01:57.918 **** 2025-11-26 12:20:00,084 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.025) 0:01:57.916 **** 2025-11-26 12:20:00,113 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:00,119 p=31864 u=zuul n=ansible | TASK [openshift_login : Check if kubeconfig exists path={{ cifmw_openshift_login_kubeconfig }}] *** 2025-11-26 12:20:00,119 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.035) 0:01:57.953 **** 2025-11-26 12:20:00,119 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.035) 0:01:57.952 **** 2025-11-26 12:20:00,262 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:00,269 p=31864 u=zuul n=ansible | TASK [openshift_login : Assert that enough data is provided to log in to OpenShift that=cifmw_openshift_login_kubeconfig_stat.stat.exists or (cifmw_openshift_login_provided_token is defined and cifmw_openshift_login_provided_token != '') or ( (cifmw_openshift_login_user is defined) and (cifmw_openshift_login_password is defined) and (cifmw_openshift_login_api is defined) ), msg=If an existing kubeconfig is not provided user/pwd or provided/initial token and API URL must be given] *** 2025-11-26 12:20:00,270 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.150) 0:01:58.103 **** 2025-11-26 12:20:00,270 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.150) 0:01:58.102 **** 2025-11-26 12:20:00,292 p=31864 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2025-11-26 12:20:00,299 p=31864 u=zuul n=ansible | TASK [openshift_login : Fetch kubeconfig content src={{ cifmw_openshift_login_kubeconfig }}] *** 2025-11-26 12:20:00,299 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.029) 0:01:58.133 **** 2025-11-26 12:20:00,299 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.029) 0:01:58.132 **** 2025-11-26 12:20:00,316 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:00,323 p=31864 u=zuul n=ansible | TASK [openshift_login : Fetch x509 key based users cifmw_openshift_login_key_based_users={{ ( cifmw_openshift_login_kubeconfig_content_b64.content | b64decode | from_yaml ). users | default([]) | selectattr('user.client-certificate-data', 'defined') | map(attribute="name") | map("split", "/") | map("first") }}, cacheable=True] *** 2025-11-26 12:20:00,323 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.024) 0:01:58.157 **** 2025-11-26 12:20:00,324 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.024) 0:01:58.156 **** 2025-11-26 12:20:00,340 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:00,348 p=31864 u=zuul n=ansible | TASK [openshift_login : Assign key based user if not provided and available cifmw_openshift_login_user={{ (cifmw_openshift_login_assume_cert_system_user | ternary('system:', '')) + (cifmw_openshift_login_key_based_users | map('replace', 'system:', '') | unique | first) }}, cifmw_openshift_login_cert_login=True, cacheable=True] *** 2025-11-26 12:20:00,348 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.024) 0:01:58.182 **** 2025-11-26 12:20:00,348 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.024) 0:01:58.181 **** 2025-11-26 12:20:00,365 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:00,374 p=31864 u=zuul n=ansible | TASK [openshift_login : Set the retry count cifmw_openshift_login_retries_cnt={{ 0 if cifmw_openshift_login_retries_cnt is undefined else cifmw_openshift_login_retries_cnt|int + 1 }}] *** 2025-11-26 12:20:00,374 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.025) 0:01:58.208 **** 2025-11-26 12:20:00,374 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.025) 0:01:58.206 **** 2025-11-26 12:20:00,394 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:00,402 p=31864 u=zuul n=ansible | TASK [openshift_login : Fetch token _raw_params=try_login.yml] ***************** 2025-11-26 12:20:00,402 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.027) 0:01:58.236 **** 2025-11-26 12:20:00,402 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.027) 0:01:58.234 **** 2025-11-26 12:20:00,423 p=31864 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/try_login.yml for localhost 2025-11-26 12:20:00,433 p=31864 u=zuul n=ansible | TASK [openshift_login : Try get OpenShift access token _raw_params=oc whoami -t] *** 2025-11-26 12:20:00,433 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.031) 0:01:58.267 **** 2025-11-26 12:20:00,433 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.031) 0:01:58.266 **** 2025-11-26 12:20:00,447 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:00,454 p=31864 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift token output_dir={{ cifmw_openshift_login_basedir }}/artifacts, script=oc login {%- if cifmw_openshift_login_provided_token is not defined %} {%- if cifmw_openshift_login_user is defined %} -u {{ cifmw_openshift_login_user }} {%- endif %} {%- if cifmw_openshift_login_password is defined %} -p {{ cifmw_openshift_login_password }} {%- endif %} {% else %} --token={{ cifmw_openshift_login_provided_token }} {%- endif %} {%- if cifmw_openshift_login_skip_tls_verify|bool %} --insecure-skip-tls-verify=true {%- endif %} {%- if cifmw_openshift_login_api is defined %} {{ cifmw_openshift_login_api }} {%- endif %}] *** 2025-11-26 12:20:00,454 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.021) 0:01:58.288 **** 2025-11-26 12:20:00,454 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.021) 0:01:58.287 **** 2025-11-26 12:20:00,497 p=31864 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_001_fetch_openshift.log 2025-11-26 12:20:00,761 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:20:00,768 p=31864 u=zuul n=ansible | TASK [openshift_login : Ensure kubeconfig is provided that=cifmw_openshift_login_kubeconfig != ""] *** 2025-11-26 12:20:00,768 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.313) 0:01:58.602 **** 2025-11-26 12:20:00,768 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.313) 0:01:58.600 **** 2025-11-26 12:20:00,785 p=31864 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2025-11-26 12:20:00,793 p=31864 u=zuul n=ansible | TASK [openshift_login : Fetch new OpenShift access token _raw_params=oc whoami -t] *** 2025-11-26 12:20:00,793 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.024) 0:01:58.627 **** 2025-11-26 12:20:00,793 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:00 +0000 (0:00:00.024) 0:01:58.625 **** 2025-11-26 12:20:01,027 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:20:01,035 p=31864 u=zuul n=ansible | TASK [openshift_login : Set new OpenShift token cifmw_openshift_login_token={{ (not cifmw_openshift_login_new_token_out.skipped | default(false)) | ternary(cifmw_openshift_login_new_token_out.stdout, cifmw_openshift_login_whoami_out.stdout) }}, cacheable=True] *** 2025-11-26 12:20:01,035 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:01 +0000 (0:00:00.242) 0:01:58.869 **** 2025-11-26 12:20:01,035 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:01 +0000 (0:00:00.242) 0:01:58.868 **** 2025-11-26 12:20:01,057 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:01,063 p=31864 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift API URL _raw_params=oc whoami --show-server=true] *** 2025-11-26 12:20:01,063 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:01 +0000 (0:00:00.028) 0:01:58.897 **** 2025-11-26 12:20:01,063 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:01 +0000 (0:00:00.028) 0:01:58.896 **** 2025-11-26 12:20:01,286 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:20:01,293 p=31864 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift kubeconfig context _raw_params=oc whoami -c] *** 2025-11-26 12:20:01,293 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:01 +0000 (0:00:00.229) 0:01:59.127 **** 2025-11-26 12:20:01,293 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:01 +0000 (0:00:00.230) 0:01:59.126 **** 2025-11-26 12:20:01,530 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:20:01,538 p=31864 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift current user _raw_params=oc whoami] **** 2025-11-26 12:20:01,538 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:01 +0000 (0:00:00.244) 0:01:59.372 **** 2025-11-26 12:20:01,538 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:01 +0000 (0:00:00.244) 0:01:59.370 **** 2025-11-26 12:20:01,783 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:20:01,791 p=31864 u=zuul n=ansible | TASK [openshift_login : Set OpenShift user, context and API facts cifmw_openshift_login_api={{ cifmw_openshift_login_api_out.stdout }}, cifmw_openshift_login_context={{ cifmw_openshift_login_context_out.stdout }}, cifmw_openshift_login_user={{ _oauth_user }}, cifmw_openshift_kubeconfig={{ cifmw_openshift_login_kubeconfig }}, cifmw_openshift_api={{ cifmw_openshift_login_api_out.stdout }}, cifmw_openshift_context={{ cifmw_openshift_login_context_out.stdout }}, cifmw_openshift_user={{ _oauth_user }}, cifmw_openshift_token={{ cifmw_openshift_login_token | default(omit) }}, cifmw_install_yamls_environment={{ ( cifmw_install_yamls_environment | combine({'KUBECONFIG': cifmw_openshift_login_kubeconfig}) ) if cifmw_install_yamls_environment is defined else omit }}, cacheable=True] *** 2025-11-26 12:20:01,791 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:01 +0000 (0:00:00.253) 0:01:59.625 **** 2025-11-26 12:20:01,791 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:01 +0000 (0:00:00.253) 0:01:59.624 **** 2025-11-26 12:20:01,820 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:01,827 p=31864 u=zuul n=ansible | TASK [openshift_login : Create the openshift_login parameters file dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/openshift-login-params.yml, content={{ cifmw_openshift_login_params_content | from_yaml | to_nice_yaml }}, mode=0600] *** 2025-11-26 12:20:01,827 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:01 +0000 (0:00:00.036) 0:01:59.661 **** 2025-11-26 12:20:01,827 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:01 +0000 (0:00:00.036) 0:01:59.660 **** 2025-11-26 12:20:02,157 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:20:02,164 p=31864 u=zuul n=ansible | TASK [openshift_login : Read the install yamls parameters file path={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml] *** 2025-11-26 12:20:02,164 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:02 +0000 (0:00:00.336) 0:01:59.998 **** 2025-11-26 12:20:02,164 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:02 +0000 (0:00:00.336) 0:01:59.996 **** 2025-11-26 12:20:02,415 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:02,422 p=31864 u=zuul n=ansible | TASK [openshift_login : Append the KUBECONFIG to the install yamls parameters content={{ cifmw_openshift_login_install_yamls_artifacts_slurp['content'] | b64decode | from_yaml | combine( { 'cifmw_install_yamls_environment': { 'KUBECONFIG': cifmw_openshift_login_kubeconfig } }, recursive=true) | to_nice_yaml }}, dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml, mode=0600] *** 2025-11-26 12:20:02,422 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:02 +0000 (0:00:00.258) 0:02:00.256 **** 2025-11-26 12:20:02,422 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:02 +0000 (0:00:00.258) 0:02:00.255 **** 2025-11-26 12:20:02,778 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:20:02,790 p=31864 u=zuul n=ansible | TASK [openshift_setup : Ensure output directory exists path={{ cifmw_openshift_setup_basedir }}/artifacts, state=directory, mode=0755] *** 2025-11-26 12:20:02,791 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:02 +0000 (0:00:00.368) 0:02:00.624 **** 2025-11-26 12:20:02,791 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:02 +0000 (0:00:00.368) 0:02:00.623 **** 2025-11-26 12:20:02,951 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:02,958 p=31864 u=zuul n=ansible | TASK [openshift_setup : Fetch namespaces to create cifmw_openshift_setup_namespaces={{ (( ([cifmw_install_yamls_defaults['NAMESPACE']] + ([cifmw_install_yamls_defaults['OPERATOR_NAMESPACE']] if 'OPERATOR_NAMESPACE' is in cifmw_install_yamls_defaults else []) ) if cifmw_install_yamls_defaults is defined else [] ) + cifmw_openshift_setup_create_namespaces) | unique }}] *** 2025-11-26 12:20:02,958 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:02 +0000 (0:00:00.167) 0:02:00.792 **** 2025-11-26 12:20:02,959 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:02 +0000 (0:00:00.167) 0:02:00.791 **** 2025-11-26 12:20:02,980 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:02,991 p=31864 u=zuul n=ansible | TASK [openshift_setup : Create required namespaces kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ item }}, kind=Namespace, state=present] *** 2025-11-26 12:20:02,991 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:02 +0000 (0:00:00.032) 0:02:00.825 **** 2025-11-26 12:20:02,991 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:02 +0000 (0:00:00.032) 0:02:00.823 **** 2025-11-26 12:20:03,758 p=31864 u=zuul n=ansible | changed: [localhost] => (item=openstack) 2025-11-26 12:20:04,342 p=31864 u=zuul n=ansible | changed: [localhost] => (item=openstack-operators) 2025-11-26 12:20:04,352 p=31864 u=zuul n=ansible | TASK [openshift_setup : Get internal OpenShift registry route kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Route, name=default-route, namespace=openshift-image-registry] *** 2025-11-26 12:20:04,353 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:04 +0000 (0:00:01.361) 0:02:02.186 **** 2025-11-26 12:20:04,353 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:04 +0000 (0:00:01.361) 0:02:02.185 **** 2025-11-26 12:20:04,365 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:04,373 p=31864 u=zuul n=ansible | TASK [openshift_setup : Allow anonymous image-pulls in CRC registry for targeted namespaces state=present, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'kind': 'RoleBinding', 'apiVersion': 'rbac.authorization.k8s.io/v1', 'metadata': {'name': 'system:image-puller', 'namespace': '{{ item }}'}, 'subjects': [{'kind': 'User', 'name': 'system:anonymous'}, {'kind': 'User', 'name': 'system:unauthenticated'}], 'roleRef': {'kind': 'ClusterRole', 'name': 'system:image-puller'}}] *** 2025-11-26 12:20:04,373 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:04 +0000 (0:00:00.020) 0:02:02.207 **** 2025-11-26 12:20:04,373 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:04 +0000 (0:00:00.020) 0:02:02.206 **** 2025-11-26 12:20:04,391 p=31864 u=zuul n=ansible | skipping: [localhost] => (item=openstack) 2025-11-26 12:20:04,392 p=31864 u=zuul n=ansible | skipping: [localhost] => (item=openstack-operators) 2025-11-26 12:20:04,393 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:04,400 p=31864 u=zuul n=ansible | TASK [openshift_setup : Wait for the image registry to be ready kind=Deployment, name=image-registry, namespace=openshift-image-registry, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, wait=True, wait_sleep=10, wait_timeout=600, wait_condition={'type': 'Available', 'status': 'True'}] *** 2025-11-26 12:20:04,400 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:04 +0000 (0:00:00.026) 0:02:02.234 **** 2025-11-26 12:20:04,400 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:04 +0000 (0:00:00.026) 0:02:02.232 **** 2025-11-26 12:20:04,418 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:04,425 p=31864 u=zuul n=ansible | TASK [openshift_setup : Login into OpenShift internal registry output_dir={{ cifmw_openshift_setup_basedir }}/artifacts, script=podman login -u {{ cifmw_openshift_user }} -p {{ cifmw_openshift_token }} {%- if cifmw_openshift_setup_skip_internal_registry_tls_verify|bool %} --tls-verify=false {%- endif %} {{ cifmw_openshift_setup_registry_default_route.resources[0].spec.host }}] *** 2025-11-26 12:20:04,425 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:04 +0000 (0:00:00.025) 0:02:02.259 **** 2025-11-26 12:20:04,425 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:04 +0000 (0:00:00.025) 0:02:02.258 **** 2025-11-26 12:20:04,442 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:04,449 p=31864 u=zuul n=ansible | TASK [Ensure we have custom CA installed on host role=install_ca] ************** 2025-11-26 12:20:04,449 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:04 +0000 (0:00:00.024) 0:02:02.283 **** 2025-11-26 12:20:04,449 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:04 +0000 (0:00:00.024) 0:02:02.282 **** 2025-11-26 12:20:04,466 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:04,472 p=31864 u=zuul n=ansible | TASK [openshift_setup : Update ca bundle _raw_params=update-ca-trust extract] *** 2025-11-26 12:20:04,472 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:04 +0000 (0:00:00.023) 0:02:02.306 **** 2025-11-26 12:20:04,472 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:04 +0000 (0:00:00.023) 0:02:02.305 **** 2025-11-26 12:20:04,489 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:04,495 p=31864 u=zuul n=ansible | TASK [openshift_setup : Slurp CAs file src={{ cifmw_openshift_setup_ca_bundle_path }}] *** 2025-11-26 12:20:04,495 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:04 +0000 (0:00:00.022) 0:02:02.329 **** 2025-11-26 12:20:04,495 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:04 +0000 (0:00:00.022) 0:02:02.328 **** 2025-11-26 12:20:04,512 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:04,519 p=31864 u=zuul n=ansible | TASK [openshift_setup : Create config map with registry CAs kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'apiVersion': 'v1', 'kind': 'ConfigMap', 'metadata': {'namespace': 'openshift-config', 'name': 'registry-cas'}, 'data': '{{ _config_map_data | items2dict }}'}] *** 2025-11-26 12:20:04,519 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:04 +0000 (0:00:00.023) 0:02:02.353 **** 2025-11-26 12:20:04,519 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:04 +0000 (0:00:00.023) 0:02:02.352 **** 2025-11-26 12:20:04,536 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:04,543 p=31864 u=zuul n=ansible | TASK [openshift_setup : Install Red Hat CA for pulling images from internal registry kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, merge_type=merge, definition={'apiVersion': 'config.openshift.io/v1', 'kind': 'Image', 'metadata': {'name': 'cluster'}, 'spec': {'additionalTrustedCA': {'name': 'registry-cas'}}}] *** 2025-11-26 12:20:04,543 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:04 +0000 (0:00:00.023) 0:02:02.377 **** 2025-11-26 12:20:04,543 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:04 +0000 (0:00:00.023) 0:02:02.376 **** 2025-11-26 12:20:04,559 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:04,567 p=31864 u=zuul n=ansible | TASK [openshift_setup : Add insecure registry kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, merge_type=merge, definition={'apiVersion': 'config.openshift.io/v1', 'kind': 'Image', 'metadata': {'name': 'cluster'}, 'spec': {'registrySources': {'insecureRegistries': ['{{ cifmw_update_containers_registry }}'], 'allowedRegistries': '{{ all_registries }}'}}}] *** 2025-11-26 12:20:04,567 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:04 +0000 (0:00:00.023) 0:02:02.401 **** 2025-11-26 12:20:04,567 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:04 +0000 (0:00:00.023) 0:02:02.399 **** 2025-11-26 12:20:04,583 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:04,590 p=31864 u=zuul n=ansible | TASK [openshift_setup : Create a ICSP with repository digest mirrors kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'apiVersion': 'operator.openshift.io/v1alpha1', 'kind': 'ImageContentSourcePolicy', 'metadata': {'name': 'registry-digest-mirrors'}, 'spec': {'repositoryDigestMirrors': '{{ cifmw_openshift_setup_digest_mirrors }}'}}] *** 2025-11-26 12:20:04,590 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:04 +0000 (0:00:00.023) 0:02:02.424 **** 2025-11-26 12:20:04,591 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:04 +0000 (0:00:00.023) 0:02:02.423 **** 2025-11-26 12:20:04,612 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:04,618 p=31864 u=zuul n=ansible | TASK [openshift_setup : Gather network.operator info kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, api_version=operator.openshift.io/v1, kind=Network, name=cluster] *** 2025-11-26 12:20:04,618 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:04 +0000 (0:00:00.027) 0:02:02.452 **** 2025-11-26 12:20:04,618 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:04 +0000 (0:00:00.027) 0:02:02.451 **** 2025-11-26 12:20:05,351 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:05,362 p=31864 u=zuul n=ansible | TASK [openshift_setup : Patch network operator api_version=operator.openshift.io/v1, kubeconfig={{ cifmw_openshift_kubeconfig }}, kind=Network, name=cluster, persist_config=True, patch=[{'path': '/spec/defaultNetwork/ovnKubernetesConfig/gatewayConfig/routingViaHost', 'value': True, 'op': 'replace'}, {'path': '/spec/defaultNetwork/ovnKubernetesConfig/gatewayConfig/ipForwarding', 'value': 'Global', 'op': 'replace'}]] *** 2025-11-26 12:20:05,362 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:05 +0000 (0:00:00.743) 0:02:03.196 **** 2025-11-26 12:20:05,362 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:05 +0000 (0:00:00.743) 0:02:03.195 **** 2025-11-26 12:20:06,092 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:20:06,100 p=31864 u=zuul n=ansible | TASK [openshift_setup : Patch samples registry configuration kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, api_version=samples.operator.openshift.io/v1, kind=Config, name=cluster, patch=[{'op': 'replace', 'path': '/spec/samplesRegistry', 'value': 'registry.redhat.io'}]] *** 2025-11-26 12:20:06,100 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:06 +0000 (0:00:00.737) 0:02:03.934 **** 2025-11-26 12:20:06,100 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:06 +0000 (0:00:00.737) 0:02:03.932 **** 2025-11-26 12:20:06,680 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:20:06,688 p=31864 u=zuul n=ansible | TASK [openshift_setup : Delete the pods from openshift-marketplace namespace kind=Pod, state=absent, delete_all=True, kubeconfig={{ cifmw_openshift_kubeconfig }}, namespace=openshift-marketplace] *** 2025-11-26 12:20:06,688 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:06 +0000 (0:00:00.587) 0:02:04.522 **** 2025-11-26 12:20:06,688 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:06 +0000 (0:00:00.587) 0:02:04.520 **** 2025-11-26 12:20:06,701 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:06,708 p=31864 u=zuul n=ansible | TASK [openshift_setup : Wait for openshift-marketplace pods to be running _raw_params=oc wait pod --all --for=condition=Ready -n openshift-marketplace --timeout=1m] *** 2025-11-26 12:20:06,708 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:06 +0000 (0:00:00.020) 0:02:04.542 **** 2025-11-26 12:20:06,708 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:06 +0000 (0:00:00.020) 0:02:04.541 **** 2025-11-26 12:20:06,723 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:06,735 p=31864 u=zuul n=ansible | TASK [Deploy Observability operator. name=openshift_obs] *********************** 2025-11-26 12:20:06,735 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:06 +0000 (0:00:00.026) 0:02:04.569 **** 2025-11-26 12:20:06,735 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:06 +0000 (0:00:00.026) 0:02:04.567 **** 2025-11-26 12:20:06,751 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:06,758 p=31864 u=zuul n=ansible | TASK [Deploy Metal3 BMHs name=deploy_bmh] ************************************** 2025-11-26 12:20:06,758 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:06 +0000 (0:00:00.023) 0:02:04.592 **** 2025-11-26 12:20:06,758 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:06 +0000 (0:00:00.023) 0:02:04.591 **** 2025-11-26 12:20:06,774 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:06,781 p=31864 u=zuul n=ansible | TASK [Install certmanager operator role name=cert_manager] ********************* 2025-11-26 12:20:06,781 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:06 +0000 (0:00:00.022) 0:02:04.615 **** 2025-11-26 12:20:06,781 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:06 +0000 (0:00:00.022) 0:02:04.614 **** 2025-11-26 12:20:06,856 p=31864 u=zuul n=ansible | TASK [cert_manager : Create role needed directories path={{ cifmw_cert_manager_manifests_dir }}, state=directory, mode=0755] *** 2025-11-26 12:20:06,856 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:06 +0000 (0:00:00.074) 0:02:04.690 **** 2025-11-26 12:20:06,856 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:06 +0000 (0:00:00.074) 0:02:04.688 **** 2025-11-26 12:20:07,012 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:20:07,019 p=31864 u=zuul n=ansible | TASK [cert_manager : Create the cifmw_cert_manager_operator_namespace namespace" kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ cifmw_cert_manager_operator_namespace }}, kind=Namespace, state=present] *** 2025-11-26 12:20:07,019 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:07 +0000 (0:00:00.163) 0:02:04.853 **** 2025-11-26 12:20:07,019 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:07 +0000 (0:00:00.163) 0:02:04.852 **** 2025-11-26 12:20:07,604 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:20:07,611 p=31864 u=zuul n=ansible | TASK [cert_manager : Install from Release Manifest _raw_params=release_manifest.yml] *** 2025-11-26 12:20:07,611 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:07 +0000 (0:00:00.591) 0:02:05.445 **** 2025-11-26 12:20:07,611 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:07 +0000 (0:00:00.591) 0:02:05.444 **** 2025-11-26 12:20:07,633 p=31864 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cert_manager/tasks/release_manifest.yml for localhost 2025-11-26 12:20:07,643 p=31864 u=zuul n=ansible | TASK [cert_manager : Download release manifests url={{ cifmw_cert_manager_release_manifest }}, dest={{ cifmw_cert_manager_manifests_dir }}/cert_manager_manifest.yml, mode=0664] *** 2025-11-26 12:20:07,643 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:07 +0000 (0:00:00.031) 0:02:05.477 **** 2025-11-26 12:20:07,643 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:07 +0000 (0:00:00.031) 0:02:05.475 **** 2025-11-26 12:20:08,246 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:20:08,253 p=31864 u=zuul n=ansible | TASK [cert_manager : Install cert-manager from release manifest kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cert_manager_manifests_dir }}/cert_manager_manifest.yml] *** 2025-11-26 12:20:08,253 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:08 +0000 (0:00:00.610) 0:02:06.087 **** 2025-11-26 12:20:08,253 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:08 +0000 (0:00:00.610) 0:02:06.086 **** 2025-11-26 12:20:10,345 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:20:10,370 p=31864 u=zuul n=ansible | TASK [cert_manager : Install from OLM Manifest _raw_params=olm_manifest.yml] *** 2025-11-26 12:20:10,370 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:10 +0000 (0:00:02.117) 0:02:08.204 **** 2025-11-26 12:20:10,371 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:10 +0000 (0:00:02.117) 0:02:08.203 **** 2025-11-26 12:20:10,384 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:10,392 p=31864 u=zuul n=ansible | TASK [cert_manager : Check for cert-manager namspeace existance kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name=cert-manager, kind=Namespace, field_selectors=['status.phase=Active']] *** 2025-11-26 12:20:10,392 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:10 +0000 (0:00:00.021) 0:02:08.226 **** 2025-11-26 12:20:10,392 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:10 +0000 (0:00:00.021) 0:02:08.225 **** 2025-11-26 12:20:10,962 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:10,969 p=31864 u=zuul n=ansible | TASK [cert_manager : Wait for cert-manager pods to be ready kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, namespace=cert-manager, kind=Pod, wait=True, wait_sleep=10, wait_timeout=600, wait_condition={'type': 'Ready', 'status': 'True'}, label_selectors=['app = {{ item }}']] *** 2025-11-26 12:20:10,969 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:10 +0000 (0:00:00.577) 0:02:08.803 **** 2025-11-26 12:20:10,970 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:10 +0000 (0:00:00.577) 0:02:08.802 **** 2025-11-26 12:20:21,584 p=31864 u=zuul n=ansible | ok: [localhost] => (item=cainjector) 2025-11-26 12:20:22,168 p=31864 u=zuul n=ansible | ok: [localhost] => (item=webhook) 2025-11-26 12:20:22,754 p=31864 u=zuul n=ansible | ok: [localhost] => (item=cert-manager) 2025-11-26 12:20:22,769 p=31864 u=zuul n=ansible | TASK [cert_manager : Create $HOME/bin dir path={{ ansible_user_dir }}/bin, state=directory, mode=0755] *** 2025-11-26 12:20:22,769 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:22 +0000 (0:00:11.799) 0:02:20.603 **** 2025-11-26 12:20:22,770 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:22 +0000 (0:00:11.799) 0:02:20.602 **** 2025-11-26 12:20:22,933 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:22,941 p=31864 u=zuul n=ansible | TASK [cert_manager : Install cert-manager cmctl CLI url=https://github.com/cert-manager/cmctl/releases/{{ cifmw_cert_manager_version }}/download/cmctl_{{ _os }}_{{ _arch }}, dest={{ ansible_user_dir }}/bin/cmctl, mode=0755] *** 2025-11-26 12:20:22,941 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:22 +0000 (0:00:00.171) 0:02:20.775 **** 2025-11-26 12:20:22,941 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:22 +0000 (0:00:00.171) 0:02:20.774 **** 2025-11-26 12:20:24,305 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:20:24,312 p=31864 u=zuul n=ansible | TASK [cert_manager : Verify cert_manager api _raw_params={{ ansible_user_dir }}/bin/cmctl check api --wait=2m] *** 2025-11-26 12:20:24,312 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:24 +0000 (0:00:01.371) 0:02:22.146 **** 2025-11-26 12:20:24,312 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:24 +0000 (0:00:01.371) 0:02:22.145 **** 2025-11-26 12:20:24,560 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:20:24,573 p=31864 u=zuul n=ansible | TASK [Configure hosts networking using nmstate name=ci_nmstate] **************** 2025-11-26 12:20:24,573 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:24 +0000 (0:00:00.261) 0:02:22.407 **** 2025-11-26 12:20:24,574 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:24 +0000 (0:00:00.261) 0:02:22.406 **** 2025-11-26 12:20:24,591 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:24,598 p=31864 u=zuul n=ansible | TASK [Configure multus networks name=ci_multus] ******************************** 2025-11-26 12:20:24,598 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:24 +0000 (0:00:00.024) 0:02:22.432 **** 2025-11-26 12:20:24,598 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:24 +0000 (0:00:00.024) 0:02:22.431 **** 2025-11-26 12:20:24,613 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:24,620 p=31864 u=zuul n=ansible | TASK [Deploy Sushy Emulator service pod name=sushy_emulator] ******************* 2025-11-26 12:20:24,620 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:24 +0000 (0:00:00.021) 0:02:22.454 **** 2025-11-26 12:20:24,620 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:24 +0000 (0:00:00.021) 0:02:22.453 **** 2025-11-26 12:20:24,634 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:24,642 p=31864 u=zuul n=ansible | TASK [Setup Libvirt on controller name=libvirt_manager] ************************ 2025-11-26 12:20:24,642 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:24 +0000 (0:00:00.021) 0:02:22.476 **** 2025-11-26 12:20:24,642 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:24 +0000 (0:00:00.021) 0:02:22.475 **** 2025-11-26 12:20:24,656 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:24,663 p=31864 u=zuul n=ansible | TASK [Prepare container package builder name=pkg_build] ************************ 2025-11-26 12:20:24,663 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:24 +0000 (0:00:00.021) 0:02:22.497 **** 2025-11-26 12:20:24,664 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:24 +0000 (0:00:00.021) 0:02:22.496 **** 2025-11-26 12:20:24,683 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:24,691 p=31864 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-11-26 12:20:24,691 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:24 +0000 (0:00:00.027) 0:02:22.525 **** 2025-11-26 12:20:24,691 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:24 +0000 (0:00:00.027) 0:02:22.523 **** 2025-11-26 12:20:24,738 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:24,746 p=31864 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-11-26 12:20:24,746 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:24 +0000 (0:00:00.055) 0:02:22.580 **** 2025-11-26 12:20:24,746 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:24 +0000 (0:00:00.055) 0:02:22.578 **** 2025-11-26 12:20:24,812 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:24,820 p=31864 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_infra _raw_params={{ hook.type }}.yml] *** 2025-11-26 12:20:24,820 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:24 +0000 (0:00:00.074) 0:02:22.654 **** 2025-11-26 12:20:24,820 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:24 +0000 (0:00:00.074) 0:02:22.653 **** 2025-11-26 12:20:24,906 p=31864 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Fetch nodes facts and save them as parameters', 'type': 'playbook', 'inventory': '/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml', 'source': 'fetch_compute_facts.yml'}) 2025-11-26 12:20:24,917 p=31864 u=zuul n=ansible | TASK [run_hook : Set playbook path for Fetch nodes facts and save them as parameters cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-11-26 12:20:24,917 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:24 +0000 (0:00:00.096) 0:02:22.751 **** 2025-11-26 12:20:24,917 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:24 +0000 (0:00:00.096) 0:02:22.750 **** 2025-11-26 12:20:24,956 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:24,962 p=31864 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-11-26 12:20:24,962 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:24 +0000 (0:00:00.045) 0:02:22.796 **** 2025-11-26 12:20:24,963 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:24 +0000 (0:00:00.045) 0:02:22.795 **** 2025-11-26 12:20:25,123 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:25,131 p=31864 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-11-26 12:20:25,131 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:25 +0000 (0:00:00.168) 0:02:22.965 **** 2025-11-26 12:20:25,131 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:25 +0000 (0:00:00.168) 0:02:22.963 **** 2025-11-26 12:20:25,143 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:25,151 p=31864 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-11-26 12:20:25,151 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:25 +0000 (0:00:00.019) 0:02:22.985 **** 2025-11-26 12:20:25,151 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:25 +0000 (0:00:00.019) 0:02:22.983 **** 2025-11-26 12:20:25,304 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:25,311 p=31864 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-11-26 12:20:25,312 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:25 +0000 (0:00:00.160) 0:02:23.145 **** 2025-11-26 12:20:25,312 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:25 +0000 (0:00:00.160) 0:02:23.144 **** 2025-11-26 12:20:25,327 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:25,335 p=31864 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-11-26 12:20:25,335 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:25 +0000 (0:00:00.023) 0:02:23.169 **** 2025-11-26 12:20:25,335 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:25 +0000 (0:00:00.023) 0:02:23.168 **** 2025-11-26 12:20:25,490 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:25,498 p=31864 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-11-26 12:20:25,499 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:25 +0000 (0:00:00.163) 0:02:23.333 **** 2025-11-26 12:20:25,499 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:25 +0000 (0:00:00.163) 0:02:23.331 **** 2025-11-26 12:20:25,655 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:25,664 p=31864 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Fetch nodes facts and save them as parameters] *** 2025-11-26 12:20:25,664 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:25 +0000 (0:00:00.165) 0:02:23.498 **** 2025-11-26 12:20:25,664 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:25 +0000 (0:00:00.165) 0:02:23.496 **** 2025-11-26 12:20:25,711 p=31864 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_002_run_hook_without_retry_fetch.log 2025-11-26 12:20:33,193 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:20:33,201 p=31864 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Fetch nodes facts and save them as parameters] *** 2025-11-26 12:20:33,201 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:33 +0000 (0:00:07.537) 0:02:31.035 **** 2025-11-26 12:20:33,201 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:33 +0000 (0:00:07.537) 0:02:31.034 **** 2025-11-26 12:20:33,217 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:33,224 p=31864 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-11-26 12:20:33,224 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:33 +0000 (0:00:00.023) 0:02:31.058 **** 2025-11-26 12:20:33,224 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:33 +0000 (0:00:00.023) 0:02:31.057 **** 2025-11-26 12:20:33,383 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:33,390 p=31864 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-11-26 12:20:33,390 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:33 +0000 (0:00:00.165) 0:02:31.224 **** 2025-11-26 12:20:33,390 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:33 +0000 (0:00:00.165) 0:02:31.223 **** 2025-11-26 12:20:33,408 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:33,426 p=31864 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-11-26 12:20:33,426 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:33 +0000 (0:00:00.035) 0:02:31.260 **** 2025-11-26 12:20:33,426 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:33 +0000 (0:00:00.035) 0:02:31.258 **** 2025-11-26 12:20:33,470 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:33,477 p=31864 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-11-26 12:20:33,477 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:33 +0000 (0:00:00.051) 0:02:31.311 **** 2025-11-26 12:20:33,477 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:33 +0000 (0:00:00.051) 0:02:31.310 **** 2025-11-26 12:20:33,544 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:33,552 p=31864 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_package_build _raw_params={{ hook.type }}.yml] *** 2025-11-26 12:20:33,553 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:33 +0000 (0:00:00.075) 0:02:31.386 **** 2025-11-26 12:20:33,553 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:33 +0000 (0:00:00.075) 0:02:31.385 **** 2025-11-26 12:20:33,621 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:33,633 p=31864 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-11-26 12:20:33,633 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:33 +0000 (0:00:00.080) 0:02:31.467 **** 2025-11-26 12:20:33,633 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:33 +0000 (0:00:00.080) 0:02:31.466 **** 2025-11-26 12:20:33,707 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:33,716 p=31864 u=zuul n=ansible | TASK [pkg_build : Generate volume list build_volumes={% for pkg in cifmw_pkg_build_list -%} - "{{ pkg.src|default(cifmw_pkg_build_pkg_basedir ~ '/' ~ pkg.name) }}:/root/src/{{ pkg.name }}:z" - "{{ cifmw_pkg_build_basedir }}/volumes/packages/{{ pkg.name }}:/root/{{ pkg.name }}:z" - "{{ cifmw_pkg_build_basedir }}/logs/build_{{ pkg.name }}:/root/logs:z" {% endfor -%} - "{{ cifmw_pkg_build_basedir }}/volumes/packages/gating_repo:/root/gating_repo:z" - "{{ cifmw_pkg_build_basedir }}/artifacts/repositories:/root/yum.repos.d:z,ro" - "{{ cifmw_pkg_build_basedir }}/artifacts/build-packages.yml:/root/playbook.yml:z,ro" ] *** 2025-11-26 12:20:33,716 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:33 +0000 (0:00:00.082) 0:02:31.550 **** 2025-11-26 12:20:33,716 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:33 +0000 (0:00:00.082) 0:02:31.548 **** 2025-11-26 12:20:33,736 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:33,743 p=31864 u=zuul n=ansible | TASK [pkg_build : Build package using container name={{ pkg.name }}-builder, auto_remove=True, detach=False, privileged=True, log_driver=k8s-file, log_level=info, log_opt={'path': '{{ cifmw_pkg_build_basedir }}/logs/{{ pkg.name }}-builder.log'}, image={{ cifmw_pkg_build_ctx_name }}, volume={{ build_volumes | from_yaml }}, security_opt=['label=disable', 'seccomp=unconfined', 'apparmor=unconfined'], env={'PROJECT': '{{ pkg.name }}'}, command=ansible-playbook -i localhost, -c local playbook.yml] *** 2025-11-26 12:20:33,743 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:33 +0000 (0:00:00.027) 0:02:31.577 **** 2025-11-26 12:20:33,743 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:33 +0000 (0:00:00.027) 0:02:31.576 **** 2025-11-26 12:20:33,756 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:33,768 p=31864 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-11-26 12:20:33,768 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:33 +0000 (0:00:00.024) 0:02:31.602 **** 2025-11-26 12:20:33,768 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:33 +0000 (0:00:00.024) 0:02:31.601 **** 2025-11-26 12:20:33,813 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:33,820 p=31864 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-11-26 12:20:33,820 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:33 +0000 (0:00:00.051) 0:02:31.654 **** 2025-11-26 12:20:33,820 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:33 +0000 (0:00:00.051) 0:02:31.653 **** 2025-11-26 12:20:33,912 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:33,920 p=31864 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_package_build _raw_params={{ hook.type }}.yml] *** 2025-11-26 12:20:33,921 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:33 +0000 (0:00:00.100) 0:02:31.754 **** 2025-11-26 12:20:33,921 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:33 +0000 (0:00:00.100) 0:02:31.753 **** 2025-11-26 12:20:33,986 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:34,004 p=31864 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-11-26 12:20:34,004 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.083) 0:02:31.838 **** 2025-11-26 12:20:34,004 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.083) 0:02:31.837 **** 2025-11-26 12:20:34,050 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:34,057 p=31864 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-11-26 12:20:34,058 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.053) 0:02:31.891 **** 2025-11-26 12:20:34,058 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.053) 0:02:31.890 **** 2025-11-26 12:20:34,160 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:34,168 p=31864 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_container_build _raw_params={{ hook.type }}.yml] *** 2025-11-26 12:20:34,168 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.110) 0:02:32.002 **** 2025-11-26 12:20:34,168 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.110) 0:02:32.000 **** 2025-11-26 12:20:34,270 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:34,282 p=31864 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-11-26 12:20:34,282 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.114) 0:02:32.116 **** 2025-11-26 12:20:34,282 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.114) 0:02:32.115 **** 2025-11-26 12:20:34,355 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:34,363 p=31864 u=zuul n=ansible | TASK [cifmw_setup : Nothing to do yet msg=No support for that step yet] ******** 2025-11-26 12:20:34,363 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.081) 0:02:32.197 **** 2025-11-26 12:20:34,363 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.081) 0:02:32.196 **** 2025-11-26 12:20:34,377 p=31864 u=zuul n=ansible | ok: [localhost] => msg: No support for that step yet 2025-11-26 12:20:34,384 p=31864 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-11-26 12:20:34,385 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.021) 0:02:32.218 **** 2025-11-26 12:20:34,385 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.021) 0:02:32.217 **** 2025-11-26 12:20:34,462 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:34,468 p=31864 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-11-26 12:20:34,468 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.083) 0:02:32.302 **** 2025-11-26 12:20:34,468 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.083) 0:02:32.301 **** 2025-11-26 12:20:34,536 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:34,544 p=31864 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_container_build _raw_params={{ hook.type }}.yml] *** 2025-11-26 12:20:34,544 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.076) 0:02:32.378 **** 2025-11-26 12:20:34,545 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.076) 0:02:32.377 **** 2025-11-26 12:20:34,611 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:34,628 p=31864 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-11-26 12:20:34,628 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.083) 0:02:32.462 **** 2025-11-26 12:20:34,628 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.083) 0:02:32.461 **** 2025-11-26 12:20:34,675 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:34,682 p=31864 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-11-26 12:20:34,682 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.054) 0:02:32.516 **** 2025-11-26 12:20:34,682 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.054) 0:02:32.515 **** 2025-11-26 12:20:34,752 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:34,759 p=31864 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_operator_build _raw_params={{ hook.type }}.yml] *** 2025-11-26 12:20:34,759 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.076) 0:02:32.593 **** 2025-11-26 12:20:34,759 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.076) 0:02:32.592 **** 2025-11-26 12:20:34,824 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:34,836 p=31864 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-11-26 12:20:34,836 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.077) 0:02:32.670 **** 2025-11-26 12:20:34,836 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.077) 0:02:32.669 **** 2025-11-26 12:20:34,878 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:34,887 p=31864 u=zuul n=ansible | TASK [operator_build : Ensure mandatory directories exist path={{ cifmw_operator_build_basedir }}/{{ item }}, state=directory, mode=0755] *** 2025-11-26 12:20:34,887 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.050) 0:02:32.721 **** 2025-11-26 12:20:34,887 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.050) 0:02:32.719 **** 2025-11-26 12:20:34,909 p=31864 u=zuul n=ansible | skipping: [localhost] => (item=artifacts) 2025-11-26 12:20:34,914 p=31864 u=zuul n=ansible | skipping: [localhost] => (item=logs) 2025-11-26 12:20:34,915 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:34,923 p=31864 u=zuul n=ansible | TASK [operator_build : Initialize role output cifmw_operator_build_output={{ cifmw_operator_build_output }}, cifmw_operator_build_meta_name={{ cifmw_operator_build_meta_name }}] *** 2025-11-26 12:20:34,923 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.036) 0:02:32.757 **** 2025-11-26 12:20:34,923 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.036) 0:02:32.755 **** 2025-11-26 12:20:34,942 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:34,949 p=31864 u=zuul n=ansible | TASK [operator_build : Populate operators list with zuul info _raw_params=zuul_info.yml] *** 2025-11-26 12:20:34,950 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.026) 0:02:32.783 **** 2025-11-26 12:20:34,950 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.026) 0:02:32.782 **** 2025-11-26 12:20:34,971 p=31864 u=zuul n=ansible | skipping: [localhost] => (item={'branch': 'main', 'change': '373', 'change_url': 'https://github.com/openstack-k8s-operators/test-operator/pull/373', 'commit_id': '68b77c48042be317ac8e0bb694f24ff66dc1b517', 'patchset': '68b77c48042be317ac8e0bb694f24ff66dc1b517', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/test-operator', 'name': 'openstack-k8s-operators/test-operator', 'short_name': 'test-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/test-operator'}, 'topic': None}) 2025-11-26 12:20:34,972 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:34,979 p=31864 u=zuul n=ansible | TASK [operator_build : Merge lists of operators operators_list={{ [cifmw_operator_build_operators, zuul_info_operators | default([])] | community.general.lists_mergeby('name') }}] *** 2025-11-26 12:20:34,979 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.029) 0:02:32.813 **** 2025-11-26 12:20:34,979 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:34 +0000 (0:00:00.029) 0:02:32.812 **** 2025-11-26 12:20:35,001 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:35,010 p=31864 u=zuul n=ansible | TASK [operator_build : Get meta_operator src dir from operators_list cifmw_operator_build_meta_src={{ (operators_list | selectattr('name', 'eq', cifmw_operator_build_meta_name) | map(attribute='src') | first ) | default(cifmw_operator_build_meta_src, true) }}] *** 2025-11-26 12:20:35,010 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.030) 0:02:32.844 **** 2025-11-26 12:20:35,010 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.030) 0:02:32.842 **** 2025-11-26 12:20:35,030 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:35,037 p=31864 u=zuul n=ansible | TASK [operator_build : Adds meta-operator to the list operators_list={{ [operators_list, meta_operator_info] | community.general.lists_mergeby('name') }}] *** 2025-11-26 12:20:35,037 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.027) 0:02:32.871 **** 2025-11-26 12:20:35,037 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.027) 0:02:32.870 **** 2025-11-26 12:20:35,057 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:35,064 p=31864 u=zuul n=ansible | TASK [operator_build : Clone operator's code when src dir is empty _raw_params=clone.yml] *** 2025-11-26 12:20:35,064 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.027) 0:02:32.898 **** 2025-11-26 12:20:35,064 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.027) 0:02:32.897 **** 2025-11-26 12:20:35,084 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:35,092 p=31864 u=zuul n=ansible | TASK [operator_build : Building operators _raw_params=build.yml] *************** 2025-11-26 12:20:35,092 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.027) 0:02:32.926 **** 2025-11-26 12:20:35,092 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.027) 0:02:32.925 **** 2025-11-26 12:20:35,112 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:35,119 p=31864 u=zuul n=ansible | TASK [operator_build : Building meta operator _raw_params=build.yml] *********** 2025-11-26 12:20:35,119 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.027) 0:02:32.953 **** 2025-11-26 12:20:35,119 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.027) 0:02:32.952 **** 2025-11-26 12:20:35,139 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:35,147 p=31864 u=zuul n=ansible | TASK [operator_build : Gather role output dest={{ cifmw_operator_build_basedir }}/artifacts/custom-operators.yml, content={{ cifmw_operator_build_output | to_nice_yaml }}, mode=0644] *** 2025-11-26 12:20:35,147 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.027) 0:02:32.981 **** 2025-11-26 12:20:35,147 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.027) 0:02:32.980 **** 2025-11-26 12:20:35,166 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:35,179 p=31864 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-11-26 12:20:35,179 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.031) 0:02:33.013 **** 2025-11-26 12:20:35,179 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.031) 0:02:33.011 **** 2025-11-26 12:20:35,224 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:35,231 p=31864 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-11-26 12:20:35,231 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.052) 0:02:33.065 **** 2025-11-26 12:20:35,232 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.052) 0:02:33.064 **** 2025-11-26 12:20:35,300 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:35,307 p=31864 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_operator_build _raw_params={{ hook.type }}.yml] *** 2025-11-26 12:20:35,307 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.075) 0:02:33.141 **** 2025-11-26 12:20:35,308 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.075) 0:02:33.140 **** 2025-11-26 12:20:35,373 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:35,390 p=31864 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-11-26 12:20:35,390 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.082) 0:02:33.224 **** 2025-11-26 12:20:35,390 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.082) 0:02:33.223 **** 2025-11-26 12:20:35,437 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:35,444 p=31864 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-11-26 12:20:35,444 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.053) 0:02:33.278 **** 2025-11-26 12:20:35,444 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.053) 0:02:33.277 **** 2025-11-26 12:20:35,515 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:35,523 p=31864 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_deploy _raw_params={{ hook.type }}.yml] *** 2025-11-26 12:20:35,523 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.079) 0:02:33.357 **** 2025-11-26 12:20:35,523 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.079) 0:02:33.356 **** 2025-11-26 12:20:35,617 p=31864 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': '61 HCI pre deploy kustomizations', 'source': 'control_plane_hci_pre_deploy.yml', 'type': 'playbook'}) 2025-11-26 12:20:35,625 p=31864 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': '80 Kustomize OpenStack CR', 'source': 'control_plane_horizon.yml', 'type': 'playbook'}) 2025-11-26 12:20:35,635 p=31864 u=zuul n=ansible | TASK [run_hook : Set playbook path for 61 HCI pre deploy kustomizations cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-11-26 12:20:35,635 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.112) 0:02:33.469 **** 2025-11-26 12:20:35,635 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.112) 0:02:33.468 **** 2025-11-26 12:20:35,676 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:35,682 p=31864 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-11-26 12:20:35,683 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.047) 0:02:33.516 **** 2025-11-26 12:20:35,683 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.047) 0:02:33.515 **** 2025-11-26 12:20:35,851 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:35,859 p=31864 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-11-26 12:20:35,859 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.176) 0:02:33.693 **** 2025-11-26 12:20:35,859 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.176) 0:02:33.692 **** 2025-11-26 12:20:35,878 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:35,886 p=31864 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-11-26 12:20:35,886 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.027) 0:02:33.720 **** 2025-11-26 12:20:35,887 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:35 +0000 (0:00:00.027) 0:02:33.719 **** 2025-11-26 12:20:36,043 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:36,053 p=31864 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-11-26 12:20:36,053 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:36 +0000 (0:00:00.166) 0:02:33.887 **** 2025-11-26 12:20:36,053 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:36 +0000 (0:00:00.166) 0:02:33.886 **** 2025-11-26 12:20:36,075 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:36,082 p=31864 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-11-26 12:20:36,082 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:36 +0000 (0:00:00.029) 0:02:33.916 **** 2025-11-26 12:20:36,082 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:36 +0000 (0:00:00.029) 0:02:33.915 **** 2025-11-26 12:20:36,242 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:36,249 p=31864 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-11-26 12:20:36,249 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:36 +0000 (0:00:00.166) 0:02:34.083 **** 2025-11-26 12:20:36,249 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:36 +0000 (0:00:00.166) 0:02:34.082 **** 2025-11-26 12:20:36,411 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:36,420 p=31864 u=zuul n=ansible | TASK [run_hook : Run hook without retry - 61 HCI pre deploy kustomizations] **** 2025-11-26 12:20:36,420 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:36 +0000 (0:00:00.170) 0:02:34.254 **** 2025-11-26 12:20:36,420 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:36 +0000 (0:00:00.170) 0:02:34.252 **** 2025-11-26 12:20:36,467 p=31864 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_003_run_hook_without_retry_61_hci.log 2025-11-26 12:20:37,930 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:20:37,938 p=31864 u=zuul n=ansible | TASK [run_hook : Run hook with retry - 61 HCI pre deploy kustomizations] ******* 2025-11-26 12:20:37,938 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:37 +0000 (0:00:01.518) 0:02:35.772 **** 2025-11-26 12:20:37,938 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:37 +0000 (0:00:01.518) 0:02:35.771 **** 2025-11-26 12:20:37,958 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:37,966 p=31864 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-11-26 12:20:37,966 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:37 +0000 (0:00:00.027) 0:02:35.800 **** 2025-11-26 12:20:37,966 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:37 +0000 (0:00:00.027) 0:02:35.798 **** 2025-11-26 12:20:38,113 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:38,120 p=31864 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-11-26 12:20:38,120 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:38 +0000 (0:00:00.154) 0:02:35.954 **** 2025-11-26 12:20:38,120 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:38 +0000 (0:00:00.154) 0:02:35.953 **** 2025-11-26 12:20:38,139 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:38,146 p=31864 u=zuul n=ansible | TASK [run_hook : Set playbook path for 80 Kustomize OpenStack CR cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-11-26 12:20:38,147 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:38 +0000 (0:00:00.026) 0:02:35.980 **** 2025-11-26 12:20:38,147 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:38 +0000 (0:00:00.026) 0:02:35.979 **** 2025-11-26 12:20:38,186 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:38,194 p=31864 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-11-26 12:20:38,194 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:38 +0000 (0:00:00.047) 0:02:36.028 **** 2025-11-26 12:20:38,194 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:38 +0000 (0:00:00.047) 0:02:36.027 **** 2025-11-26 12:20:38,361 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:38,368 p=31864 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-11-26 12:20:38,368 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:38 +0000 (0:00:00.173) 0:02:36.202 **** 2025-11-26 12:20:38,368 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:38 +0000 (0:00:00.173) 0:02:36.200 **** 2025-11-26 12:20:38,386 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:38,394 p=31864 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-11-26 12:20:38,394 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:38 +0000 (0:00:00.026) 0:02:36.228 **** 2025-11-26 12:20:38,394 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:38 +0000 (0:00:00.026) 0:02:36.227 **** 2025-11-26 12:20:38,552 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:38,560 p=31864 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-11-26 12:20:38,560 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:38 +0000 (0:00:00.165) 0:02:36.394 **** 2025-11-26 12:20:38,560 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:38 +0000 (0:00:00.165) 0:02:36.392 **** 2025-11-26 12:20:38,581 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:38,589 p=31864 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-11-26 12:20:38,589 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:38 +0000 (0:00:00.028) 0:02:36.423 **** 2025-11-26 12:20:38,589 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:38 +0000 (0:00:00.028) 0:02:36.421 **** 2025-11-26 12:20:38,746 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:38,753 p=31864 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-11-26 12:20:38,753 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:38 +0000 (0:00:00.164) 0:02:36.587 **** 2025-11-26 12:20:38,753 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:38 +0000 (0:00:00.164) 0:02:36.586 **** 2025-11-26 12:20:38,913 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:38,921 p=31864 u=zuul n=ansible | TASK [run_hook : Run hook without retry - 80 Kustomize OpenStack CR] *********** 2025-11-26 12:20:38,921 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:38 +0000 (0:00:00.167) 0:02:36.755 **** 2025-11-26 12:20:38,921 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:38 +0000 (0:00:00.167) 0:02:36.754 **** 2025-11-26 12:20:38,968 p=31864 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_004_run_hook_without_retry_80.log 2025-11-26 12:20:40,380 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:20:40,389 p=31864 u=zuul n=ansible | TASK [run_hook : Run hook with retry - 80 Kustomize OpenStack CR] ************** 2025-11-26 12:20:40,389 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:40 +0000 (0:00:01.467) 0:02:38.223 **** 2025-11-26 12:20:40,389 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:40 +0000 (0:00:01.467) 0:02:38.221 **** 2025-11-26 12:20:40,410 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:40,417 p=31864 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-11-26 12:20:40,417 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:40 +0000 (0:00:00.028) 0:02:38.251 **** 2025-11-26 12:20:40,417 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:40 +0000 (0:00:00.028) 0:02:38.250 **** 2025-11-26 12:20:40,570 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:40,578 p=31864 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-11-26 12:20:40,578 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:40 +0000 (0:00:00.160) 0:02:38.412 **** 2025-11-26 12:20:40,578 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:40 +0000 (0:00:00.160) 0:02:38.411 **** 2025-11-26 12:20:40,596 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:40,609 p=31864 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-11-26 12:20:40,609 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:40 +0000 (0:00:00.030) 0:02:38.443 **** 2025-11-26 12:20:40,609 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:40 +0000 (0:00:00.030) 0:02:38.442 **** 2025-11-26 12:20:40,655 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:40,663 p=31864 u=zuul n=ansible | TASK [Configure Storage Class name=ci_local_storage] *************************** 2025-11-26 12:20:40,663 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:40 +0000 (0:00:00.053) 0:02:38.497 **** 2025-11-26 12:20:40,663 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:40 +0000 (0:00:00.053) 0:02:38.495 **** 2025-11-26 12:20:40,754 p=31864 u=zuul n=ansible | TASK [ci_local_storage : Create role needed directories path={{ cifmw_cls_manifests_dir }}, state=directory, mode=0755] *** 2025-11-26 12:20:40,754 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:40 +0000 (0:00:00.090) 0:02:38.588 **** 2025-11-26 12:20:40,754 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:40 +0000 (0:00:00.090) 0:02:38.586 **** 2025-11-26 12:20:40,926 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:20:40,934 p=31864 u=zuul n=ansible | TASK [ci_local_storage : Create the cifmw_cls_namespace namespace" kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ cifmw_cls_namespace }}, kind=Namespace, state=present] *** 2025-11-26 12:20:40,934 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:40 +0000 (0:00:00.180) 0:02:38.768 **** 2025-11-26 12:20:40,934 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:40 +0000 (0:00:00.180) 0:02:38.767 **** 2025-11-26 12:20:41,536 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:41,543 p=31864 u=zuul n=ansible | TASK [ci_local_storage : Save storage manifests as artifacts dest={{ cifmw_cls_manifests_dir }}/storage-class.yaml, content={{ cifmw_cls_storage_manifest | to_nice_yaml }}, mode=0644] *** 2025-11-26 12:20:41,543 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:41 +0000 (0:00:00.608) 0:02:39.377 **** 2025-11-26 12:20:41,543 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:41 +0000 (0:00:00.608) 0:02:39.376 **** 2025-11-26 12:20:41,885 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:20:41,893 p=31864 u=zuul n=ansible | TASK [ci_local_storage : Get k8s nodes kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Node] *** 2025-11-26 12:20:41,893 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:41 +0000 (0:00:00.349) 0:02:39.727 **** 2025-11-26 12:20:41,893 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:41 +0000 (0:00:00.349) 0:02:39.725 **** 2025-11-26 12:20:42,496 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:42,505 p=31864 u=zuul n=ansible | TASK [ci_local_storage : Fetch hostnames for all hosts _raw_params=hostname] *** 2025-11-26 12:20:42,505 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:42 +0000 (0:00:00.612) 0:02:40.339 **** 2025-11-26 12:20:42,505 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:42 +0000 (0:00:00.612) 0:02:40.338 **** 2025-11-26 12:20:42,695 p=31864 u=zuul n=ansible | changed: [localhost -> compute-0(192.168.26.109)] => (item=compute-0) 2025-11-26 12:20:43,219 p=31864 u=zuul n=ansible | changed: [localhost -> crc(192.168.26.148)] => (item=crc) 2025-11-26 12:20:43,493 p=31864 u=zuul n=ansible | changed: [localhost -> controller(192.168.26.112)] => (item=controller) 2025-11-26 12:20:43,642 p=31864 u=zuul n=ansible | changed: [localhost] => (item=localhost) 2025-11-26 12:20:43,644 p=31864 u=zuul n=ansible | [WARNING]: Platform linux on host localhost is using the discovered Python interpreter at /usr/bin/python3.9, but future installation of another Python interpreter could change the meaning of that path. See https://docs.ansible.com/ansible- core/2.15/reference_appendices/interpreter_discovery.html for more information. 2025-11-26 12:20:43,651 p=31864 u=zuul n=ansible | TASK [ci_local_storage : Set the hosts k8s ansible hosts cifmw_ci_local_storage_k8s_hosts={{ _host_map | selectattr("key", "in", k8s_nodes_hostnames) | map(attribute="value") | list }}, cifmw_ci_local_storage_k8s_hostnames={{ k8s_nodes_hostnames }}] *** 2025-11-26 12:20:43,651 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:43 +0000 (0:00:01.145) 0:02:41.485 **** 2025-11-26 12:20:43,651 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:43 +0000 (0:00:01.145) 0:02:41.484 **** 2025-11-26 12:20:43,682 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:43,689 p=31864 u=zuul n=ansible | TASK [ci_local_storage : Apply the storage class manifests kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cls_manifests_dir }}/storage-class.yaml] *** 2025-11-26 12:20:43,690 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:43 +0000 (0:00:00.038) 0:02:41.523 **** 2025-11-26 12:20:43,690 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:43 +0000 (0:00:00.038) 0:02:41.522 **** 2025-11-26 12:20:44,303 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:20:44,310 p=31864 u=zuul n=ansible | TASK [ci_local_storage : Create directories on worker node _raw_params=worker_node_dirs.yml] *** 2025-11-26 12:20:44,310 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:44 +0000 (0:00:00.620) 0:02:42.144 **** 2025-11-26 12:20:44,310 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:44 +0000 (0:00:00.620) 0:02:42.143 **** 2025-11-26 12:20:44,337 p=31864 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/ci_local_storage/tasks/worker_node_dirs.yml for localhost => (item=crc) 2025-11-26 12:20:44,347 p=31864 u=zuul n=ansible | TASK [ci_local_storage : Perform action in the PV directory path={{ [ cifmw_cls_local_storage_name, 'pv'+ ("%02d" | format(item | int)) ] | path_join }}, state={{ 'directory' if cifmw_cls_action == 'create' else 'absent' }}, mode=0775] *** 2025-11-26 12:20:44,347 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:44 +0000 (0:00:00.037) 0:02:42.181 **** 2025-11-26 12:20:44,348 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:44 +0000 (0:00:00.037) 0:02:42.180 **** 2025-11-26 12:20:44,706 p=31864 u=zuul n=ansible | changed: [localhost -> crc(192.168.26.148)] => (item=1) 2025-11-26 12:20:45,057 p=31864 u=zuul n=ansible | changed: [localhost -> crc(192.168.26.148)] => (item=2) 2025-11-26 12:20:45,386 p=31864 u=zuul n=ansible | changed: [localhost -> crc(192.168.26.148)] => (item=3) 2025-11-26 12:20:45,722 p=31864 u=zuul n=ansible | changed: [localhost -> crc(192.168.26.148)] => (item=4) 2025-11-26 12:20:46,082 p=31864 u=zuul n=ansible | changed: [localhost -> crc(192.168.26.148)] => (item=5) 2025-11-26 12:20:46,442 p=31864 u=zuul n=ansible | changed: [localhost -> crc(192.168.26.148)] => (item=6) 2025-11-26 12:20:46,813 p=31864 u=zuul n=ansible | changed: [localhost -> crc(192.168.26.148)] => (item=7) 2025-11-26 12:20:47,156 p=31864 u=zuul n=ansible | changed: [localhost -> crc(192.168.26.148)] => (item=8) 2025-11-26 12:20:47,516 p=31864 u=zuul n=ansible | changed: [localhost -> crc(192.168.26.148)] => (item=9) 2025-11-26 12:20:47,896 p=31864 u=zuul n=ansible | changed: [localhost -> crc(192.168.26.148)] => (item=10) 2025-11-26 12:20:48,238 p=31864 u=zuul n=ansible | changed: [localhost -> crc(192.168.26.148)] => (item=11) 2025-11-26 12:20:48,565 p=31864 u=zuul n=ansible | changed: [localhost -> crc(192.168.26.148)] => (item=12) 2025-11-26 12:20:48,576 p=31864 u=zuul n=ansible | TASK [ci_local_storage : Generate pv related storage manifest file src=storage.yaml.j2, dest={{ cifmw_cls_manifests_dir }}/storage.yaml, mode=0644] *** 2025-11-26 12:20:48,576 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:48 +0000 (0:00:04.228) 0:02:46.410 **** 2025-11-26 12:20:48,576 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:48 +0000 (0:00:04.228) 0:02:46.409 **** 2025-11-26 12:20:48,906 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:20:48,913 p=31864 u=zuul n=ansible | TASK [ci_local_storage : Apply pv related storage manifest file kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cls_manifests_dir }}/storage.yaml] *** 2025-11-26 12:20:48,913 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:48 +0000 (0:00:00.337) 0:02:46.747 **** 2025-11-26 12:20:48,913 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:48 +0000 (0:00:00.337) 0:02:46.746 **** 2025-11-26 12:20:49,599 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:20:49,614 p=31864 u=zuul n=ansible | TASK [Configure LVMS Storage Class name=ci_lvms_storage] *********************** 2025-11-26 12:20:49,614 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:49 +0000 (0:00:00.700) 0:02:47.448 **** 2025-11-26 12:20:49,614 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:49 +0000 (0:00:00.700) 0:02:47.446 **** 2025-11-26 12:20:49,632 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:49,639 p=31864 u=zuul n=ansible | TASK [Run edpm_prepare name=edpm_prepare] ************************************** 2025-11-26 12:20:49,639 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:49 +0000 (0:00:00.024) 0:02:47.473 **** 2025-11-26 12:20:49,639 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:49 +0000 (0:00:00.024) 0:02:47.471 **** 2025-11-26 12:20:49,740 p=31864 u=zuul n=ansible | TASK [edpm_prepare : Define minimal set of repo variables when not running on Zuul _install_yamls_repos={'OPENSTACK_BRANCH': '', "GIT_CLONE_OPTS'": '-l', "OPENSTACK_REPO'": '{{ operators_build_output[cifmw_operator_build_meta_name].git_src_dir }}'}] *** 2025-11-26 12:20:49,740 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:49 +0000 (0:00:00.101) 0:02:47.574 **** 2025-11-26 12:20:49,740 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:49 +0000 (0:00:00.101) 0:02:47.573 **** 2025-11-26 12:20:49,757 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:49,764 p=31864 u=zuul n=ansible | TASK [edpm_prepare : Set install_yamls Makefile environment variables cifmw_edpm_prepare_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine(_install_yamls_repos | default({})) | combine(cifmw_edpm_prepare_extra_vars | default({})) }}, cifmw_edpm_prepare_make_openstack_env={% if cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output %} OPENSTACK_IMG: {{ operators_build_output[cifmw_operator_build_meta_name].image_catalog }} {% endif %} , cifmw_edpm_prepare_make_openstack_deploy_prep_env=CLEANUP_DIR_CMD: "true" , cifmw_edpm_prepare_operators_build_output={{ operators_build_output }}] *** 2025-11-26 12:20:49,764 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:49 +0000 (0:00:00.024) 0:02:47.598 **** 2025-11-26 12:20:49,765 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:49 +0000 (0:00:00.024) 0:02:47.597 **** 2025-11-26 12:20:49,788 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:20:49,795 p=31864 u=zuul n=ansible | TASK [Prepare storage in CRC name=install_yamls_makes, tasks_from=make_crc_storage] *** 2025-11-26 12:20:49,795 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:49 +0000 (0:00:00.030) 0:02:47.629 **** 2025-11-26 12:20:49,795 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:49 +0000 (0:00:00.030) 0:02:47.628 **** 2025-11-26 12:20:49,812 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:49,818 p=31864 u=zuul n=ansible | TASK [Prepare inputs name=install_yamls_makes, tasks_from=make_input] ********** 2025-11-26 12:20:49,819 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:49 +0000 (0:00:00.023) 0:02:47.652 **** 2025-11-26 12:20:49,819 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:49 +0000 (0:00:00.023) 0:02:47.651 **** 2025-11-26 12:20:49,854 p=31864 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_input_env var=make_input_env] *********** 2025-11-26 12:20:49,854 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:49 +0000 (0:00:00.035) 0:02:47.688 **** 2025-11-26 12:20:49,854 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:49 +0000 (0:00:00.035) 0:02:47.687 **** 2025-11-26 12:20:49,875 p=31864 u=zuul n=ansible | ok: [localhost] => make_input_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1440 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: enp7s0 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin TEST_BRANCH: '' TEST_REPO: /home/zuul/src/github.com/openstack-k8s-operators/test-operator 2025-11-26 12:20:49,881 p=31864 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_input_params var=make_input_params] ***** 2025-11-26 12:20:49,881 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:49 +0000 (0:00:00.026) 0:02:47.715 **** 2025-11-26 12:20:49,881 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:49 +0000 (0:00:00.027) 0:02:47.714 **** 2025-11-26 12:20:49,897 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:49,904 p=31864 u=zuul n=ansible | TASK [install_yamls_makes : Run input output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make input, dry_run={{ make_input_dryrun|default(false)|bool }}, extra_args={{ dict((make_input_env|default({})), **(make_input_params|default({}))) }}] *** 2025-11-26 12:20:49,904 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:49 +0000 (0:00:00.022) 0:02:47.738 **** 2025-11-26 12:20:49,904 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:49 +0000 (0:00:00.022) 0:02:47.736 **** 2025-11-26 12:20:49,945 p=31864 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_005_run.log 2025-11-26 12:20:50,860 p=31864 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_input_until | default(true) }} 2025-11-26 12:20:50,861 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:20:50,873 p=31864 u=zuul n=ansible | TASK [OpenStack meta-operator installation name=install_yamls_makes, tasks_from=make_openstack] *** 2025-11-26 12:20:50,873 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:50 +0000 (0:00:00.968) 0:02:48.707 **** 2025-11-26 12:20:50,873 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:50 +0000 (0:00:00.968) 0:02:48.705 **** 2025-11-26 12:20:50,916 p=31864 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_env var=make_openstack_env] *** 2025-11-26 12:20:50,916 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:50 +0000 (0:00:00.043) 0:02:48.750 **** 2025-11-26 12:20:50,916 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:50 +0000 (0:00:00.043) 0:02:48.748 **** 2025-11-26 12:20:50,939 p=31864 u=zuul n=ansible | ok: [localhost] => make_openstack_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1440 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: enp7s0 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin TEST_BRANCH: '' TEST_REPO: /home/zuul/src/github.com/openstack-k8s-operators/test-operator 2025-11-26 12:20:50,947 p=31864 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_params var=make_openstack_params] *** 2025-11-26 12:20:50,947 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:50 +0000 (0:00:00.031) 0:02:48.781 **** 2025-11-26 12:20:50,947 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:50 +0000 (0:00:00.031) 0:02:48.780 **** 2025-11-26 12:20:50,966 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:20:50,974 p=31864 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack, dry_run={{ make_openstack_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_env|default({})), **(make_openstack_params|default({}))) }}] *** 2025-11-26 12:20:50,974 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:50 +0000 (0:00:00.026) 0:02:48.808 **** 2025-11-26 12:20:50,974 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:20:50 +0000 (0:00:00.026) 0:02:48.806 **** 2025-11-26 12:20:51,017 p=31864 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_006_run.log 2025-11-26 12:22:55,159 p=31864 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_until | default(true) }} 2025-11-26 12:22:55,161 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:22:55,172 p=31864 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack subscription creation _raw_params=oc get sub openstack-operator --namespace={{ cifmw_install_yamls_defaults['OPERATOR_NAMESPACE'] }} -o=jsonpath='{.status.installplan.name}'] *** 2025-11-26 12:22:55,172 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:22:55 +0000 (0:02:04.198) 0:04:53.006 **** 2025-11-26 12:22:55,172 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:22:55 +0000 (0:02:04.198) 0:04:53.005 **** 2025-11-26 12:23:25,715 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:23:25,722 p=31864 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack operator to get installed _raw_params=oc wait InstallPlan {{ cifmw_edpm_prepare_wait_installplan_out.stdout }} --namespace={{ cifmw_install_yamls_defaults['OPERATOR_NAMESPACE'] }} --for=jsonpath='{.status.phase}'=Complete --timeout=20m] *** 2025-11-26 12:23:25,722 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:23:25 +0000 (0:00:30.550) 0:05:23.556 **** 2025-11-26 12:23:25,722 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:23:25 +0000 (0:00:30.550) 0:05:23.555 **** 2025-11-26 12:23:26,067 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:23:26,075 p=31864 u=zuul n=ansible | TASK [edpm_prepare : Check if the OpenStack initialization CRD exists kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, kind=CustomResourceDefinition, name=openstacks.operator.openstack.org] *** 2025-11-26 12:23:26,075 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:23:26 +0000 (0:00:00.352) 0:05:23.909 **** 2025-11-26 12:23:26,075 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:23:26 +0000 (0:00:00.352) 0:05:23.907 **** 2025-11-26 12:23:26,792 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:23:26,800 p=31864 u=zuul n=ansible | TASK [OpenStack meta-operator initialization, if necessary name=install_yamls_makes, tasks_from=make_openstack_init] *** 2025-11-26 12:23:26,800 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:23:26 +0000 (0:00:00.725) 0:05:24.634 **** 2025-11-26 12:23:26,800 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:23:26 +0000 (0:00:00.725) 0:05:24.633 **** 2025-11-26 12:23:26,845 p=31864 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_init_env var=make_openstack_init_env] *** 2025-11-26 12:23:26,846 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:23:26 +0000 (0:00:00.045) 0:05:24.680 **** 2025-11-26 12:23:26,846 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:23:26 +0000 (0:00:00.045) 0:05:24.678 **** 2025-11-26 12:23:26,868 p=31864 u=zuul n=ansible | ok: [localhost] => make_openstack_init_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1440 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: enp7s0 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin TEST_BRANCH: '' TEST_REPO: /home/zuul/src/github.com/openstack-k8s-operators/test-operator 2025-11-26 12:23:26,874 p=31864 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_init_params var=make_openstack_init_params] *** 2025-11-26 12:23:26,874 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:23:26 +0000 (0:00:00.028) 0:05:24.708 **** 2025-11-26 12:23:26,874 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:23:26 +0000 (0:00:00.028) 0:05:24.707 **** 2025-11-26 12:23:26,890 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:23:26,897 p=31864 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_init output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_init, dry_run={{ make_openstack_init_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_init_env|default({})), **(make_openstack_init_params|default({}))) }}] *** 2025-11-26 12:23:26,897 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:23:26 +0000 (0:00:00.022) 0:05:24.731 **** 2025-11-26 12:23:26,897 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:23:26 +0000 (0:00:00.022) 0:05:24.730 **** 2025-11-26 12:23:26,936 p=31864 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_007_run_openstack.log 2025-11-26 12:24:33,895 p=31864 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_init_until | default(true) }} 2025-11-26 12:24:33,896 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:24:33,907 p=31864 u=zuul n=ansible | TASK [Update OpenStack Services containers Env name=set_openstack_containers] *** 2025-11-26 12:24:33,907 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:33 +0000 (0:01:07.009) 0:06:31.741 **** 2025-11-26 12:24:33,907 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:33 +0000 (0:01:07.009) 0:06:31.740 **** 2025-11-26 12:24:33,924 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:24:33,932 p=31864 u=zuul n=ansible | TASK [edpm_prepare : Set facts for baremetal UEFI image url cifmw_update_containers_edpm_image_url={{ cifmw_build_images_output['images']['edpm-hardened-uefi']['image'] }}, cacheable=True] *** 2025-11-26 12:24:33,932 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:33 +0000 (0:00:00.024) 0:06:31.766 **** 2025-11-26 12:24:33,932 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:33 +0000 (0:00:00.024) 0:06:31.764 **** 2025-11-26 12:24:33,949 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:24:33,956 p=31864 u=zuul n=ansible | TASK [Prepare OpenStack control plane CR name=install_yamls_makes, tasks_from=make_openstack_deploy_prep] *** 2025-11-26 12:24:33,956 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:33 +0000 (0:00:00.023) 0:06:31.790 **** 2025-11-26 12:24:33,956 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:33 +0000 (0:00:00.023) 0:06:31.788 **** 2025-11-26 12:24:34,000 p=31864 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_deploy_prep_env var=make_openstack_deploy_prep_env] *** 2025-11-26 12:24:34,000 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:33 +0000 (0:00:00.044) 0:06:31.834 **** 2025-11-26 12:24:34,000 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:33 +0000 (0:00:00.044) 0:06:31.833 **** 2025-11-26 12:24:34,023 p=31864 u=zuul n=ansible | ok: [localhost] => make_openstack_deploy_prep_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' CLEANUP_DIR_CMD: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1440 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: enp7s0 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin TEST_BRANCH: '' TEST_REPO: /home/zuul/src/github.com/openstack-k8s-operators/test-operator 2025-11-26 12:24:34,030 p=31864 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_deploy_prep_params var=make_openstack_deploy_prep_params] *** 2025-11-26 12:24:34,031 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:34 +0000 (0:00:00.030) 0:06:31.864 **** 2025-11-26 12:24:34,031 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:34 +0000 (0:00:00.030) 0:06:31.863 **** 2025-11-26 12:24:34,048 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:24:34,055 p=31864 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_deploy_prep output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_deploy_prep, dry_run={{ make_openstack_deploy_prep_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_deploy_prep_env|default({})), **(make_openstack_deploy_prep_params|default({}))) }}] *** 2025-11-26 12:24:34,056 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:34 +0000 (0:00:00.024) 0:06:31.889 **** 2025-11-26 12:24:34,056 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:34 +0000 (0:00:00.025) 0:06:31.889 **** 2025-11-26 12:24:34,098 p=31864 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_008_run_openstack_deploy.log 2025-11-26 12:24:35,094 p=31864 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_deploy_prep_until | default(true) }} 2025-11-26 12:24:35,095 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:24:35,108 p=31864 u=zuul n=ansible | TASK [Deploy NetConfig name=install_yamls_makes, tasks_from=make_netconfig_deploy] *** 2025-11-26 12:24:35,108 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:35 +0000 (0:00:01.052) 0:06:32.942 **** 2025-11-26 12:24:35,108 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:35 +0000 (0:00:01.051) 0:06:32.941 **** 2025-11-26 12:24:35,158 p=31864 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_netconfig_deploy_env var=make_netconfig_deploy_env] *** 2025-11-26 12:24:35,158 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:35 +0000 (0:00:00.050) 0:06:32.992 **** 2025-11-26 12:24:35,158 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:35 +0000 (0:00:00.050) 0:06:32.991 **** 2025-11-26 12:24:35,181 p=31864 u=zuul n=ansible | ok: [localhost] => make_netconfig_deploy_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1440 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: enp7s0 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin TEST_BRANCH: '' TEST_REPO: /home/zuul/src/github.com/openstack-k8s-operators/test-operator 2025-11-26 12:24:35,188 p=31864 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_netconfig_deploy_params var=make_netconfig_deploy_params] *** 2025-11-26 12:24:35,188 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:35 +0000 (0:00:00.029) 0:06:33.022 **** 2025-11-26 12:24:35,188 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:35 +0000 (0:00:00.029) 0:06:33.020 **** 2025-11-26 12:24:35,205 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:24:35,212 p=31864 u=zuul n=ansible | TASK [install_yamls_makes : Run netconfig_deploy output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make netconfig_deploy, dry_run={{ make_netconfig_deploy_dryrun|default(false)|bool }}, extra_args={{ dict((make_netconfig_deploy_env|default({})), **(make_netconfig_deploy_params|default({}))) }}] *** 2025-11-26 12:24:35,212 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:35 +0000 (0:00:00.024) 0:06:33.046 **** 2025-11-26 12:24:35,213 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:35 +0000 (0:00:00.024) 0:06:33.045 **** 2025-11-26 12:24:35,255 p=31864 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_009_run_netconfig.log 2025-11-26 12:24:38,762 p=31864 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_netconfig_deploy_until | default(true) }} 2025-11-26 12:24:38,763 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:24:38,779 p=31864 u=zuul n=ansible | TASK [edpm_prepare : Kustomize and deploy OpenStackControlPlane _raw_params=kustomize_and_deploy.yml] *** 2025-11-26 12:24:38,779 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:38 +0000 (0:00:03.566) 0:06:36.613 **** 2025-11-26 12:24:38,780 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:38 +0000 (0:00:03.567) 0:06:36.612 **** 2025-11-26 12:24:38,815 p=31864 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/edpm_prepare/tasks/kustomize_and_deploy.yml for localhost 2025-11-26 12:24:38,831 p=31864 u=zuul n=ansible | TASK [edpm_prepare : Controlplane name _ctlplane_name=controlplane] ************ 2025-11-26 12:24:38,832 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:38 +0000 (0:00:00.052) 0:06:36.665 **** 2025-11-26 12:24:38,832 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:38 +0000 (0:00:00.052) 0:06:36.664 **** 2025-11-26 12:24:38,854 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:24:38,860 p=31864 u=zuul n=ansible | TASK [edpm_prepare : Set vars related to update_containers content provider cifmw_update_containers_registry={{ content_provider_os_registry_url | split('/') | first }}, cifmw_update_containers_org={{ content_provider_os_registry_url | split('/') | last }}, cifmw_update_containers_tag={{ content_provider_dlrn_md5_hash }}, cifmw_update_containers_openstack=True] *** 2025-11-26 12:24:38,861 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:38 +0000 (0:00:00.029) 0:06:36.694 **** 2025-11-26 12:24:38,861 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:38 +0000 (0:00:00.029) 0:06:36.693 **** 2025-11-26 12:24:38,880 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:24:38,889 p=31864 u=zuul n=ansible | TASK [Prepare OpenStackVersion CR name=update_containers] ********************** 2025-11-26 12:24:38,889 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:38 +0000 (0:00:00.028) 0:06:36.723 **** 2025-11-26 12:24:38,889 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:38 +0000 (0:00:00.028) 0:06:36.721 **** 2025-11-26 12:24:38,910 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:24:38,918 p=31864 u=zuul n=ansible | TASK [edpm_prepare : Controlplane name kustomization _ctlplane_name_kustomizations=[{'apiVersion': 'kustomize.config.k8s.io/v1beta1', 'kind': 'Kustomization', 'patches': [{'target': {'kind': 'OpenStackControlPlane'}, 'patch': '- op: replace\n path: /metadata/name\n value: {{ _ctlplane_name }}'}]}]] *** 2025-11-26 12:24:38,919 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:38 +0000 (0:00:00.029) 0:06:36.752 **** 2025-11-26 12:24:38,919 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:38 +0000 (0:00:00.029) 0:06:36.751 **** 2025-11-26 12:24:38,942 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:24:38,955 p=31864 u=zuul n=ansible | TASK [edpm_prepare : Perform kustomizations to the OpenStackControlPlane CR target_path={{ cifmw_edpm_prepare_openstack_crs_path }}, sort_ascending=False, kustomizations={{ cifmw_edpm_prepare_kustomizations + _ctlplane_name_kustomizations + (cifmw_edpm_prepare_extra_kustomizations | default([])) }}, kustomizations_paths={{ [ ( [ cifmw_edpm_prepare_manifests_dir, 'kustomizations', 'controlplane' ] | ansible.builtin.path_join ) ] }}] *** 2025-11-26 12:24:38,955 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:38 +0000 (0:00:00.036) 0:06:36.789 **** 2025-11-26 12:24:38,955 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:38 +0000 (0:00:00.036) 0:06:36.788 **** 2025-11-26 12:24:39,765 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:24:39,774 p=31864 u=zuul n=ansible | TASK [edpm_prepare : Log the CR that is about to be applied var=cifmw_edpm_prepare_crs_kustomize_result] *** 2025-11-26 12:24:39,774 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:39 +0000 (0:00:00.818) 0:06:37.608 **** 2025-11-26 12:24:39,774 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:39 +0000 (0:00:00.818) 0:06:37.607 **** 2025-11-26 12:24:39,809 p=31864 u=zuul n=ansible | ok: [localhost] => cifmw_edpm_prepare_crs_kustomize_result: changed: true count: 5 failed: false kustomizations_paths: - /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr/kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/controlplane/99-kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/controlplane/95-hci-pre-kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/controlplane/80-horizon-kustomization.yaml output_path: /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr/cifmw-kustomization-result.yaml result: - apiVersion: core.openstack.org/v1beta1 kind: OpenStackControlPlane metadata: labels: created-by: install_yamls name: controlplane namespace: openstack spec: barbican: apiOverride: route: {} template: barbicanAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 barbicanKeystoneListener: replicas: 1 barbicanWorker: replicas: 1 databaseInstance: openstack secret: os**********et cinder: apiOverride: route: {} template: cinderAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer cinderBackup: networkAttachments: - storage replicas: 0 cinderScheduler: replicas: 1 cinderVolumes: volume1: networkAttachments: - storage replicas: 0 databaseInstance: openstack secret: os**********et designate: apiOverride: route: {} enabled: false template: databaseInstance: openstack designateAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer designateBackendbind9: networkAttachments: - designate replicas: 1 storageClass: local-storage storageRequest: 10G designateCentral: replicas: 1 designateMdns: networkAttachments: - designate replicas: 1 designateProducer: replicas: 1 designateWorker: networkAttachments: - designate replicas: 1 secret: os**********et dns: template: options: - key: server values: - 192.168.122.10 - key: no-negcache values: [] override: service: metadata: annotations: metallb.universe.tf/address-pool: ctlplane metallb.universe.tf/allow-shared-ip: ctlplane metallb.universe.tf/loadBalancerIPs: 192.168.122.80 spec: type: LoadBalancer replicas: 1 galera: templates: openstack: replicas: 1 secret: os**********et storageRequest: 10G openstack-cell1: replicas: 1 secret: os**********et storageRequest: 10G glance: apiOverrides: default: route: {} template: customServiceConfig: | [DEFAULT] enabled_backends = default_backend:swift [glance_store] default_backend = default_backend [default_backend] swift_store_create_container_on_put = True swift_store_auth_version = 3 swift_store_auth_address = {{ .KeystoneInternalURL }} swift_store_endpoint_type = internalURL swift_store_user = service:glance swift_store_key = {{ .ServicePassword }} databaseInstance: openstack glanceAPIs: default: networkAttachments: - storage override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 0 type: split keystoneEndpoint: default secret: os**********et storage: storageClass: '' storageRequest: 10G heat: apiOverride: route: {} cnfAPIOverride: route: {} enabled: false template: databaseInstance: openstack heatAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 heatEngine: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 secret: os**********et horizon: apiOverride: route: {} enabled: true template: memcachedInstance: memcached replicas: 1 secret: os**********et ironic: enabled: false template: databaseInstance: openstack ironicAPI: replicas: 1 ironicConductors: - replicas: 1 storageRequest: 10G ironicInspector: replicas: 1 ironicNeutronAgent: replicas: 1 secret: os**********et keystone: apiOverride: route: {} template: databaseInstance: openstack override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: os**********et manila: apiOverride: route: {} template: databaseInstance: openstack manilaAPI: networkAttachments: - internalapi override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 manilaScheduler: replicas: 1 manilaShares: share1: networkAttachments: - storage replicas: 1 memcached: templates: memcached: replicas: 1 neutron: apiOverride: route: {} template: databaseInstance: openstack networkAttachments: - internalapi override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: os**********et nova: apiOverride: route: {} template: apiServiceTemplate: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer cellTemplates: cell0: cellDatabaseAccount: nova-cell0 cellDatabaseInstance: openstack cellMessageBusInstance: rabbitmq conductorServiceTemplate: replicas: 1 hasAPIAccess: true cell1: cellDatabaseAccount: nova-cell1 cellDatabaseInstance: openstack-cell1 cellMessageBusInstance: rabbitmq-cell1 conductorServiceTemplate: replicas: 1 hasAPIAccess: true metadataServiceTemplate: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: os**********et octavia: enabled: false template: databaseInstance: openstack octaviaAPI: replicas: 1 secret: os**********et ovn: template: ovnController: networkAttachment: tenant nicMappings: datacentre: ospbr ovnDBCluster: ovndbcluster-nb: dbType: NB networkAttachment: internalapi storageRequest: 10G ovndbcluster-sb: dbType: SB networkAttachment: internalapi storageRequest: 10G placement: apiOverride: route: {} template: databaseInstance: openstack override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: os**********et rabbitmq: templates: rabbitmq: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.85 spec: type: LoadBalancer rabbitmq-cell1: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.86 spec: type: LoadBalancer redis: enabled: false secret: os**********et storageClass: local-storage swift: enabled: false proxyOverride: route: {} template: swiftProxy: networkAttachments: - storage override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 swiftRing: ringReplicas: 1 swiftStorage: networkAttachments: - storage replicas: 1 telemetry: enabled: true template: autoscaling: aodh: databaseAccount: aodh databaseInstance: openstack passwordSelectors: null secret: os**********et enabled: false heatInstance: heat ceilometer: enabled: true secret: os**********et cloudkitty: apiTimeout: 0 cloudKittyAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 resources: {} tls: api: internal: {} public: {} caBundleSecretName: combined-ca-bundle cloudKittyProc: replicas: 1 resources: {} tls: caBundleSecretName: combined-ca-bundle databaseAccount: cloudkitty databaseInstance: openstack enabled: false memcachedInstance: memcached passwordSelector: aodhService: AodhPassword ceilometerService: CeilometerPassword cloudKittyService: CloudKittyPassword preserveJobs: false rabbitMqClusterName: rabbitmq s3StorageConfig: schemas: - effectiveDate: '2024-11-18' version: v13 secret: name: logging-loki-s3 type: s3 secret: os**********et serviceUser: cloudkitty storageClass: local-storage logging: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 cloNamespace: openshift-logging enabled: false ipaddr: 172.17.0.80 port: 10514 metricStorage: enabled: false monitoringStack: alertingEnabled: true scrapeInterval: 30s storage: persistent: pvcStorageRequest: 20G retention: 24h strategy: persistent 2025-11-26 12:24:39,817 p=31864 u=zuul n=ansible | TASK [edpm_prepare : Apply the OpenStackControlPlane CR output_dir={{ cifmw_edpm_prepare_basedir }}/artifacts, script=oc apply -f {{ cifmw_edpm_prepare_crs_kustomize_result.output_path }}] *** 2025-11-26 12:24:39,818 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:39 +0000 (0:00:00.043) 0:06:37.651 **** 2025-11-26 12:24:39,818 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:39 +0000 (0:00:00.043) 0:06:37.650 **** 2025-11-26 12:24:39,863 p=31864 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_010_apply_the.log 2025-11-26 12:24:40,139 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:24:40,147 p=31864 u=zuul n=ansible | TASK [edpm_prepare : Wait for control plane to change its status seconds={{ cifmw_edpm_prepare_wait_controplane_status_change_sec }}] *** 2025-11-26 12:24:40,147 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:40 +0000 (0:00:00.329) 0:06:37.981 **** 2025-11-26 12:24:40,147 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:24:40 +0000 (0:00:00.329) 0:06:37.980 **** 2025-11-26 12:24:40,167 p=31864 u=zuul n=ansible | Pausing for 30 seconds 2025-11-26 12:25:10,180 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:25:10,187 p=31864 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack controlplane to be deployed _raw_params=oc wait OpenStackControlPlane {{ _ctlplane_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=ready --timeout={{ cifmw_edpm_prepare_timeout }}m] *** 2025-11-26 12:25:10,188 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:25:10 +0000 (0:00:30.040) 0:07:08.021 **** 2025-11-26 12:25:10,188 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:25:10 +0000 (0:00:30.040) 0:07:08.020 **** 2025-11-26 12:29:05,622 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:29:05,628 p=31864 u=zuul n=ansible | TASK [Extract and install OpenStackControlplane CA role=install_openstack_ca] *** 2025-11-26 12:29:05,628 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:05 +0000 (0:03:55.440) 0:11:03.462 **** 2025-11-26 12:29:05,628 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:05 +0000 (0:03:55.440) 0:11:03.461 **** 2025-11-26 12:29:05,696 p=31864 u=zuul n=ansible | TASK [install_openstack_ca : Get CA bundle data with retries] ****************** 2025-11-26 12:29:05,696 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:05 +0000 (0:00:00.067) 0:11:03.530 **** 2025-11-26 12:29:05,696 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:05 +0000 (0:00:00.067) 0:11:03.529 **** 2025-11-26 12:29:05,990 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:29:05,998 p=31864 u=zuul n=ansible | TASK [install_openstack_ca : Set _ca_bundle fact if CA returned from OCP] ****** 2025-11-26 12:29:05,998 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:05 +0000 (0:00:00.301) 0:11:03.832 **** 2025-11-26 12:29:05,998 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:05 +0000 (0:00:00.301) 0:11:03.831 **** 2025-11-26 12:29:06,023 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:29:06,031 p=31864 u=zuul n=ansible | TASK [install_openstack_ca : Creating tls-ca-bundle.pem from CA bundle dest={{ cifmw_install_openstack_ca_file_full_path }}, content={{ _ca_bundle }}, mode=0644] *** 2025-11-26 12:29:06,031 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:06 +0000 (0:00:00.032) 0:11:03.865 **** 2025-11-26 12:29:06,031 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:06 +0000 (0:00:00.032) 0:11:03.863 **** 2025-11-26 12:29:06,374 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:29:06,380 p=31864 u=zuul n=ansible | TASK [install_openstack_ca : Check if OpenStackControlplane CA file is present path={{ cifmw_install_openstack_ca_file_full_path }}, get_attributes=False, get_checksum=False, get_mime=False] *** 2025-11-26 12:29:06,380 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:06 +0000 (0:00:00.349) 0:11:04.214 **** 2025-11-26 12:29:06,380 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:06 +0000 (0:00:00.349) 0:11:04.212 **** 2025-11-26 12:29:06,551 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:29:06,558 p=31864 u=zuul n=ansible | TASK [Call install_ca role to inject OpenStackControlplane CA file if present role=install_ca] *** 2025-11-26 12:29:06,558 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:06 +0000 (0:00:00.178) 0:11:04.392 **** 2025-11-26 12:29:06,558 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:06 +0000 (0:00:00.178) 0:11:04.391 **** 2025-11-26 12:29:06,601 p=31864 u=zuul n=ansible | TASK [install_ca : Ensure target directory exists path={{ cifmw_install_ca_trust_dir }}, state=directory, mode=0755] *** 2025-11-26 12:29:06,601 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:06 +0000 (0:00:00.043) 0:11:04.435 **** 2025-11-26 12:29:06,601 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:06 +0000 (0:00:00.043) 0:11:04.434 **** 2025-11-26 12:29:06,794 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:29:06,801 p=31864 u=zuul n=ansible | TASK [install_ca : Install internal CA from url url={{ cifmw_install_ca_url }}, dest={{ cifmw_install_ca_trust_dir }}, validate_certs={{ cifmw_install_ca_url_validate_certs | default(omit) }}, mode=0644] *** 2025-11-26 12:29:06,801 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:06 +0000 (0:00:00.199) 0:11:04.635 **** 2025-11-26 12:29:06,801 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:06 +0000 (0:00:00.199) 0:11:04.634 **** 2025-11-26 12:29:06,820 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:06,827 p=31864 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from inline dest={{ cifmw_install_ca_trust_dir }}/cifmw_inline_ca_bundle.crt, content={{ cifmw_install_ca_bundle_inline }}, mode=0644] *** 2025-11-26 12:29:06,828 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:06 +0000 (0:00:00.026) 0:11:04.661 **** 2025-11-26 12:29:06,828 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:06 +0000 (0:00:00.026) 0:11:04.660 **** 2025-11-26 12:29:06,847 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:06,854 p=31864 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from file dest={{ cifmw_install_ca_trust_dir }}/{{ cifmw_install_ca_bundle_src | basename }}, src={{ cifmw_install_ca_bundle_src }}, mode=0644] *** 2025-11-26 12:29:06,854 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:06 +0000 (0:00:00.026) 0:11:04.688 **** 2025-11-26 12:29:06,854 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:06 +0000 (0:00:00.026) 0:11:04.687 **** 2025-11-26 12:29:07,242 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:29:07,249 p=31864 u=zuul n=ansible | TASK [install_ca : Update ca bundle _raw_params=update-ca-trust] *************** 2025-11-26 12:29:07,249 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:07 +0000 (0:00:00.395) 0:11:05.083 **** 2025-11-26 12:29:07,249 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:07 +0000 (0:00:00.395) 0:11:05.082 **** 2025-11-26 12:29:08,642 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:29:08,662 p=31864 u=zuul n=ansible | TASK [edpm_prepare : Extract keystone endpoint host _raw_params=oc get keystoneapi keystone --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} -o jsonpath='{ .status.apiEndpoints.public }'] *** 2025-11-26 12:29:08,662 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:08 +0000 (0:00:01.412) 0:11:06.496 **** 2025-11-26 12:29:08,662 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:08 +0000 (0:00:01.412) 0:11:06.495 **** 2025-11-26 12:29:08,976 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:29:08,983 p=31864 u=zuul n=ansible | TASK [edpm_prepare : Wait for keystone endpoint to exist in DNS url={{ _cifmw_edpm_prepare_keystone_endpoint_out.stdout | trim }}, status_code={{ _keystone_response_codes }}, validate_certs={{ cifmw_edpm_prepare_verify_tls }}] *** 2025-11-26 12:29:08,984 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:08 +0000 (0:00:00.321) 0:11:06.817 **** 2025-11-26 12:29:08,984 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:08 +0000 (0:00:00.321) 0:11:06.816 **** 2025-11-26 12:29:09,377 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:29:09,390 p=31864 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-11-26 12:29:09,390 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:09 +0000 (0:00:00.406) 0:11:07.224 **** 2025-11-26 12:29:09,390 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:09 +0000 (0:00:00.406) 0:11:07.223 **** 2025-11-26 12:29:09,441 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:29:09,448 p=31864 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-11-26 12:29:09,449 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:09 +0000 (0:00:00.058) 0:11:07.282 **** 2025-11-26 12:29:09,449 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:09 +0000 (0:00:00.058) 0:11:07.281 **** 2025-11-26 12:29:09,523 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:29:09,531 p=31864 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_ctlplane_deploy _raw_params={{ hook.type }}.yml] *** 2025-11-26 12:29:09,531 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:09 +0000 (0:00:00.082) 0:11:07.365 **** 2025-11-26 12:29:09,531 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:09 +0000 (0:00:00.082) 0:11:07.364 **** 2025-11-26 12:29:09,627 p=31864 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Tune rabbitmq resources', 'type': 'playbook', 'source': 'rabbitmq_tuning.yml'}) 2025-11-26 12:29:09,638 p=31864 u=zuul n=ansible | TASK [run_hook : Set playbook path for Tune rabbitmq resources cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-11-26 12:29:09,638 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:09 +0000 (0:00:00.106) 0:11:07.472 **** 2025-11-26 12:29:09,638 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:09 +0000 (0:00:00.106) 0:11:07.470 **** 2025-11-26 12:29:09,679 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:29:09,687 p=31864 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-11-26 12:29:09,687 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:09 +0000 (0:00:00.049) 0:11:07.521 **** 2025-11-26 12:29:09,687 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:09 +0000 (0:00:00.049) 0:11:07.520 **** 2025-11-26 12:29:09,860 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:29:09,868 p=31864 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-11-26 12:29:09,868 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:09 +0000 (0:00:00.180) 0:11:07.702 **** 2025-11-26 12:29:09,868 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:09 +0000 (0:00:00.180) 0:11:07.700 **** 2025-11-26 12:29:09,890 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:09,898 p=31864 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-11-26 12:29:09,898 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:09 +0000 (0:00:00.030) 0:11:07.732 **** 2025-11-26 12:29:09,898 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:09 +0000 (0:00:00.030) 0:11:07.731 **** 2025-11-26 12:29:10,064 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:29:10,071 p=31864 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-11-26 12:29:10,071 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:10 +0000 (0:00:00.173) 0:11:07.905 **** 2025-11-26 12:29:10,071 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:10 +0000 (0:00:00.173) 0:11:07.904 **** 2025-11-26 12:29:10,094 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:29:10,102 p=31864 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-11-26 12:29:10,102 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:10 +0000 (0:00:00.030) 0:11:07.936 **** 2025-11-26 12:29:10,102 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:10 +0000 (0:00:00.030) 0:11:07.935 **** 2025-11-26 12:29:10,267 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:29:10,275 p=31864 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-11-26 12:29:10,275 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:10 +0000 (0:00:00.172) 0:11:08.109 **** 2025-11-26 12:29:10,275 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:10 +0000 (0:00:00.172) 0:11:08.108 **** 2025-11-26 12:29:10,438 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:29:10,447 p=31864 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Tune rabbitmq resources] ************* 2025-11-26 12:29:10,447 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:10 +0000 (0:00:00.172) 0:11:08.281 **** 2025-11-26 12:29:10,447 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:10 +0000 (0:00:00.172) 0:11:08.280 **** 2025-11-26 12:29:10,496 p=31864 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_011_run_hook_without_retry_tune.log 2025-11-26 12:29:12,452 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:29:12,462 p=31864 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Tune rabbitmq resources] **************** 2025-11-26 12:29:12,462 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:02.014) 0:11:10.296 **** 2025-11-26 12:29:12,462 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:02.014) 0:11:10.294 **** 2025-11-26 12:29:12,483 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:12,490 p=31864 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-11-26 12:29:12,490 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.028) 0:11:10.324 **** 2025-11-26 12:29:12,490 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.028) 0:11:10.323 **** 2025-11-26 12:29:12,642 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:29:12,650 p=31864 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-11-26 12:29:12,650 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.159) 0:11:10.484 **** 2025-11-26 12:29:12,650 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.159) 0:11:10.483 **** 2025-11-26 12:29:12,669 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:12,682 p=31864 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-11-26 12:29:12,682 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.031) 0:11:10.516 **** 2025-11-26 12:29:12,682 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.031) 0:11:10.514 **** 2025-11-26 12:29:12,726 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:29:12,734 p=31864 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Define minimal set of repo variables when not running on Zuul _install_yamls_repos={{ ( { 'OPENSTACK_REPO': operators_build_output[cifmw_operator_build_meta_name].git_src_dir, 'OPENSTACK_BRANCH': '', 'GIT_CLONE_OPTS': '-l', } if (cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output) else {} ) }}] *** 2025-11-26 12:29:12,734 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.052) 0:11:10.568 **** 2025-11-26 12:29:12,734 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.052) 0:11:10.567 **** 2025-11-26 12:29:12,753 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:12,761 p=31864 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Set install_yamls Makefile environment variables cifmw_edpm_deploy_baremetal_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine(_install_yamls_repos | default({})) }}, cifmw_edpm_deploy_baremetal_make_openstack_env={{ cifmw_edpm_deploy_baremetal_make_openstack_env | default({}) | combine( { 'OPENSTACK_IMG': operators_build_output[cifmw_operator_build_meta_name].image_catalog, } if (cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output) else {} ) }}, cifmw_edpm_deploy_baremetal_operators_build_output={{ operators_build_output }}] *** 2025-11-26 12:29:12,761 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.026) 0:11:10.595 **** 2025-11-26 12:29:12,761 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.026) 0:11:10.593 **** 2025-11-26 12:29:12,779 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:12,786 p=31864 u=zuul n=ansible | TASK [Create virtual baremetal name=install_yamls_makes, tasks_from=make_edpm_baremetal_compute] *** 2025-11-26 12:29:12,786 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.024) 0:11:10.620 **** 2025-11-26 12:29:12,786 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.024) 0:11:10.618 **** 2025-11-26 12:29:12,804 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:12,811 p=31864 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Create the config file mode=0644, content={{ cifmw_edpm_deploy_baremetal_nova_compute_extra_config }}, dest={{ _cifmw_edpm_deploy_baremetal_nova_extra_config_file }}] *** 2025-11-26 12:29:12,811 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.025) 0:11:10.645 **** 2025-11-26 12:29:12,811 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.025) 0:11:10.644 **** 2025-11-26 12:29:12,832 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:12,840 p=31864 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Define DATAPLANE_EXTRA_NOVA_CONFIG_FILE cifmw_edpm_deploy_baremetal_common_env={{ cifmw_edpm_deploy_baremetal_common_env | default({}) | combine({'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': _cifmw_edpm_deploy_baremetal_nova_extra_config_file }) }}, cacheable=True] *** 2025-11-26 12:29:12,840 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.028) 0:11:10.674 **** 2025-11-26 12:29:12,840 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.028) 0:11:10.673 **** 2025-11-26 12:29:12,861 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:12,868 p=31864 u=zuul n=ansible | TASK [Prepare OpenStack Dataplane NodeSet CR name=install_yamls_makes, tasks_from=make_edpm_deploy_baremetal_prep] *** 2025-11-26 12:29:12,868 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.028) 0:11:10.702 **** 2025-11-26 12:29:12,868 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.028) 0:11:10.701 **** 2025-11-26 12:29:12,890 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:12,898 p=31864 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Perform kustomizations to the OpenStackDataPlaneNodeSet CR target_path={{ cifmw_edpm_deploy_openstack_crs_path }}, sort_ascending=False, kustomizations={% if content_provider_registry_ip is defined or not cifmw_edpm_deploy_baremetal_bootc %} apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization patches: - target: kind: OpenStackDataPlaneNodeSet patch: |- {% if content_provider_registry_ip is defined %} - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_container_registry_insecure_registries value: ["{{ content_provider_registry_ip }}:5001"] {% endif %} {% if not cifmw_edpm_deploy_baremetal_bootc %} - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_bootstrap_command value: sudo dnf -y update {% endif %} {% endif %}, kustomizations_paths={{ [ ( [ cifmw_edpm_deploy_baremetal_manifests_dir, 'kustomizations', 'dataplane' ] | ansible.builtin.path_join ) ] }}] *** 2025-11-26 12:29:12,898 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.029) 0:11:10.732 **** 2025-11-26 12:29:12,898 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.029) 0:11:10.731 **** 2025-11-26 12:29:12,918 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:12,926 p=31864 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Log the CR that is about to be applied var=cifmw_edpm_deploy_baremetal_crs_kustomize_result] *** 2025-11-26 12:29:12,926 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.028) 0:11:10.760 **** 2025-11-26 12:29:12,926 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.028) 0:11:10.759 **** 2025-11-26 12:29:12,946 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:12,954 p=31864 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Create repo-setup-downstream OpenStackDataPlaneService _raw_params=oc apply -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} -f "{{ cifmw_installyamls_repos }}/devsetup/edpm/services/dataplane_v1beta1_openstackdataplaneservice_reposetup_downstream.yaml"] *** 2025-11-26 12:29:12,954 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.027) 0:11:10.788 **** 2025-11-26 12:29:12,954 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.027) 0:11:10.786 **** 2025-11-26 12:29:12,973 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:12,981 p=31864 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Get list of services defined under OpenStackDataPlaneNodeSet resource _raw_params=yq '.spec.services[]' {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2025-11-26 12:29:12,981 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.026) 0:11:10.815 **** 2025-11-26 12:29:12,981 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:12 +0000 (0:00:00.026) 0:11:10.813 **** 2025-11-26 12:29:13,000 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:13,008 p=31864 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Patch OpenStackDataPlaneNodeSet resource to add "repo-setup-downstream" service _raw_params=yq -i '.spec.services = ["repo-setup-downstream"] + .spec.services' {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2025-11-26 12:29:13,008 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.027) 0:11:10.842 **** 2025-11-26 12:29:13,008 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.027) 0:11:10.841 **** 2025-11-26 12:29:13,030 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:13,037 p=31864 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Patch OpenStackDataPlaneNodeSet resource to replace "repo-setup" with "repo-setup-downstream" service _raw_params=yq -i '(.spec.services[] | select(. == "repo-setup")) |= "repo-setup-downstream"' {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2025-11-26 12:29:13,037 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.029) 0:11:10.871 **** 2025-11-26 12:29:13,038 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.029) 0:11:10.870 **** 2025-11-26 12:29:13,058 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:13,065 p=31864 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Apply the OpenStackDataPlaneNodeSet CR output_dir={{ cifmw_edpm_deploy_baremetal_basedir }}/artifacts, script=oc apply -f {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2025-11-26 12:29:13,065 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.027) 0:11:10.899 **** 2025-11-26 12:29:13,065 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.027) 0:11:10.898 **** 2025-11-26 12:29:13,085 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:13,092 p=31864 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for Ironic to be ready _raw_params=oc wait pod -l name=ironic -n baremetal-operator-system --for=condition=Ready --timeout={{ cifmw_edpm_deploy_baremetal_wait_ironic_timeout_mins }}m] *** 2025-11-26 12:29:13,092 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.027) 0:11:10.926 **** 2025-11-26 12:29:13,092 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.027) 0:11:10.925 **** 2025-11-26 12:29:13,112 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:13,119 p=31864 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for OpenStack Provision Server pod to be created _raw_params=oc get po -l osp-provisionserver/name=openstack-edpm-ipam-provisionserver -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} -o name] *** 2025-11-26 12:29:13,119 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.026) 0:11:10.953 **** 2025-11-26 12:29:13,119 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.026) 0:11:10.952 **** 2025-11-26 12:29:13,142 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:13,152 p=31864 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for OpenStack Provision Server deployment to be available _raw_params=oc wait deployment openstack-edpm-ipam-provisionserver-openstackprovisionserver -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for condition=Available --timeout={{ cifmw_edpm_deploy_baremetal_wait_provisionserver_timeout_mins }}m] *** 2025-11-26 12:29:13,152 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.032) 0:11:10.986 **** 2025-11-26 12:29:13,152 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.032) 0:11:10.984 **** 2025-11-26 12:29:13,173 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:13,181 p=31864 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for baremetal nodes to reach 'provisioned' state _raw_params=oc wait bmh --all -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=jsonpath='{.status.provisioning.state}'=provisioned --timeout={{ cifmw_edpm_deploy_baremetal_wait_bmh_timeout_mins }}m] *** 2025-11-26 12:29:13,181 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.029) 0:11:11.015 **** 2025-11-26 12:29:13,181 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.029) 0:11:11.013 **** 2025-11-26 12:29:13,201 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:13,209 p=31864 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Register the list of compute nodes _raw_params=oc get bmh -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }}] *** 2025-11-26 12:29:13,209 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.028) 0:11:11.043 **** 2025-11-26 12:29:13,209 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.028) 0:11:11.042 **** 2025-11-26 12:29:13,229 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:13,237 p=31864 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Print the list of compute nodes var=compute_nodes_output.stdout_lines] *** 2025-11-26 12:29:13,237 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.028) 0:11:11.071 **** 2025-11-26 12:29:13,237 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.028) 0:11:11.070 **** 2025-11-26 12:29:13,258 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:13,265 p=31864 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for OpenStackDataPlaneNodeSet to be deployed _raw_params=oc wait OpenStackDataPlaneNodeSet {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=ready --timeout={{ cifmw_edpm_deploy_baremetal_wait_dataplane_timeout_mins }}m] *** 2025-11-26 12:29:13,265 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.027) 0:11:11.099 **** 2025-11-26 12:29:13,265 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.027) 0:11:11.098 **** 2025-11-26 12:29:13,285 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:13,293 p=31864 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Run nova-manage discover_hosts to ensure compute nodes are mapped _raw_params=oc rsh -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} nova-cell0-conductor-0 nova-manage cell_v2 discover_hosts --verbose] *** 2025-11-26 12:29:13,293 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.027) 0:11:11.127 **** 2025-11-26 12:29:13,293 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.027) 0:11:11.126 **** 2025-11-26 12:29:13,313 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:13,326 p=31864 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-11-26 12:29:13,326 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.033) 0:11:11.160 **** 2025-11-26 12:29:13,326 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.033) 0:11:11.159 **** 2025-11-26 12:29:13,378 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:29:13,387 p=31864 u=zuul n=ansible | TASK [libvirt_manager : Set compute config and common environment facts compute_config={{ cifmw_libvirt_manager_configuration['vms']['compute'] }}, cifmw_libvirt_manager_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path }) }}, cacheable=True] *** 2025-11-26 12:29:13,387 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.060) 0:11:11.221 **** 2025-11-26 12:29:13,387 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.060) 0:11:11.220 **** 2025-11-26 12:29:13,411 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:13,419 p=31864 u=zuul n=ansible | TASK [libvirt_manager : Ensure needed directories exist path={{ item }}, state=directory, mode=0755] *** 2025-11-26 12:29:13,419 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.031) 0:11:11.253 **** 2025-11-26 12:29:13,419 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.031) 0:11:11.252 **** 2025-11-26 12:29:13,456 p=31864 u=zuul n=ansible | skipping: [localhost] => (item=/home/zuul/ci-framework-data/workload) 2025-11-26 12:29:13,464 p=31864 u=zuul n=ansible | skipping: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/edpm_compute) 2025-11-26 12:29:13,472 p=31864 u=zuul n=ansible | skipping: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/openstack/cr/) 2025-11-26 12:29:13,474 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:13,481 p=31864 u=zuul n=ansible | TASK [libvirt_manager : Ensure image is available _raw_params=get_image.yml] *** 2025-11-26 12:29:13,481 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.061) 0:11:11.315 **** 2025-11-26 12:29:13,481 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.061) 0:11:11.314 **** 2025-11-26 12:29:13,506 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:13,513 p=31864 u=zuul n=ansible | TASK [Create EDPM compute VMs name=install_yamls_makes, tasks_from=make_edpm_compute.yml] *** 2025-11-26 12:29:13,513 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.031) 0:11:11.347 **** 2025-11-26 12:29:13,513 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.031) 0:11:11.345 **** 2025-11-26 12:29:13,537 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:13,545 p=31864 u=zuul n=ansible | TASK [libvirt_manager : Catch compute IPs _raw_params=virsh -c qemu:///system -q domifaddr --source arp --domain edpm-compute-{{ item }}] *** 2025-11-26 12:29:13,545 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.031) 0:11:11.379 **** 2025-11-26 12:29:13,545 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.031) 0:11:11.377 **** 2025-11-26 12:29:13,569 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:13,576 p=31864 u=zuul n=ansible | TASK [libvirt_manager : Ensure we get SSH host={{ item.stdout.split()[-1].split('/')[0] }}, port=22, timeout=60] *** 2025-11-26 12:29:13,576 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.031) 0:11:11.410 **** 2025-11-26 12:29:13,576 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.031) 0:11:11.409 **** 2025-11-26 12:29:13,600 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:13,608 p=31864 u=zuul n=ansible | TASK [libvirt_manager : Output CR for extra computes dest={{ cifmw_libvirt_manager_basedir }}/artifacts/{{ cifmw_install_yamls_defaults['NAMESPACE'] }}/cr/99-cifmw-computes-{{ item }}.yaml, src=kustomize_compute.yml.j2, mode=0644] *** 2025-11-26 12:29:13,609 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.032) 0:11:11.442 **** 2025-11-26 12:29:13,609 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.032) 0:11:11.441 **** 2025-11-26 12:29:13,634 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:13,646 p=31864 u=zuul n=ansible | TASK [Prepare for HCI deploy phase 1 name=hci_prepare, tasks_from=phase1.yml] *** 2025-11-26 12:29:13,646 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.037) 0:11:11.480 **** 2025-11-26 12:29:13,646 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.037) 0:11:11.479 **** 2025-11-26 12:29:13,714 p=31864 u=zuul n=ansible | TASK [hci_prepare : Set common facts _cifmw_hci_prepare_namespace={{ cifmw_install_yamls_defaults.NAMESPACE | default(cifmw_hci_prepare_namespace) }}] *** 2025-11-26 12:29:13,714 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.068) 0:11:11.548 **** 2025-11-26 12:29:13,715 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.068) 0:11:11.547 **** 2025-11-26 12:29:13,741 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:29:13,750 p=31864 u=zuul n=ansible | TASK [hci_prepare : Load parameters _raw_params=load_parameters.yml] *********** 2025-11-26 12:29:13,750 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.035) 0:11:11.584 **** 2025-11-26 12:29:13,750 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.035) 0:11:11.582 **** 2025-11-26 12:29:13,784 p=31864 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/hci_prepare/tasks/load_parameters.yml for localhost 2025-11-26 12:29:13,795 p=31864 u=zuul n=ansible | TASK [hci_prepare : Load parameters dir={{ item }}] **************************** 2025-11-26 12:29:13,795 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.045) 0:11:11.629 **** 2025-11-26 12:29:13,795 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.045) 0:11:11.628 **** 2025-11-26 12:29:13,895 p=31864 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters) 2025-11-26 12:29:13,909 p=31864 u=zuul n=ansible | ok: [localhost] => (item=/etc/ci/env) 2025-11-26 12:29:13,966 p=31864 u=zuul n=ansible | TASK [hci_prepare : Extract first compute from inventory _first_compute={{ groups['computes'] | select('match', '^compute.*0$') | first }}] *** 2025-11-26 12:29:13,966 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.171) 0:11:11.800 **** 2025-11-26 12:29:13,966 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:13 +0000 (0:00:00.171) 0:11:11.799 **** 2025-11-26 12:29:13,995 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:29:14,003 p=31864 u=zuul n=ansible | TASK [hci_prepare : Ensure we have needed bits for compute when needed that=['_first_compute | length != 0', 'crc_ci_bootstrap_networks_out[_first_compute] is defined', "crc_ci_bootstrap_networks_out[_first_compute]['storage-mgmt'] is defined or crc_ci_bootstrap_networks_out[_first_compute]['storagemgmt'] is defined"]] *** 2025-11-26 12:29:14,003 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:14 +0000 (0:00:00.036) 0:11:11.837 **** 2025-11-26 12:29:14,003 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:14 +0000 (0:00:00.036) 0:11:11.836 **** 2025-11-26 12:29:14,034 p=31864 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2025-11-26 12:29:14,041 p=31864 u=zuul n=ansible | TASK [hci_prepare : Set mtu value from crc_ci_bootstrap_networks_out cifmw_hci_prepare_storage_mgmt_mtu={{ crc_ci_bootstrap_networks_out[_first_compute]['storage-mgmt'].mtu | default(crc_ci_bootstrap_networks_out[_first_compute]['storagemgmt'].mtu) }}] *** 2025-11-26 12:29:14,041 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:14 +0000 (0:00:00.038) 0:11:11.875 **** 2025-11-26 12:29:14,041 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:14 +0000 (0:00:00.038) 0:11:11.874 **** 2025-11-26 12:29:14,070 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:29:14,077 p=31864 u=zuul n=ansible | TASK [hci_prepare : Set vlan value from crc_ci_bootstrap_networks_out cifmw_hci_prepare_storage_mgmt_vlan={{ crc_ci_bootstrap_networks_out[_first_compute]['storage-mgmt'].vlan | default(crc_ci_bootstrap_networks_out[_first_compute]['storagemgmt'].vlan) }}] *** 2025-11-26 12:29:14,077 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:14 +0000 (0:00:00.036) 0:11:11.911 **** 2025-11-26 12:29:14,077 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:14 +0000 (0:00:00.036) 0:11:11.910 **** 2025-11-26 12:29:14,106 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:29:14,113 p=31864 u=zuul n=ansible | TASK [hci_prepare : Ensure the kustomizations dirs exists path={{ cifmw_hci_prepare_dataplane_dir }}, state=directory, mode=0755] *** 2025-11-26 12:29:14,113 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:14 +0000 (0:00:00.035) 0:11:11.947 **** 2025-11-26 12:29:14,113 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:14 +0000 (0:00:00.035) 0:11:11.946 **** 2025-11-26 12:29:14,285 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:29:14,293 p=31864 u=zuul n=ansible | TASK [hci_prepare : Prepare EDPM network for HCI deployment mode=0644, dest={{ cifmw_hci_prepare_dataplane_dir }}/89-storage-mgmt-kustomization.yaml, content=apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization resources: namespace: {{ _cifmw_hci_prepare_namespace }} patches: - target: kind: OpenStackDataPlaneNodeSet patch: |- {% for compute_node in groups['computes'] %} - op: add path: /spec/nodes/edpm-{{ compute_node }}/networks/- value: name: StorageMgmt subnetName: subnet1 {% endfor %}] *** 2025-11-26 12:29:14,293 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:14 +0000 (0:00:00.179) 0:11:12.127 **** 2025-11-26 12:29:14,293 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:14 +0000 (0:00:00.179) 0:11:12.126 **** 2025-11-26 12:29:14,640 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:29:14,648 p=31864 u=zuul n=ansible | TASK [hci_prepare : Enable services needed to deploy Ceph mode=0644, dest={{ cifmw_hci_prepare_dataplane_dir }}/88-hci-pre-kustomization.yaml, content=apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization resources: namespace: {{ _cifmw_hci_prepare_namespace }} patches: - target: kind: OpenStackDataPlaneNodeSet patch: |- - op: replace path: /spec/services value: {% if cifmw_hci_prepare_enable_repo_setup_service|bool %} - repo-setup {% endif %} - bootstrap - configure-network - validate-network - install-os - ceph-hci-pre - configure-os - ssh-known-hosts - run-os - reboot-os] *** 2025-11-26 12:29:14,648 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:14 +0000 (0:00:00.355) 0:11:12.482 **** 2025-11-26 12:29:14,649 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:14 +0000 (0:00:00.355) 0:11:12.481 **** 2025-11-26 12:29:14,990 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:29:14,998 p=31864 u=zuul n=ansible | TASK [hci_prepare : Disable discover_hosts when deploying hci on phase1 cifmw_edpm_deploy_skip_nova_discover_hosts=True] *** 2025-11-26 12:29:14,998 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:14 +0000 (0:00:00.349) 0:11:12.832 **** 2025-11-26 12:29:14,998 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:14 +0000 (0:00:00.349) 0:11:12.831 **** 2025-11-26 12:29:15,023 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:29:15,036 p=31864 u=zuul n=ansible | TASK [edpm_deploy : Set EDPM related vars cifmw_edpm_deploy_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine({'DATAPLANE_REGISTRY_URL': cifmw_edpm_deploy_registry_url }) | combine({'DATAPLANE_CONTAINER_TAG': cifmw_repo_setup_full_hash | default(cifmw_install_yamls_defaults['DATAPLANE_CONTAINER_TAG']) }) | combine(cifmw_edpm_deploy_extra_vars | default({})) | combine(_install_yamls_repos | default({})) }}, cacheable=True] *** 2025-11-26 12:29:15,036 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:15 +0000 (0:00:00.038) 0:11:12.870 **** 2025-11-26 12:29:15,036 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:15 +0000 (0:00:00.038) 0:11:12.869 **** 2025-11-26 12:29:15,073 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:29:15,080 p=31864 u=zuul n=ansible | TASK [edpm_deploy : Create the config file mode=0644, content={{ cifmw_edpm_deploy_nova_compute_extra_config }}, dest={{ _cifmw_edpm_deploy_nova_extra_config_file }}] *** 2025-11-26 12:29:15,080 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:15 +0000 (0:00:00.043) 0:11:12.914 **** 2025-11-26 12:29:15,080 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:15 +0000 (0:00:00.043) 0:11:12.912 **** 2025-11-26 12:29:15,423 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:29:15,431 p=31864 u=zuul n=ansible | TASK [edpm_deploy : Define DATAPLANE_EXTRA_NOVA_CONFIG_FILE cifmw_edpm_deploy_env={{ cifmw_edpm_deploy_env | default({}) | combine({'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': _cifmw_edpm_deploy_nova_extra_config_file }) }}, cacheable=True] *** 2025-11-26 12:29:15,431 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:15 +0000 (0:00:00.351) 0:11:13.265 **** 2025-11-26 12:29:15,431 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:15 +0000 (0:00:00.351) 0:11:13.264 **** 2025-11-26 12:29:15,464 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:29:15,471 p=31864 u=zuul n=ansible | TASK [Prepare OpenStack Dataplane NodeSet CR name=install_yamls_makes, tasks_from=make_edpm_deploy_prep] *** 2025-11-26 12:29:15,471 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:15 +0000 (0:00:00.040) 0:11:13.305 **** 2025-11-26 12:29:15,471 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:15 +0000 (0:00:00.040) 0:11:13.304 **** 2025-11-26 12:29:15,515 p=31864 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_edpm_deploy_prep_env var=make_edpm_deploy_prep_env] *** 2025-11-26 12:29:15,515 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:15 +0000 (0:00:00.043) 0:11:13.349 **** 2025-11-26 12:29:15,515 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:15 +0000 (0:00:00.043) 0:11:13.348 **** 2025-11-26 12:29:15,543 p=31864 u=zuul n=ansible | ok: [localhost] => make_edpm_deploy_prep_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' DATAPLANE_COMPUTE_IP: 192.168.122.100 DATAPLANE_CONTAINER_TAG: 7b76510d5d5adf2ccf627d29bb9dae76 DATAPLANE_EXTRA_NOVA_CONFIG_FILE: /home/zuul/ci-framework-data/nova-extra-config.conf DATAPLANE_REGISTRY_URL: quay.io/podified-antelope-centos9 DATAPLANE_SINGLE_NODE: 'true' DATAPLANE_SSHD_ALLOWED_RANGES: '[''0.0.0.0/0'']' DATAPLANE_TOTAL_NODES: 1 INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin SSH_KEY_FILE: /home/zuul/.ssh/id_cifw TEST_BRANCH: '' TEST_REPO: /home/zuul/src/github.com/openstack-k8s-operators/test-operator 2025-11-26 12:29:15,551 p=31864 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_edpm_deploy_prep_params var=make_edpm_deploy_prep_params] *** 2025-11-26 12:29:15,551 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:15 +0000 (0:00:00.035) 0:11:13.385 **** 2025-11-26 12:29:15,551 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:15 +0000 (0:00:00.035) 0:11:13.383 **** 2025-11-26 12:29:15,574 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:29:15,582 p=31864 u=zuul n=ansible | TASK [install_yamls_makes : Run edpm_deploy_prep output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make edpm_deploy_prep, dry_run={{ make_edpm_deploy_prep_dryrun|default(false)|bool }}, extra_args={{ dict((make_edpm_deploy_prep_env|default({})), **(make_edpm_deploy_prep_params|default({}))) }}] *** 2025-11-26 12:29:15,582 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:15 +0000 (0:00:00.031) 0:11:13.416 **** 2025-11-26 12:29:15,582 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:15 +0000 (0:00:00.031) 0:11:13.414 **** 2025-11-26 12:29:15,630 p=31864 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_012_run_edpm_deploy.log 2025-11-26 12:29:21,994 p=31864 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_edpm_deploy_prep_until | default(true) }} 2025-11-26 12:29:21,996 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:29:22,008 p=31864 u=zuul n=ansible | TASK [edpm_deploy : Perform kustomizations to the OpenStackDataPlaneNodeSet CR target_path={{ cifmw_edpm_deploy_openstack_crs_path }}, sort_ascending=False, kustomizations_paths={{ [ ( [ cifmw_edpm_deploy_manifests_dir, 'kustomizations', 'dataplane' ] | ansible.builtin.path_join ) ] }}] *** 2025-11-26 12:29:22,008 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:22 +0000 (0:00:06.426) 0:11:19.842 **** 2025-11-26 12:29:22,009 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:22 +0000 (0:00:06.426) 0:11:19.841 **** 2025-11-26 12:29:22,500 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:29:22,508 p=31864 u=zuul n=ansible | TASK [edpm_deploy : Log the CR that is about to be applied var=cifmw_edpm_deploy_crs_kustomize_result] *** 2025-11-26 12:29:22,508 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:22 +0000 (0:00:00.499) 0:11:20.342 **** 2025-11-26 12:29:22,508 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:22 +0000 (0:00:00.499) 0:11:20.340 **** 2025-11-26 12:29:22,540 p=31864 u=zuul n=ansible | ok: [localhost] => cifmw_edpm_deploy_crs_kustomize_result: changed: true count: 4 failed: false kustomizations_paths: - /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/dataplane/99-kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/dataplane/89-storage-mgmt-kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/dataplane/88-hci-pre-kustomization.yaml output_path: /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/cifmw-kustomization-result.yaml result: - apiVersion: v1 data: network_config_template: | --- {% set mtu_list = [ctlplane_mtu] %} {% for network in nodeset_networks %} {% set _ = mtu_list.append(lookup('vars', networks_lower[network] ~ '_mtu')) %} {%- endfor %} {% set min_viable_mtu = mtu_list | max %} network_config: - type: ovs_bridge name: {{ neutron_physical_bridge_name }} mtu: {{ min_viable_mtu }} use_dhcp: false dns_servers: {{ ctlplane_dns_nameservers }} domain: {{ dns_search_domains }} addresses: - ip_netmask: {{ ctlplane_ip }}/{{ ctlplane_cidr }} routes: {{ ctlplane_host_routes }} members: - type: interface name: nic1 mtu: {{ min_viable_mtu }} # force the MAC address of the bridge to this interface primary: true {% for network in nodeset_networks %} - type: vlan mtu: {{ lookup('vars', networks_lower[network] ~ '_mtu') }} vlan_id: {{ lookup('vars', networks_lower[network] ~ '_vlan_id') }} addresses: - ip_netmask: {{ lookup('vars', networks_lower[network] ~ '_ip') }}/{{ lookup('vars', networks_lower[network] ~ '_cidr') }} routes: {{ lookup('vars', networks_lower[network] ~ '_host_routes') }} {% endfor %} kind: ConfigMap metadata: labels: created-by: install_yamls name: network-config-template-ipam namespace: openstack - apiVersion: v1 data: physical_bridge_name: br-ex public_interface_name: eth0 kind: ConfigMap metadata: labels: created-by: install_yamls name: neutron-edpm-ipam namespace: openstack - apiVersion: v1 data: 25-nova-extra.conf: '' kind: ConfigMap metadata: labels: created-by: install_yamls name: nova-extra-config namespace: openstack - apiVersion: dataplane.openstack.org/v1beta1 kind: OpenStackDataPlaneDeployment metadata: labels: created-by: install_yamls name: edpm-deployment namespace: openstack spec: nodeSets: - openstack-edpm-ipam - apiVersion: dataplane.openstack.org/v1beta1 kind: OpenStackDataPlaneNodeSet metadata: labels: created-by: install_yamls name: openstack-edpm-ipam namespace: openstack spec: env: - name: ANSIBLE_VERBOSITY value: '2' networkAttachments: - ctlplane nodeTemplate: ansible: ansibleUser: zuul ansibleVars: ctlplane_dns_nameservers: - 192.168.122.10 - 1.1.1.1 edpm_container_registry_insecure_registries: - 38.102.83.98:5001 edpm_network_config_debug: true edpm_network_config_template: |- --- {% set mtu_list = [ctlplane_mtu] %} {% for network in nodeset_networks %} {% set _ = mtu_list.append(lookup('vars', networks_lower[network] ~ '_mtu')) %} {%- endfor %} {% set min_viable_mtu = mtu_list | max %} network_config: - type: interface name: nic1 use_dhcp: true mtu: {{ min_viable_mtu }} - type: ovs_bridge name: {{ neutron_physical_bridge_name }} mtu: {{ min_viable_mtu }} use_dhcp: false dns_servers: {{ ctlplane_dns_nameservers }} domain: {{ dns_search_domains }} addresses: - ip_netmask: {{ ctlplane_ip }}/{{ ctlplane_cidr }} routes: {{ ctlplane_host_routes }} members: - type: interface name: nic2 mtu: {{ min_viable_mtu }} # force the MAC address of the bridge to this interface primary: true {% if edpm_network_config_nmstate | bool %} # this ovs_extra configuration fixes OSPRH-17551, but it will be not needed when FDP-1472 is resolved ovs_extra: - "set interface eth1 external-ids:ovn-egress-iface=true" {% endif %} {% for network in nodeset_networks %} - type: vlan mtu: {{ lookup('vars', networks_lower[network] ~ '_mtu') }} vlan_id: {{ lookup('vars', networks_lower[network] ~ '_vlan_id') }} addresses: - ip_netmask: {{ lookup('vars', networks_lower[network] ~ '_ip') }}/{{ lookup('vars', networks_lower[network] ~ '_cidr') }} routes: {{ lookup('vars', networks_lower[network] ~ '_host_routes') }} {% endfor %} edpm_nodes_validation_validate_controllers_icmp: false edpm_nodes_validation_validate_gateway_icmp: false edpm_os_net_config_mappings: net_config_data_lookup: edpm-compute: nic2: eth1 edpm_sshd_allowed_ranges: - 0.0.0.0/0 enable_debug: false gather_facts: false image_prefix: openstack image_tag: 7b76510d5d5adf2ccf627d29bb9dae76 neutron_public_interface_name: eth1 registry_url: quay.io/podified-antelope-centos9 timesync_ntp_servers: - hostname: pool.ntp.org ansibleVarsFrom: - configMapRef: name: network-config-template-ipam prefix: edpm_ - configMapRef: name: neutron-edpm-ipam prefix: neutron_ ansibleSSHPrivateKeySecret: dataplane-ansible-ssh-private-key-secret nodes: edpm-compute-0: ansible: ansibleHost: 192.168.122.100 hostName: compute-0 networks: - defaultRoute: false fixedIP: 192.168.122.100 name: ctlplane subnetName: subnet1 - name: internalapi subnetName: subnet1 - name: storage subnetName: subnet1 - name: tenant subnetName: subnet1 - name: StorageMgmt subnetName: subnet1 preProvisioned: true services: - repo-setup - bootstrap - configure-network - validate-network - install-os - ceph-hci-pre - configure-os - ssh-known-hosts - run-os - reboot-os tlsEnabled: true 2025-11-26 12:29:22,548 p=31864 u=zuul n=ansible | TASK [edpm_deploy : Apply dataplane resources but ignore DataPlaneDeployment kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, definition={{ lookup('file', cifmw_edpm_deploy_crs_kustomize_result.output_path) | from_yaml_all | rejectattr('kind', 'search', cifmw_edpm_deploy_step2_kind) }}] *** 2025-11-26 12:29:22,549 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:22 +0000 (0:00:00.040) 0:11:20.382 **** 2025-11-26 12:29:22,549 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:22 +0000 (0:00:00.040) 0:11:20.381 **** 2025-11-26 12:29:23,213 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:29:23,222 p=31864 u=zuul n=ansible | TASK [edpm_deploy : Wait for OpenStackDataPlaneNodeSet become SetupReady _raw_params=oc wait OpenStackDataPlaneNodeSet {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=SetupReady --timeout={{ cifmw_edpm_deploy_timeout }}m] *** 2025-11-26 12:29:23,222 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:23 +0000 (0:00:00.673) 0:11:21.056 **** 2025-11-26 12:29:23,222 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:23 +0000 (0:00:00.673) 0:11:21.054 **** 2025-11-26 12:29:23,797 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:29:23,805 p=31864 u=zuul n=ansible | TASK [edpm_deploy : Apply DataPlaneDeployment resource kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, definition={{ lookup('file', cifmw_edpm_deploy_crs_kustomize_result.output_path) | from_yaml_all | selectattr('kind', 'search', cifmw_edpm_deploy_step2_kind) }}] *** 2025-11-26 12:29:23,805 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:23 +0000 (0:00:00.582) 0:11:21.639 **** 2025-11-26 12:29:23,805 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:23 +0000 (0:00:00.582) 0:11:21.637 **** 2025-11-26 12:29:24,439 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:29:24,447 p=31864 u=zuul n=ansible | TASK [edpm_deploy : Wait for OpenStackDataPlaneDeployment become Ready _raw_params=oc wait OpenStackDataPlaneDeployment {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=Ready --timeout={{ cifmw_edpm_deploy_timeout }}m] *** 2025-11-26 12:29:24,447 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:24 +0000 (0:00:00.642) 0:11:22.281 **** 2025-11-26 12:29:24,448 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:29:24 +0000 (0:00:00.642) 0:11:22.280 **** 2025-11-26 12:36:10,488 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:36:10,495 p=31864 u=zuul n=ansible | TASK [edpm_deploy : Run nova-manage discover_hosts to ensure compute nodes are mapped output_dir={{ cifmw_basedir }}/artifacts, executable=/bin/bash, script=set -xe oc rsh --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} nova-cell0-conductor-0 nova-manage cell_v2 discover_hosts --verbose ] *** 2025-11-26 12:36:10,495 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:06:46.047) 0:18:08.329 **** 2025-11-26 12:36:10,495 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:06:46.047) 0:18:08.328 **** 2025-11-26 12:36:10,517 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:36:10,525 p=31864 u=zuul n=ansible | TASK [Validate EDPM name=install_yamls_makes, tasks_from=make_edpm_deploy_instance] *** 2025-11-26 12:36:10,525 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.030) 0:18:08.359 **** 2025-11-26 12:36:10,525 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.030) 0:18:08.358 **** 2025-11-26 12:36:10,546 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:36:10,583 p=31864 u=zuul n=ansible | PLAY [Deploy NFS server on target nodes] *************************************** 2025-11-26 12:36:10,600 p=31864 u=zuul n=ansible | TASK [cifmw_nfs : Set custom cifmw PATH reusable fact cifmw_path={{ ansible_user_dir }}/.crc/bin:{{ ansible_user_dir }}/.crc/bin/oc:{{ ansible_user_dir }}/bin:{{ ansible_env.PATH }}, cacheable=True] *** 2025-11-26 12:36:10,601 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.075) 0:18:08.434 **** 2025-11-26 12:36:10,601 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.075) 0:18:08.433 **** 2025-11-26 12:36:10,613 p=31864 u=zuul n=ansible | skipping: [compute-0] 2025-11-26 12:36:10,620 p=31864 u=zuul n=ansible | TASK [cifmw_nfs : Install required packages name=['nfs-utils', 'iptables']] **** 2025-11-26 12:36:10,620 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.019) 0:18:08.454 **** 2025-11-26 12:36:10,620 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.019) 0:18:08.453 **** 2025-11-26 12:36:10,632 p=31864 u=zuul n=ansible | skipping: [compute-0] 2025-11-26 12:36:10,639 p=31864 u=zuul n=ansible | TASK [cifmw_nfs : Configure nfs to use v4 only path=/etc/nfs.conf, section=nfsd, option=vers3, value=n, backup=True, mode=0644] *** 2025-11-26 12:36:10,639 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.018) 0:18:08.473 **** 2025-11-26 12:36:10,639 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.018) 0:18:08.471 **** 2025-11-26 12:36:10,651 p=31864 u=zuul n=ansible | skipping: [compute-0] 2025-11-26 12:36:10,658 p=31864 u=zuul n=ansible | TASK [cifmw_nfs : Disable NFSv3-related services name={{ item }}, masked=True] *** 2025-11-26 12:36:10,658 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.019) 0:18:08.492 **** 2025-11-26 12:36:10,658 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.019) 0:18:08.491 **** 2025-11-26 12:36:10,675 p=31864 u=zuul n=ansible | skipping: [compute-0] => (item=rpc-statd.service) 2025-11-26 12:36:10,679 p=31864 u=zuul n=ansible | skipping: [compute-0] => (item=rpcbind.service) 2025-11-26 12:36:10,682 p=31864 u=zuul n=ansible | skipping: [compute-0] => (item=rpcbind.socket) 2025-11-26 12:36:10,682 p=31864 u=zuul n=ansible | skipping: [compute-0] 2025-11-26 12:36:10,688 p=31864 u=zuul n=ansible | TASK [cifmw_nfs : Ensure shared folder exist path=/data/{{ item }}, state=directory, mode=755] *** 2025-11-26 12:36:10,688 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.030) 0:18:08.522 **** 2025-11-26 12:36:10,688 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.030) 0:18:08.521 **** 2025-11-26 12:36:10,702 p=31864 u=zuul n=ansible | skipping: [compute-0] 2025-11-26 12:36:10,709 p=31864 u=zuul n=ansible | TASK [cifmw_nfs : Set nfs network vars _raw_params=oc get ipset {{ _nfs_host }} -n {{ _ipset_namespace }} -o jsonpath='{.status.reservations[?(@.network=="{{ _nfs_network_name }}")]}'] *** 2025-11-26 12:36:10,709 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.020) 0:18:08.543 **** 2025-11-26 12:36:10,709 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.020) 0:18:08.541 **** 2025-11-26 12:36:10,724 p=31864 u=zuul n=ansible | skipping: [compute-0] 2025-11-26 12:36:10,731 p=31864 u=zuul n=ansible | TASK [cifmw_nfs : Store nfs network vars dest={{ cifmw_basedir }}/artifacts/parameters/nfs-params.yml, content={{ { 'cifmw_nfs_ip': cifmw_nfs_network_out.stdout | from_json | json_query('address'), 'cifmw_nfs_network_range': cifmw_nfs_network_out.stdout | from_json | json_query('cidr') } | to_nice_yaml }}, mode=0644] *** 2025-11-26 12:36:10,731 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.022) 0:18:08.565 **** 2025-11-26 12:36:10,731 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.022) 0:18:08.563 **** 2025-11-26 12:36:10,746 p=31864 u=zuul n=ansible | skipping: [compute-0] 2025-11-26 12:36:10,752 p=31864 u=zuul n=ansible | TASK [cifmw_nfs : Generate nftables rules file content=add rule inet filter EDPM_INPUT tcp dport 2049 accept , dest={{ nftables_path }}/nfs-server.nft, mode=0666] *** 2025-11-26 12:36:10,752 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.021) 0:18:08.586 **** 2025-11-26 12:36:10,752 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.021) 0:18:08.585 **** 2025-11-26 12:36:10,765 p=31864 u=zuul n=ansible | skipping: [compute-0] 2025-11-26 12:36:10,771 p=31864 u=zuul n=ansible | TASK [cifmw_nfs : Update nftables.conf and include nfs rules at the bottom path={{ nftables_conf }}, line=include "{{ nftables_path }}/nfs-server.nft", insertafter=EOF] *** 2025-11-26 12:36:10,771 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.019) 0:18:08.605 **** 2025-11-26 12:36:10,771 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.019) 0:18:08.604 **** 2025-11-26 12:36:10,786 p=31864 u=zuul n=ansible | skipping: [compute-0] 2025-11-26 12:36:10,792 p=31864 u=zuul n=ansible | TASK [cifmw_nfs : Restart nftables service name=nftables, state=restarted] ***** 2025-11-26 12:36:10,792 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.020) 0:18:08.626 **** 2025-11-26 12:36:10,793 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.021) 0:18:08.625 **** 2025-11-26 12:36:10,806 p=31864 u=zuul n=ansible | skipping: [compute-0] 2025-11-26 12:36:10,812 p=31864 u=zuul n=ansible | TASK [cifmw_nfs : Configure the ip the nfs server should listen on path=/etc/nfs.conf, section=nfsd, option=host, value={{ cifmw_nfs_network_out.stdout | from_json | json_query('address') }}, backup=True, mode=0644] *** 2025-11-26 12:36:10,812 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.019) 0:18:08.646 **** 2025-11-26 12:36:10,812 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.019) 0:18:08.645 **** 2025-11-26 12:36:10,825 p=31864 u=zuul n=ansible | skipping: [compute-0] 2025-11-26 12:36:10,831 p=31864 u=zuul n=ansible | TASK [cifmw_nfs : Enable and restart nfs-server service name=nfs-server, state=restarted, enabled=True] *** 2025-11-26 12:36:10,831 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.019) 0:18:08.665 **** 2025-11-26 12:36:10,832 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.019) 0:18:08.664 **** 2025-11-26 12:36:10,844 p=31864 u=zuul n=ansible | skipping: [compute-0] 2025-11-26 12:36:10,850 p=31864 u=zuul n=ansible | TASK [cifmw_nfs : Add shares to /etc/exports path=/etc/exports, line=/data/{{ item }} {{ cifmw_nfs_network_out.stdout | from_json | json_query('cidr') }}(rw,sync,no_root_squash)] *** 2025-11-26 12:36:10,851 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.019) 0:18:08.684 **** 2025-11-26 12:36:10,851 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.019) 0:18:08.683 **** 2025-11-26 12:36:10,863 p=31864 u=zuul n=ansible | skipping: [compute-0] 2025-11-26 12:36:10,870 p=31864 u=zuul n=ansible | TASK [cifmw_nfs : Export the shares _raw_params=exportfs -a] ******************* 2025-11-26 12:36:10,870 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.019) 0:18:08.704 **** 2025-11-26 12:36:10,870 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.019) 0:18:08.702 **** 2025-11-26 12:36:10,884 p=31864 u=zuul n=ansible | skipping: [compute-0] 2025-11-26 12:36:10,914 p=31864 u=zuul n=ansible | PLAY [Clear ceph target hosts facts to force refreshing in HCI deployments] **** 2025-11-26 12:36:10,929 p=31864 u=zuul n=ansible | TASK [Early end if architecture deploy _raw_params=end_play] ******************* 2025-11-26 12:36:10,929 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.059) 0:18:08.763 **** 2025-11-26 12:36:10,929 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.059) 0:18:08.762 **** 2025-11-26 12:36:10,938 p=31864 u=zuul n=ansible | skipping: [compute-0] 2025-11-26 12:36:10,943 p=31864 u=zuul n=ansible | TASK [Clear ceph target hosts facts _raw_params=clear_facts] ******************* 2025-11-26 12:36:10,943 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.013) 0:18:08.777 **** 2025-11-26 12:36:10,943 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.013) 0:18:08.776 **** 2025-11-26 12:36:10,960 p=31864 u=zuul n=ansible | PLAY [Deploy ceph using hooks] ************************************************* 2025-11-26 12:36:10,975 p=31864 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-11-26 12:36:10,975 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.032) 0:18:08.809 **** 2025-11-26 12:36:10,976 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:10 +0000 (0:00:00.032) 0:18:08.808 **** 2025-11-26 12:36:11,017 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:36:11,023 p=31864 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-11-26 12:36:11,023 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:11 +0000 (0:00:00.047) 0:18:08.857 **** 2025-11-26 12:36:11,023 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:11 +0000 (0:00:00.047) 0:18:08.855 **** 2025-11-26 12:36:11,088 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:36:11,096 p=31864 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_ceph _raw_params={{ hook.type }}.yml] *** 2025-11-26 12:36:11,096 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:11 +0000 (0:00:00.072) 0:18:08.930 **** 2025-11-26 12:36:11,096 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:11 +0000 (0:00:00.072) 0:18:08.928 **** 2025-11-26 12:36:11,181 p=31864 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': '80 Run Ceph hook playbook', 'type': 'playbook', 'source': 'ceph.yml'}) 2025-11-26 12:36:11,189 p=31864 u=zuul n=ansible | TASK [run_hook : Set playbook path for 80 Run Ceph hook playbook cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-11-26 12:36:11,189 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:11 +0000 (0:00:00.093) 0:18:09.023 **** 2025-11-26 12:36:11,189 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:11 +0000 (0:00:00.093) 0:18:09.021 **** 2025-11-26 12:36:11,226 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:36:11,232 p=31864 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-11-26 12:36:11,232 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:11 +0000 (0:00:00.043) 0:18:09.066 **** 2025-11-26 12:36:11,232 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:11 +0000 (0:00:00.043) 0:18:09.065 **** 2025-11-26 12:36:11,396 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:36:11,403 p=31864 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-11-26 12:36:11,403 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:11 +0000 (0:00:00.170) 0:18:09.237 **** 2025-11-26 12:36:11,403 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:11 +0000 (0:00:00.170) 0:18:09.236 **** 2025-11-26 12:36:11,416 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:36:11,424 p=31864 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-11-26 12:36:11,424 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:11 +0000 (0:00:00.020) 0:18:09.258 **** 2025-11-26 12:36:11,424 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:11 +0000 (0:00:00.020) 0:18:09.256 **** 2025-11-26 12:36:11,575 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:36:11,582 p=31864 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-11-26 12:36:11,582 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:11 +0000 (0:00:00.158) 0:18:09.416 **** 2025-11-26 12:36:11,582 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:11 +0000 (0:00:00.158) 0:18:09.415 **** 2025-11-26 12:36:11,599 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:36:11,606 p=31864 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-11-26 12:36:11,606 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:11 +0000 (0:00:00.024) 0:18:09.440 **** 2025-11-26 12:36:11,607 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:11 +0000 (0:00:00.024) 0:18:09.439 **** 2025-11-26 12:36:11,760 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:36:11,767 p=31864 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-11-26 12:36:11,767 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:11 +0000 (0:00:00.160) 0:18:09.601 **** 2025-11-26 12:36:11,767 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:11 +0000 (0:00:00.160) 0:18:09.600 **** 2025-11-26 12:36:11,921 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:36:11,929 p=31864 u=zuul n=ansible | TASK [run_hook : Run hook without retry - 80 Run Ceph hook playbook] *********** 2025-11-26 12:36:11,929 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:11 +0000 (0:00:00.161) 0:18:09.763 **** 2025-11-26 12:36:11,929 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:36:11 +0000 (0:00:00.161) 0:18:09.762 **** 2025-11-26 12:36:11,972 p=31864 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_013_run_hook_without_retry_80_run.log 2025-11-26 12:39:45,145 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:39:45,179 p=31864 u=zuul n=ansible | TASK [run_hook : Run hook with retry - 80 Run Ceph hook playbook] ************** 2025-11-26 12:39:45,179 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:45 +0000 (0:03:33.250) 0:21:43.013 **** 2025-11-26 12:39:45,179 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:45 +0000 (0:03:33.250) 0:21:43.012 **** 2025-11-26 12:39:45,195 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:39:45,203 p=31864 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-11-26 12:39:45,203 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:45 +0000 (0:00:00.023) 0:21:43.037 **** 2025-11-26 12:39:45,203 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:45 +0000 (0:00:00.023) 0:21:43.036 **** 2025-11-26 12:39:45,351 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:39:45,358 p=31864 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-11-26 12:39:45,358 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:45 +0000 (0:00:00.154) 0:21:43.192 **** 2025-11-26 12:39:45,358 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:45 +0000 (0:00:00.154) 0:21:43.190 **** 2025-11-26 12:39:45,371 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:39:45,401 p=31864 u=zuul n=ansible | PLAY [Continue HCI deploy, deploy architecture and validate workflow] ********** 2025-11-26 12:39:45,428 p=31864 u=zuul n=ansible | TASK [Prepare for HCI deploy phase 2 name=hci_prepare, tasks_from=phase2.yml] *** 2025-11-26 12:39:45,428 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:45 +0000 (0:00:00.070) 0:21:43.262 **** 2025-11-26 12:39:45,428 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:45 +0000 (0:00:00.070) 0:21:43.260 **** 2025-11-26 12:39:45,471 p=31864 u=zuul n=ansible | TASK [hci_prepare : Set common facts _cifmw_hci_prepare_namespace={{ cifmw_install_yamls_defaults.NAMESPACE | default(cifmw_hci_prepare_namespace) }}] *** 2025-11-26 12:39:45,471 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:45 +0000 (0:00:00.043) 0:21:43.305 **** 2025-11-26 12:39:45,472 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:45 +0000 (0:00:00.043) 0:21:43.304 **** 2025-11-26 12:39:45,493 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:39:45,500 p=31864 u=zuul n=ansible | TASK [hci_prepare : Ensure directories path={{ item }}, state=directory, mode=0755] *** 2025-11-26 12:39:45,500 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:45 +0000 (0:00:00.028) 0:21:43.334 **** 2025-11-26 12:39:45,500 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:45 +0000 (0:00:00.028) 0:21:43.333 **** 2025-11-26 12:39:45,671 p=31864 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts) 2025-11-26 12:39:45,832 p=31864 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/manifests/kustomizations/dataplane) 2025-11-26 12:39:45,840 p=31864 u=zuul n=ansible | TASK [hci_prepare : Create ceph config secret output_dir={{ cifmw_hci_prepare_basedir }}/artifacts, script=oc apply -f {{ cifmw_hci_prepare_ceph_secret_path }}] *** 2025-11-26 12:39:45,840 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:45 +0000 (0:00:00.339) 0:21:43.674 **** 2025-11-26 12:39:45,840 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:45 +0000 (0:00:00.339) 0:21:43.672 **** 2025-11-26 12:39:45,881 p=31864 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_016_create_ceph_config.log 2025-11-26 12:39:46,051 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:39:46,059 p=31864 u=zuul n=ansible | TASK [hci_prepare : Set Ceph FSID fact cifmw_hci_prepare_ceph_fsid={{ (lookup('template', cifmw_hci_prepare_ceph_secret_path)|from_yaml).data['ceph.conf'] | b64decode | regex_search('fsid = (.*)', '\1') | first | trim }}] *** 2025-11-26 12:39:46,059 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:46 +0000 (0:00:00.219) 0:21:43.893 **** 2025-11-26 12:39:46,059 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:46 +0000 (0:00:00.219) 0:21:43.891 **** 2025-11-26 12:39:46,131 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:39:46,138 p=31864 u=zuul n=ansible | TASK [hci_prepare : Generate nova config map src=templates/configmap-ceph-nova.yml.j2, dest={{ cifmw_hci_prepare_basedir }}/artifacts/configmap-ceph-nova.yml, mode=0644] *** 2025-11-26 12:39:46,138 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:46 +0000 (0:00:00.078) 0:21:43.972 **** 2025-11-26 12:39:46,138 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:46 +0000 (0:00:00.078) 0:21:43.970 **** 2025-11-26 12:39:46,478 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:39:46,485 p=31864 u=zuul n=ansible | TASK [hci_prepare : Create nova config map output_dir={{ cifmw_hci_prepare_basedir }}/artifacts, script=oc apply -f {{ cifmw_hci_prepare_basedir }}/artifacts/configmap-ceph-nova.yml] *** 2025-11-26 12:39:46,485 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:46 +0000 (0:00:00.347) 0:21:44.319 **** 2025-11-26 12:39:46,485 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:46 +0000 (0:00:00.347) 0:21:44.318 **** 2025-11-26 12:39:46,528 p=31864 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_017_create_nova_config.log 2025-11-26 12:39:46,700 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:39:46,707 p=31864 u=zuul n=ansible | TASK [hci_prepare : Generate Ceph-Nova Dataplane Service src=templates/dpservice-nova-custom-ceph.yml.j2, dest={{ cifmw_hci_prepare_basedir }}/artifacts/dpservice-nova-custom-ceph.yml, mode=0644] *** 2025-11-26 12:39:46,707 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:46 +0000 (0:00:00.221) 0:21:44.541 **** 2025-11-26 12:39:46,707 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:46 +0000 (0:00:00.221) 0:21:44.540 **** 2025-11-26 12:39:47,045 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:39:47,052 p=31864 u=zuul n=ansible | TASK [hci_prepare : Create Ceph-Nova Dataplane Service output_dir={{ cifmw_hci_prepare_basedir }}/artifacts, script=oc apply -f {{ cifmw_hci_prepare_basedir }}/artifacts/dpservice-nova-custom-ceph.yml] *** 2025-11-26 12:39:47,052 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:47 +0000 (0:00:00.344) 0:21:44.886 **** 2025-11-26 12:39:47,052 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:47 +0000 (0:00:00.344) 0:21:44.884 **** 2025-11-26 12:39:47,094 p=31864 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_018_create_ceph_nova_dataplane.log 2025-11-26 12:39:47,258 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:39:47,265 p=31864 u=zuul n=ansible | TASK [hci_prepare : Delete OpenStackDataPlaneDeployment output_dir={{ cifmw_hci_prepare_basedir }}/artifacts, script=oc delete OpenStackDataPlaneDeployment --all -n {{ _cifmw_hci_prepare_namespace }}] *** 2025-11-26 12:39:47,265 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:47 +0000 (0:00:00.213) 0:21:45.099 **** 2025-11-26 12:39:47,265 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:47 +0000 (0:00:00.213) 0:21:45.098 **** 2025-11-26 12:39:47,306 p=31864 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_019_delete.log 2025-11-26 12:39:47,470 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:39:47,478 p=31864 u=zuul n=ansible | TASK [hci_prepare : Create configuration to finish HCI deployment mode=0644, dest={{ cifmw_hci_prepare_dataplane_dir }}/87-hci-post-kustomization.yaml, content=apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization resources: namespace: {{ _cifmw_hci_prepare_namespace }} patches: - target: kind: OpenStackDataPlaneNodeSet patch: |- - op: add path: /spec/nodeTemplate/extraMounts value: - extraVolType: Ceph volumes: - name: ceph secret: secretName: ceph-conf-files mounts: - name: ceph mountPath: "/etc/ceph" readOnly: true - op: replace path: /spec/services value: {% if cifmw_hci_prepare_enable_repo_setup_service|bool %} - repo-setup {% endif %} - bootstrap - configure-network - validate-network - install-os - ceph-hci-pre - configure-os - ssh-known-hosts - run-os - reboot-os - install-certs - ceph-client - ovn - neutron-metadata - libvirt - nova-custom-ceph {% if cifmw_hci_prepare_extra_services | length > 0 %} {% for svc in cifmw_hci_prepare_extra_services %} - {{ svc }} {% endfor %} {% endif %}] *** 2025-11-26 12:39:47,478 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:47 +0000 (0:00:00.212) 0:21:45.312 **** 2025-11-26 12:39:47,478 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:47 +0000 (0:00:00.212) 0:21:45.310 **** 2025-11-26 12:39:47,811 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:39:47,818 p=31864 u=zuul n=ansible | TASK [hci_prepare : Enabled nova discover_hosts after deployment cifmw_edpm_deploy_skip_nova_discover_hosts=False] *** 2025-11-26 12:39:47,818 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:47 +0000 (0:00:00.340) 0:21:45.652 **** 2025-11-26 12:39:47,819 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:47 +0000 (0:00:00.340) 0:21:45.651 **** 2025-11-26 12:39:47,839 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:39:47,847 p=31864 u=zuul n=ansible | TASK [hci_prepare : Save HCI info mode=0644, dest={{ cifmw_hci_prepare_basedir }}/artifacts/parameters/hci_prepare_phase2_params.yml, content={{ file_content | to_nice_yaml }}] *** 2025-11-26 12:39:47,847 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:47 +0000 (0:00:00.028) 0:21:45.681 **** 2025-11-26 12:39:47,847 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:47 +0000 (0:00:00.028) 0:21:45.679 **** 2025-11-26 12:39:48,177 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:39:48,189 p=31864 u=zuul n=ansible | TASK [Continue HCI deployment name=edpm_deploy] ******************************** 2025-11-26 12:39:48,189 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:48 +0000 (0:00:00.342) 0:21:46.023 **** 2025-11-26 12:39:48,189 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:48 +0000 (0:00:00.342) 0:21:46.022 **** 2025-11-26 12:39:48,244 p=31864 u=zuul n=ansible | TASK [edpm_deploy : Set EDPM related vars cifmw_edpm_deploy_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine({'DATAPLANE_REGISTRY_URL': cifmw_edpm_deploy_registry_url }) | combine({'DATAPLANE_CONTAINER_TAG': cifmw_repo_setup_full_hash | default(cifmw_install_yamls_defaults['DATAPLANE_CONTAINER_TAG']) }) | combine(cifmw_edpm_deploy_extra_vars | default({})) | combine(_install_yamls_repos | default({})) }}, cacheable=True] *** 2025-11-26 12:39:48,244 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:48 +0000 (0:00:00.054) 0:21:46.078 **** 2025-11-26 12:39:48,244 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:48 +0000 (0:00:00.054) 0:21:46.077 **** 2025-11-26 12:39:48,275 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:39:48,281 p=31864 u=zuul n=ansible | TASK [edpm_deploy : Create the config file mode=0644, content={{ cifmw_edpm_deploy_nova_compute_extra_config }}, dest={{ _cifmw_edpm_deploy_nova_extra_config_file }}] *** 2025-11-26 12:39:48,281 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:48 +0000 (0:00:00.037) 0:21:46.115 **** 2025-11-26 12:39:48,281 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:48 +0000 (0:00:00.037) 0:21:46.114 **** 2025-11-26 12:39:48,618 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:39:48,625 p=31864 u=zuul n=ansible | TASK [edpm_deploy : Define DATAPLANE_EXTRA_NOVA_CONFIG_FILE cifmw_edpm_deploy_env={{ cifmw_edpm_deploy_env | default({}) | combine({'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': _cifmw_edpm_deploy_nova_extra_config_file }) }}, cacheable=True] *** 2025-11-26 12:39:48,625 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:48 +0000 (0:00:00.343) 0:21:46.459 **** 2025-11-26 12:39:48,625 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:48 +0000 (0:00:00.343) 0:21:46.458 **** 2025-11-26 12:39:48,655 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:39:48,661 p=31864 u=zuul n=ansible | TASK [Prepare OpenStack Dataplane NodeSet CR name=install_yamls_makes, tasks_from=make_edpm_deploy_prep] *** 2025-11-26 12:39:48,661 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:48 +0000 (0:00:00.035) 0:21:46.495 **** 2025-11-26 12:39:48,661 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:48 +0000 (0:00:00.035) 0:21:46.494 **** 2025-11-26 12:39:48,679 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:39:48,687 p=31864 u=zuul n=ansible | TASK [edpm_deploy : Perform kustomizations to the OpenStackDataPlaneNodeSet CR target_path={{ cifmw_edpm_deploy_openstack_crs_path }}, sort_ascending=False, kustomizations_paths={{ [ ( [ cifmw_edpm_deploy_manifests_dir, 'kustomizations', 'dataplane' ] | ansible.builtin.path_join ) ] }}] *** 2025-11-26 12:39:48,687 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:48 +0000 (0:00:00.025) 0:21:46.521 **** 2025-11-26 12:39:48,687 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:48 +0000 (0:00:00.025) 0:21:46.520 **** 2025-11-26 12:39:49,276 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:39:49,284 p=31864 u=zuul n=ansible | TASK [edpm_deploy : Log the CR that is about to be applied var=cifmw_edpm_deploy_crs_kustomize_result] *** 2025-11-26 12:39:49,284 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:49 +0000 (0:00:00.596) 0:21:47.118 **** 2025-11-26 12:39:49,284 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:49 +0000 (0:00:00.596) 0:21:47.116 **** 2025-11-26 12:39:49,313 p=31864 u=zuul n=ansible | ok: [localhost] => cifmw_edpm_deploy_crs_kustomize_result: changed: true count: 5 failed: false kustomizations_paths: - /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/dataplane/99-kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/dataplane/89-storage-mgmt-kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/dataplane/88-hci-pre-kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/dataplane/87-hci-post-kustomization.yaml output_path: /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/cifmw-kustomization-result.yaml result: - apiVersion: v1 data: network_config_template: | --- {% set mtu_list = [ctlplane_mtu] %} {% for network in nodeset_networks %} {% set _ = mtu_list.append(lookup('vars', networks_lower[network] ~ '_mtu')) %} {%- endfor %} {% set min_viable_mtu = mtu_list | max %} network_config: - type: ovs_bridge name: {{ neutron_physical_bridge_name }} mtu: {{ min_viable_mtu }} use_dhcp: false dns_servers: {{ ctlplane_dns_nameservers }} domain: {{ dns_search_domains }} addresses: - ip_netmask: {{ ctlplane_ip }}/{{ ctlplane_cidr }} routes: {{ ctlplane_host_routes }} members: - type: interface name: nic1 mtu: {{ min_viable_mtu }} # force the MAC address of the bridge to this interface primary: true {% for network in nodeset_networks %} - type: vlan mtu: {{ lookup('vars', networks_lower[network] ~ '_mtu') }} vlan_id: {{ lookup('vars', networks_lower[network] ~ '_vlan_id') }} addresses: - ip_netmask: {{ lookup('vars', networks_lower[network] ~ '_ip') }}/{{ lookup('vars', networks_lower[network] ~ '_cidr') }} routes: {{ lookup('vars', networks_lower[network] ~ '_host_routes') }} {% endfor %} kind: ConfigMap metadata: labels: created-by: install_yamls name: network-config-template-ipam namespace: openstack - apiVersion: v1 data: physical_bridge_name: br-ex public_interface_name: eth0 kind: ConfigMap metadata: labels: created-by: install_yamls name: neutron-edpm-ipam namespace: openstack - apiVersion: v1 data: 25-nova-extra.conf: '' kind: ConfigMap metadata: labels: created-by: install_yamls name: nova-extra-config namespace: openstack - apiVersion: dataplane.openstack.org/v1beta1 kind: OpenStackDataPlaneDeployment metadata: labels: created-by: install_yamls name: edpm-deployment namespace: openstack spec: nodeSets: - openstack-edpm-ipam - apiVersion: dataplane.openstack.org/v1beta1 kind: OpenStackDataPlaneNodeSet metadata: labels: created-by: install_yamls name: openstack-edpm-ipam namespace: openstack spec: env: - name: ANSIBLE_VERBOSITY value: '2' networkAttachments: - ctlplane nodeTemplate: ansible: ansibleUser: zuul ansibleVars: ctlplane_dns_nameservers: - 192.168.122.10 - 1.1.1.1 edpm_container_registry_insecure_registries: - 38.102.83.98:5001 edpm_network_config_debug: true edpm_network_config_template: |- --- {% set mtu_list = [ctlplane_mtu] %} {% for network in nodeset_networks %} {% set _ = mtu_list.append(lookup('vars', networks_lower[network] ~ '_mtu')) %} {%- endfor %} {% set min_viable_mtu = mtu_list | max %} network_config: - type: interface name: nic1 use_dhcp: true mtu: {{ min_viable_mtu }} - type: ovs_bridge name: {{ neutron_physical_bridge_name }} mtu: {{ min_viable_mtu }} use_dhcp: false dns_servers: {{ ctlplane_dns_nameservers }} domain: {{ dns_search_domains }} addresses: - ip_netmask: {{ ctlplane_ip }}/{{ ctlplane_cidr }} routes: {{ ctlplane_host_routes }} members: - type: interface name: nic2 mtu: {{ min_viable_mtu }} # force the MAC address of the bridge to this interface primary: true {% if edpm_network_config_nmstate | bool %} # this ovs_extra configuration fixes OSPRH-17551, but it will be not needed when FDP-1472 is resolved ovs_extra: - "set interface eth1 external-ids:ovn-egress-iface=true" {% endif %} {% for network in nodeset_networks %} - type: vlan mtu: {{ lookup('vars', networks_lower[network] ~ '_mtu') }} vlan_id: {{ lookup('vars', networks_lower[network] ~ '_vlan_id') }} addresses: - ip_netmask: {{ lookup('vars', networks_lower[network] ~ '_ip') }}/{{ lookup('vars', networks_lower[network] ~ '_cidr') }} routes: {{ lookup('vars', networks_lower[network] ~ '_host_routes') }} {% endfor %} edpm_nodes_validation_validate_controllers_icmp: false edpm_nodes_validation_validate_gateway_icmp: false edpm_os_net_config_mappings: net_config_data_lookup: edpm-compute: nic2: eth1 edpm_sshd_allowed_ranges: - 0.0.0.0/0 enable_debug: false gather_facts: false image_prefix: openstack image_tag: 7b76510d5d5adf2ccf627d29bb9dae76 neutron_public_interface_name: eth1 registry_url: quay.io/podified-antelope-centos9 timesync_ntp_servers: - hostname: pool.ntp.org ansibleVarsFrom: - configMapRef: name: network-config-template-ipam prefix: edpm_ - configMapRef: name: neutron-edpm-ipam prefix: neutron_ ansibleSSHPrivateKeySecret: dataplane-ansible-ssh-private-key-secret extraMounts: - extraVolType: Ceph mounts: - mountPath: /etc/ceph name: ceph readOnly: true volumes: - name: ceph secret: secretName: ceph-conf-files nodes: edpm-compute-0: ansible: ansibleHost: 192.168.122.100 hostName: compute-0 networks: - defaultRoute: false fixedIP: 192.168.122.100 name: ctlplane subnetName: subnet1 - name: internalapi subnetName: subnet1 - name: storage subnetName: subnet1 - name: tenant subnetName: subnet1 - name: StorageMgmt subnetName: subnet1 preProvisioned: true services: - repo-setup - bootstrap - configure-network - validate-network - install-os - ceph-hci-pre - configure-os - ssh-known-hosts - run-os - reboot-os - install-certs - ceph-client - ovn - neutron-metadata - libvirt - nova-custom-ceph tlsEnabled: true 2025-11-26 12:39:49,321 p=31864 u=zuul n=ansible | TASK [edpm_deploy : Apply dataplane resources but ignore DataPlaneDeployment kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, definition={{ lookup('file', cifmw_edpm_deploy_crs_kustomize_result.output_path) | from_yaml_all | rejectattr('kind', 'search', cifmw_edpm_deploy_step2_kind) }}] *** 2025-11-26 12:39:49,321 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:49 +0000 (0:00:00.036) 0:21:47.155 **** 2025-11-26 12:39:49,321 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:49 +0000 (0:00:00.037) 0:21:47.153 **** 2025-11-26 12:39:49,982 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:39:49,990 p=31864 u=zuul n=ansible | TASK [edpm_deploy : Wait for OpenStackDataPlaneNodeSet become SetupReady _raw_params=oc wait OpenStackDataPlaneNodeSet {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=SetupReady --timeout={{ cifmw_edpm_deploy_timeout }}m] *** 2025-11-26 12:39:49,990 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:49 +0000 (0:00:00.669) 0:21:47.824 **** 2025-11-26 12:39:49,990 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:49 +0000 (0:00:00.669) 0:21:47.823 **** 2025-11-26 12:39:50,355 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:39:50,362 p=31864 u=zuul n=ansible | TASK [edpm_deploy : Apply DataPlaneDeployment resource kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, definition={{ lookup('file', cifmw_edpm_deploy_crs_kustomize_result.output_path) | from_yaml_all | selectattr('kind', 'search', cifmw_edpm_deploy_step2_kind) }}] *** 2025-11-26 12:39:50,362 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:50 +0000 (0:00:00.371) 0:21:48.196 **** 2025-11-26 12:39:50,362 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:50 +0000 (0:00:00.371) 0:21:48.195 **** 2025-11-26 12:39:50,961 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:39:50,968 p=31864 u=zuul n=ansible | TASK [edpm_deploy : Wait for OpenStackDataPlaneDeployment become Ready _raw_params=oc wait OpenStackDataPlaneDeployment {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=Ready --timeout={{ cifmw_edpm_deploy_timeout }}m] *** 2025-11-26 12:39:50,968 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:50 +0000 (0:00:00.606) 0:21:48.802 **** 2025-11-26 12:39:50,968 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:39:50 +0000 (0:00:00.606) 0:21:48.801 **** 2025-11-26 12:51:25,156 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:51:25,162 p=31864 u=zuul n=ansible | TASK [edpm_deploy : Run nova-manage discover_hosts to ensure compute nodes are mapped output_dir={{ cifmw_basedir }}/artifacts, executable=/bin/bash, script=set -xe oc rsh --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} nova-cell0-conductor-0 nova-manage cell_v2 discover_hosts --verbose ] *** 2025-11-26 12:51:25,162 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:25 +0000 (0:11:34.194) 0:33:22.996 **** 2025-11-26 12:51:25,162 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:25 +0000 (0:11:34.194) 0:33:22.995 **** 2025-11-26 12:51:25,198 p=31864 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_020_run_nova_manage_discover.log 2025-11-26 12:51:27,218 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:51:27,226 p=31864 u=zuul n=ansible | TASK [Validate EDPM name=install_yamls_makes, tasks_from=make_edpm_deploy_instance] *** 2025-11-26 12:51:27,226 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:27 +0000 (0:00:02.063) 0:33:25.060 **** 2025-11-26 12:51:27,226 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:27 +0000 (0:00:02.064) 0:33:25.059 **** 2025-11-26 12:51:27,245 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:51:27,257 p=31864 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-11-26 12:51:27,257 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:27 +0000 (0:00:00.030) 0:33:25.091 **** 2025-11-26 12:51:27,257 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:27 +0000 (0:00:00.030) 0:33:25.090 **** 2025-11-26 12:51:27,302 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:51:27,309 p=31864 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-11-26 12:51:27,309 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:27 +0000 (0:00:00.052) 0:33:25.143 **** 2025-11-26 12:51:27,309 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:27 +0000 (0:00:00.052) 0:33:25.142 **** 2025-11-26 12:51:27,379 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:51:27,387 p=31864 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_deploy _raw_params={{ hook.type }}.yml] *** 2025-11-26 12:51:27,387 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:27 +0000 (0:00:00.078) 0:33:25.221 **** 2025-11-26 12:51:27,387 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:27 +0000 (0:00:00.078) 0:33:25.220 **** 2025-11-26 12:51:27,484 p=31864 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': '81 Kustomize OpenStack CR with Ceph', 'type': 'playbook', 'source': 'control_plane_ceph_backends.yml'}) 2025-11-26 12:51:27,492 p=31864 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': '82 Kustomize and update Control Plane', 'type': 'playbook', 'source': 'control_plane_kustomize_deploy.yml'}) 2025-11-26 12:51:27,503 p=31864 u=zuul n=ansible | TASK [run_hook : Set playbook path for 81 Kustomize OpenStack CR with Ceph cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-11-26 12:51:27,503 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:27 +0000 (0:00:00.115) 0:33:25.337 **** 2025-11-26 12:51:27,503 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:27 +0000 (0:00:00.115) 0:33:25.335 **** 2025-11-26 12:51:27,542 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:51:27,548 p=31864 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-11-26 12:51:27,548 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:27 +0000 (0:00:00.045) 0:33:25.382 **** 2025-11-26 12:51:27,548 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:27 +0000 (0:00:00.045) 0:33:25.381 **** 2025-11-26 12:51:27,711 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:51:27,718 p=31864 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-11-26 12:51:27,719 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:27 +0000 (0:00:00.170) 0:33:25.552 **** 2025-11-26 12:51:27,719 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:27 +0000 (0:00:00.170) 0:33:25.551 **** 2025-11-26 12:51:27,734 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:51:27,742 p=31864 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-11-26 12:51:27,742 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:27 +0000 (0:00:00.023) 0:33:25.576 **** 2025-11-26 12:51:27,742 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:27 +0000 (0:00:00.023) 0:33:25.575 **** 2025-11-26 12:51:27,901 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:51:27,908 p=31864 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-11-26 12:51:27,908 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:27 +0000 (0:00:00.165) 0:33:25.742 **** 2025-11-26 12:51:27,908 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:27 +0000 (0:00:00.165) 0:33:25.740 **** 2025-11-26 12:51:27,927 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:51:27,935 p=31864 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-11-26 12:51:27,935 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:27 +0000 (0:00:00.027) 0:33:25.769 **** 2025-11-26 12:51:27,935 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:27 +0000 (0:00:00.027) 0:33:25.768 **** 2025-11-26 12:51:28,094 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:51:28,101 p=31864 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-11-26 12:51:28,101 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:28 +0000 (0:00:00.166) 0:33:25.935 **** 2025-11-26 12:51:28,101 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:28 +0000 (0:00:00.166) 0:33:25.934 **** 2025-11-26 12:51:28,260 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:51:28,268 p=31864 u=zuul n=ansible | TASK [run_hook : Run hook without retry - 81 Kustomize OpenStack CR with Ceph] *** 2025-11-26 12:51:28,268 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:28 +0000 (0:00:00.167) 0:33:26.102 **** 2025-11-26 12:51:28,268 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:28 +0000 (0:00:00.167) 0:33:26.101 **** 2025-11-26 12:51:28,313 p=31864 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_021_run_hook_without_retry_81.log 2025-11-26 12:51:29,787 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:51:29,794 p=31864 u=zuul n=ansible | TASK [run_hook : Run hook with retry - 81 Kustomize OpenStack CR with Ceph] **** 2025-11-26 12:51:29,795 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:29 +0000 (0:00:01.526) 0:33:27.628 **** 2025-11-26 12:51:29,795 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:29 +0000 (0:00:01.526) 0:33:27.627 **** 2025-11-26 12:51:29,813 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:51:29,821 p=31864 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-11-26 12:51:29,821 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:29 +0000 (0:00:00.026) 0:33:27.655 **** 2025-11-26 12:51:29,821 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:29 +0000 (0:00:00.026) 0:33:27.653 **** 2025-11-26 12:51:29,969 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:51:29,977 p=31864 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-11-26 12:51:29,978 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:29 +0000 (0:00:00.156) 0:33:27.811 **** 2025-11-26 12:51:29,978 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:29 +0000 (0:00:00.156) 0:33:27.810 **** 2025-11-26 12:51:29,995 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:51:30,004 p=31864 u=zuul n=ansible | TASK [run_hook : Set playbook path for 82 Kustomize and update Control Plane cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-11-26 12:51:30,004 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:30 +0000 (0:00:00.026) 0:33:27.838 **** 2025-11-26 12:51:30,005 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:30 +0000 (0:00:00.026) 0:33:27.837 **** 2025-11-26 12:51:30,044 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:51:30,051 p=31864 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-11-26 12:51:30,051 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:30 +0000 (0:00:00.046) 0:33:27.885 **** 2025-11-26 12:51:30,051 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:30 +0000 (0:00:00.046) 0:33:27.884 **** 2025-11-26 12:51:30,214 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:51:30,222 p=31864 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-11-26 12:51:30,222 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:30 +0000 (0:00:00.170) 0:33:28.056 **** 2025-11-26 12:51:30,222 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:30 +0000 (0:00:00.170) 0:33:28.055 **** 2025-11-26 12:51:30,238 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:51:30,246 p=31864 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-11-26 12:51:30,246 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:30 +0000 (0:00:00.024) 0:33:28.080 **** 2025-11-26 12:51:30,246 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:30 +0000 (0:00:00.024) 0:33:28.079 **** 2025-11-26 12:51:30,405 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:51:30,412 p=31864 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-11-26 12:51:30,412 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:30 +0000 (0:00:00.165) 0:33:28.246 **** 2025-11-26 12:51:30,412 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:30 +0000 (0:00:00.165) 0:33:28.245 **** 2025-11-26 12:51:30,431 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:51:30,439 p=31864 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-11-26 12:51:30,439 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:30 +0000 (0:00:00.026) 0:33:28.273 **** 2025-11-26 12:51:30,439 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:30 +0000 (0:00:00.026) 0:33:28.271 **** 2025-11-26 12:51:30,598 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:51:30,605 p=31864 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-11-26 12:51:30,605 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:30 +0000 (0:00:00.166) 0:33:28.439 **** 2025-11-26 12:51:30,605 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:30 +0000 (0:00:00.166) 0:33:28.438 **** 2025-11-26 12:51:30,766 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:51:30,774 p=31864 u=zuul n=ansible | TASK [run_hook : Run hook without retry - 82 Kustomize and update Control Plane] *** 2025-11-26 12:51:30,774 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:30 +0000 (0:00:00.169) 0:33:28.608 **** 2025-11-26 12:51:30,774 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:51:30 +0000 (0:00:00.169) 0:33:28.607 **** 2025-11-26 12:51:30,820 p=31864 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_022_run_hook_without_retry_82.log 2025-11-26 12:52:45,515 p=31864 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:52:45,522 p=31864 u=zuul n=ansible | TASK [run_hook : Run hook with retry - 82 Kustomize and update Control Plane] *** 2025-11-26 12:52:45,522 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:52:45 +0000 (0:01:14.747) 0:34:43.356 **** 2025-11-26 12:52:45,522 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:52:45 +0000 (0:01:14.747) 0:34:43.354 **** 2025-11-26 12:52:45,537 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:52:45,544 p=31864 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-11-26 12:52:45,544 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:52:45 +0000 (0:00:00.022) 0:34:43.378 **** 2025-11-26 12:52:45,544 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:52:45 +0000 (0:00:00.022) 0:34:43.377 **** 2025-11-26 12:52:45,687 p=31864 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:52:45,694 p=31864 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-11-26 12:52:45,694 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:52:45 +0000 (0:00:00.149) 0:34:43.528 **** 2025-11-26 12:52:45,694 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:52:45 +0000 (0:00:00.149) 0:34:43.527 **** 2025-11-26 12:52:45,708 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:52:45,720 p=31864 u=zuul n=ansible | TASK [Run validations name=validations] **************************************** 2025-11-26 12:52:45,720 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:52:45 +0000 (0:00:00.026) 0:34:43.554 **** 2025-11-26 12:52:45,720 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:52:45 +0000 (0:00:00.026) 0:34:43.553 **** 2025-11-26 12:52:45,734 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:52:45,746 p=31864 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-11-26 12:52:45,746 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:52:45 +0000 (0:00:00.025) 0:34:43.580 **** 2025-11-26 12:52:45,746 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:52:45 +0000 (0:00:00.025) 0:34:43.579 **** 2025-11-26 12:52:45,758 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:52:45,764 p=31864 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-11-26 12:52:45,764 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:52:45 +0000 (0:00:00.018) 0:34:43.598 **** 2025-11-26 12:52:45,764 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:52:45 +0000 (0:00:00.018) 0:34:43.597 **** 2025-11-26 12:52:45,778 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:52:45,786 p=31864 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_deploy _raw_params={{ hook.type }}.yml] *** 2025-11-26 12:52:45,786 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:52:45 +0000 (0:00:00.021) 0:34:43.620 **** 2025-11-26 12:52:45,786 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:52:45 +0000 (0:00:00.021) 0:34:43.618 **** 2025-11-26 12:52:45,856 p=31864 u=zuul n=ansible | skipping: [localhost] => (item={'name': '61 HCI pre deploy kustomizations', 'source': 'control_plane_hci_pre_deploy.yml', 'type': 'playbook'}) 2025-11-26 12:52:45,859 p=31864 u=zuul n=ansible | skipping: [localhost] => (item={'name': '80 Kustomize OpenStack CR', 'source': 'control_plane_horizon.yml', 'type': 'playbook'}) 2025-11-26 12:52:45,860 p=31864 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:52:45,871 p=31864 u=zuul n=ansible | TASK [Early end if not architecture deploy _raw_params=end_play] *************** 2025-11-26 12:52:45,871 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:52:45 +0000 (0:00:00.085) 0:34:43.705 **** 2025-11-26 12:52:45,871 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:52:45 +0000 (0:00:00.085) 0:34:43.704 **** 2025-11-26 12:52:45,879 p=31864 u=zuul n=ansible | PLAY RECAP ********************************************************************* 2025-11-26 12:52:45,879 p=31864 u=zuul n=ansible | compute-0 : ok=0 changed=0 unreachable=0 failed=0 skipped=14 rescued=0 ignored=0 2025-11-26 12:52:45,879 p=31864 u=zuul n=ansible | localhost : ok=278 changed=93 unreachable=0 failed=0 skipped=163 rescued=0 ignored=1 2025-11-26 12:52:45,880 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:52:45 +0000 (0:00:00.008) 0:34:43.713 **** 2025-11-26 12:52:45,880 p=31864 u=zuul n=ansible | =============================================================================== 2025-11-26 12:52:45,880 p=31864 u=zuul n=ansible | edpm_deploy : Wait for OpenStackDataPlaneDeployment become Ready ------ 694.19s 2025-11-26 12:52:45,880 p=31864 u=zuul n=ansible | edpm_deploy : Wait for OpenStackDataPlaneDeployment become Ready ------ 406.05s 2025-11-26 12:52:45,880 p=31864 u=zuul n=ansible | edpm_prepare : Wait for OpenStack controlplane to be deployed --------- 235.44s 2025-11-26 12:52:45,880 p=31864 u=zuul n=ansible | run_hook : Run hook without retry - 80 Run Ceph hook playbook --------- 213.25s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | install_yamls_makes : Run openstack ----------------------------------- 124.20s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | run_hook : Run hook without retry - 82 Kustomize and update Control Plane -- 74.75s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | install_yamls_makes : Run openstack_init ------------------------------- 67.01s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | edpm_prepare : Wait for OpenStack subscription creation ---------------- 30.55s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | repo_setup : Check for gating.repo file on content provider ------------ 30.45s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | run_hook : Run hook without retry - Download needed tools -------------- 30.28s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | edpm_prepare : Wait for control plane to change its status ------------- 30.04s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | ci_setup : Install needed packages ------------------------------------- 24.45s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | cert_manager : Wait for cert-manager pods to be ready ------------------ 11.80s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | repo_setup : Initialize python venv and install requirements ------------ 8.24s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | run_hook : Run hook without retry - Fetch nodes facts and save them as parameters --- 7.54s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | install_yamls_makes : Run edpm_deploy_prep ------------------------------ 6.43s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | ci_setup : Install openshift client ------------------------------------- 6.16s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | ci_local_storage : Perform action in the PV directory ------------------- 4.23s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | install_yamls_makes : Run netconfig_deploy ------------------------------ 3.57s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | cert_manager : Install cert-manager from release manifest --------------- 2.12s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | Wednesday 26 November 2025 12:52:45 +0000 (0:00:00.009) 0:34:43.714 **** 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | =============================================================================== 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | edpm_deploy ---------------------------------------------------------- 1108.08s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | run_hook -------------------------------------------------------------- 343.14s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | edpm_prepare ---------------------------------------------------------- 299.62s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | install_yamls_makes --------------------------------------------------- 203.56s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | repo_setup ------------------------------------------------------------- 45.64s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | ci_setup --------------------------------------------------------------- 32.51s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | cert_manager ----------------------------------------------------------- 17.72s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | ci_local_storage -------------------------------------------------------- 8.86s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | hci_prepare ------------------------------------------------------------- 4.04s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | openshift_setup --------------------------------------------------------- 3.94s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | install_ca -------------------------------------------------------------- 3.60s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | openshift_login --------------------------------------------------------- 2.99s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | install_yamls ----------------------------------------------------------- 2.59s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | cifmw_setup ------------------------------------------------------------- 1.88s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | discover_latest_image --------------------------------------------------- 1.50s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | gather_facts ------------------------------------------------------------ 0.91s 2025-11-26 12:52:45,881 p=31864 u=zuul n=ansible | install_openstack_ca ---------------------------------------------------- 0.91s 2025-11-26 12:52:45,882 p=31864 u=zuul n=ansible | edpm_deploy_baremetal --------------------------------------------------- 0.59s 2025-11-26 12:52:45,882 p=31864 u=zuul n=ansible | cifmw_nfs --------------------------------------------------------------- 0.33s 2025-11-26 12:52:45,882 p=31864 u=zuul n=ansible | operator_build ---------------------------------------------------------- 0.29s 2025-11-26 12:52:45,882 p=31864 u=zuul n=ansible | networking_mapper ------------------------------------------------------- 0.27s 2025-11-26 12:52:45,882 p=31864 u=zuul n=ansible | libvirt_manager --------------------------------------------------------- 0.26s 2025-11-26 12:52:45,882 p=31864 u=zuul n=ansible | ansible.builtin.file ---------------------------------------------------- 0.25s 2025-11-26 12:52:45,882 p=31864 u=zuul n=ansible | ansible.builtin.include_tasks ------------------------------------------- 0.06s 2025-11-26 12:52:45,882 p=31864 u=zuul n=ansible | ansible.builtin.meta ---------------------------------------------------- 0.06s 2025-11-26 12:52:45,882 p=31864 u=zuul n=ansible | pkg_build --------------------------------------------------------------- 0.05s 2025-11-26 12:52:45,882 p=31864 u=zuul n=ansible | ansible.builtin.include_vars -------------------------------------------- 0.03s 2025-11-26 12:52:45,882 p=31864 u=zuul n=ansible | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2025-11-26 12:52:45,882 p=31864 u=zuul n=ansible | total ---------------------------------------------------------------- 2083.68s 2025-11-26 12:53:02,111 p=38345 u=zuul n=ansible | PLAY [Run Post-deployment admin setup steps, test, and compliance scan] ******** 2025-11-26 12:53:02,143 p=38345 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-11-26 12:53:02,143 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:02 +0000 (0:00:00.036) 0:00:00.036 **** 2025-11-26 12:53:02,143 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:02 +0000 (0:00:00.036) 0:00:00.036 **** 2025-11-26 12:53:02,192 p=38345 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:53:02,200 p=38345 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-11-26 12:53:02,200 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:02 +0000 (0:00:00.056) 0:00:00.093 **** 2025-11-26 12:53:02,200 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:02 +0000 (0:00:00.056) 0:00:00.093 **** 2025-11-26 12:53:02,264 p=38345 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:53:02,272 p=38345 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_admin_setup _raw_params={{ hook.type }}.yml] *** 2025-11-26 12:53:02,272 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:02 +0000 (0:00:00.072) 0:00:00.166 **** 2025-11-26 12:53:02,273 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:02 +0000 (0:00:00.072) 0:00:00.165 **** 2025-11-26 12:53:02,338 p=38345 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:53:02,354 p=38345 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-11-26 12:53:02,354 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:02 +0000 (0:00:00.081) 0:00:00.247 **** 2025-11-26 12:53:02,354 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:02 +0000 (0:00:00.081) 0:00:00.246 **** 2025-11-26 12:53:02,390 p=38345 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:53:02,401 p=38345 u=zuul n=ansible | TASK [os_net_setup : Delete existing subnets _raw_params=set -euxo pipefail if [ $(oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet list --network {{ item.0.name }} -c Name -f value | grep -c {{ item.1.name }}) != 0 ];then oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet delete {{ item.1.name }} fi ] *** 2025-11-26 12:53:02,402 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:02 +0000 (0:00:00.047) 0:00:00.295 **** 2025-11-26 12:53:02,402 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:02 +0000 (0:00:00.047) 0:00:00.294 **** 2025-11-26 12:53:04,465 p=38345 u=zuul n=ansible | changed: [localhost] => (item=[{'name': 'public', 'external': True, 'shared': False, 'is_default': True, 'provider_network_type': 'flat', 'provider_physical_network': 'datacentre', 'availability_zone_hints': [], 'subnets': [{'name': 'public_subnet', 'cidr': '192.168.122.0/24', 'allocation_pool_start': '192.168.122.171', 'allocation_pool_end': '192.168.122.250', 'gateway_ip': '192.168.122.1', 'enable_dhcp': True}]}, {'name': 'public_subnet', 'cidr': '192.168.122.0/24', 'allocation_pool_start': '192.168.122.171', 'allocation_pool_end': '192.168.122.250', 'gateway_ip': '192.168.122.1', 'enable_dhcp': True}]) 2025-11-26 12:53:04,475 p=38345 u=zuul n=ansible | TASK [os_net_setup : Delete existing subnet pools _raw_params=set -euxo pipefail if [ $(oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet pool list -c Name -f value | grep -c {{ item.name }}) != 0 ];then oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet pool delete {{ item.name }} fi ] *** 2025-11-26 12:53:04,475 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:04 +0000 (0:00:02.073) 0:00:02.368 **** 2025-11-26 12:53:04,475 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:04 +0000 (0:00:02.073) 0:00:02.368 **** 2025-11-26 12:53:06,610 p=38345 u=zuul n=ansible | changed: [localhost] => (item={'name': 'shared-pool-ipv4', 'default_prefix_length': 26, 'prefixes': '10.1.0.0/20', 'is_default': True, 'is_shared': True}) 2025-11-26 12:53:08,637 p=38345 u=zuul n=ansible | changed: [localhost] => (item={'name': 'shared-pool-ipv6', 'default_prefix_length': 64, 'prefixes': 'fdfe:381f:8400::/56', 'is_default': True, 'is_shared': True}) 2025-11-26 12:53:08,647 p=38345 u=zuul n=ansible | TASK [os_net_setup : Delete existing networks _raw_params=set -euxo pipefail if [ $(oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack network list -c Name -f value | grep -c {{ item.name }}) != 0 ];then oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack network delete {{ item.name }} fi ] *** 2025-11-26 12:53:08,647 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:08 +0000 (0:00:04.171) 0:00:06.540 **** 2025-11-26 12:53:08,647 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:08 +0000 (0:00:04.171) 0:00:06.539 **** 2025-11-26 12:53:10,609 p=38345 u=zuul n=ansible | changed: [localhost] => (item={'name': 'public', 'external': True, 'shared': False, 'is_default': True, 'provider_network_type': 'flat', 'provider_physical_network': 'datacentre', 'availability_zone_hints': [], 'subnets': [{'name': 'public_subnet', 'cidr': '192.168.122.0/24', 'allocation_pool_start': '192.168.122.171', 'allocation_pool_end': '192.168.122.250', 'gateway_ip': '192.168.122.1', 'enable_dhcp': True}]}) 2025-11-26 12:53:10,619 p=38345 u=zuul n=ansible | TASK [os_net_setup : Print network creation commands msg={{ lookup('ansible.builtin.template', _template_file) }}] *** 2025-11-26 12:53:10,619 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:10 +0000 (0:00:01.971) 0:00:08.512 **** 2025-11-26 12:53:10,619 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:10 +0000 (0:00:01.971) 0:00:08.511 **** 2025-11-26 12:53:10,676 p=38345 u=zuul n=ansible | ok: [localhost] => msg: | set -euo pipefail oc exec -n openstack openstackclient -- openstack network create \ --external \ --default \ --provider-network-type flat \ --provider-physical-network datacentre \ --no-share \ public 2025-11-26 12:53:10,684 p=38345 u=zuul n=ansible | TASK [os_net_setup : Create networks _raw_params={{ lookup('ansible.builtin.template', _template_file) }} ] *** 2025-11-26 12:53:10,684 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:10 +0000 (0:00:00.065) 0:00:08.578 **** 2025-11-26 12:53:10,684 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:10 +0000 (0:00:00.065) 0:00:08.577 **** 2025-11-26 12:53:13,173 p=38345 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:53:13,182 p=38345 u=zuul n=ansible | TASK [os_net_setup : Print subnet command creation msg={{ lookup('ansible.builtin.template', _template_file) }}] *** 2025-11-26 12:53:13,182 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:13 +0000 (0:00:02.497) 0:00:11.075 **** 2025-11-26 12:53:13,182 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:13 +0000 (0:00:02.497) 0:00:11.075 **** 2025-11-26 12:53:13,271 p=38345 u=zuul n=ansible | ok: [localhost] => msg: | set -euo pipefail oc exec -n openstack openstackclient -- openstack subnet create \ --allocation-pool start=192.168.122.171,end=192.168.122.250 \ --subnet-range 192.168.122.0/24 \ --gateway 192.168.122.1 \ --network public \ public_subnet 2025-11-26 12:53:13,279 p=38345 u=zuul n=ansible | TASK [os_net_setup : Create subnets _raw_params={{ lookup('ansible.builtin.template', _template_file) }} ] *** 2025-11-26 12:53:13,279 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:13 +0000 (0:00:00.097) 0:00:11.173 **** 2025-11-26 12:53:13,280 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:13 +0000 (0:00:00.097) 0:00:11.172 **** 2025-11-26 12:53:16,755 p=38345 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:53:16,763 p=38345 u=zuul n=ansible | TASK [os_net_setup : Print subnet pools command creation msg={{ lookup('ansible.builtin.template', _template_file) }}] *** 2025-11-26 12:53:16,764 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:16 +0000 (0:00:03.484) 0:00:14.657 **** 2025-11-26 12:53:16,764 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:16 +0000 (0:00:03.484) 0:00:14.656 **** 2025-11-26 12:53:16,843 p=38345 u=zuul n=ansible | ok: [localhost] => msg: | set -euo pipefail oc exec -n openstack openstackclient -- openstack subnet pool create \ --default-prefix-length 26 \ --pool-prefix 10.1.0.0/20 \ --default \ --share \ shared-pool-ipv4 oc exec -n openstack openstackclient -- openstack subnet pool create \ --default-prefix-length 64 \ --pool-prefix fdfe:381f:8400::/56 \ --default \ --share \ shared-pool-ipv6 2025-11-26 12:53:16,852 p=38345 u=zuul n=ansible | TASK [os_net_setup : Create subnet pools _raw_params={{ lookup('ansible.builtin.template', _template_file) }} ] *** 2025-11-26 12:53:16,852 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:16 +0000 (0:00:00.088) 0:00:14.745 **** 2025-11-26 12:53:16,852 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:16 +0000 (0:00:00.088) 0:00:14.745 **** 2025-11-26 12:53:21,833 p=38345 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:53:21,848 p=38345 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-11-26 12:53:21,848 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:21 +0000 (0:00:04.996) 0:00:19.741 **** 2025-11-26 12:53:21,848 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:21 +0000 (0:00:04.996) 0:00:19.741 **** 2025-11-26 12:53:21,897 p=38345 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:53:21,905 p=38345 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-11-26 12:53:21,905 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:21 +0000 (0:00:00.057) 0:00:19.799 **** 2025-11-26 12:53:21,905 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:21 +0000 (0:00:00.057) 0:00:19.798 **** 2025-11-26 12:53:21,969 p=38345 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:53:21,978 p=38345 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_admin_setup _raw_params={{ hook.type }}.yml] *** 2025-11-26 12:53:21,978 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:21 +0000 (0:00:00.072) 0:00:19.871 **** 2025-11-26 12:53:21,978 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:21 +0000 (0:00:00.072) 0:00:19.871 **** 2025-11-26 12:53:22,045 p=38345 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:53:22,067 p=38345 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-11-26 12:53:22,067 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:22 +0000 (0:00:00.089) 0:00:19.961 **** 2025-11-26 12:53:22,067 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:22 +0000 (0:00:00.089) 0:00:19.960 **** 2025-11-26 12:53:22,118 p=38345 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:53:22,127 p=38345 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-11-26 12:53:22,127 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:22 +0000 (0:00:00.059) 0:00:20.020 **** 2025-11-26 12:53:22,127 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:22 +0000 (0:00:00.059) 0:00:20.020 **** 2025-11-26 12:53:22,222 p=38345 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:53:22,231 p=38345 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_tests _raw_params={{ hook.type }}.yml] *** 2025-11-26 12:53:22,231 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:22 +0000 (0:00:00.104) 0:00:20.125 **** 2025-11-26 12:53:22,232 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:22 +0000 (0:00:00.104) 0:00:20.124 **** 2025-11-26 12:53:22,347 p=38345 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': '90 Create manila resources', 'type': 'playbook', 'source': 'manila_create_default_resources.yml'}) 2025-11-26 12:53:22,378 p=38345 u=zuul n=ansible | TASK [run_hook : Set playbook path for 90 Create manila resources cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-11-26 12:53:22,378 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:22 +0000 (0:00:00.146) 0:00:20.271 **** 2025-11-26 12:53:22,378 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:22 +0000 (0:00:00.146) 0:00:20.270 **** 2025-11-26 12:53:22,418 p=38345 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:53:22,427 p=38345 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-11-26 12:53:22,427 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:22 +0000 (0:00:00.049) 0:00:20.321 **** 2025-11-26 12:53:22,427 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:22 +0000 (0:00:00.049) 0:00:20.320 **** 2025-11-26 12:53:22,663 p=38345 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:53:22,673 p=38345 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-11-26 12:53:22,673 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:22 +0000 (0:00:00.245) 0:00:20.566 **** 2025-11-26 12:53:22,673 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:22 +0000 (0:00:00.245) 0:00:20.565 **** 2025-11-26 12:53:22,684 p=38345 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:53:22,693 p=38345 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-11-26 12:53:22,693 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:22 +0000 (0:00:00.020) 0:00:20.587 **** 2025-11-26 12:53:22,693 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:22 +0000 (0:00:00.020) 0:00:20.586 **** 2025-11-26 12:53:22,920 p=38345 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:53:22,929 p=38345 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-11-26 12:53:22,929 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:22 +0000 (0:00:00.236) 0:00:20.823 **** 2025-11-26 12:53:22,930 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:22 +0000 (0:00:00.236) 0:00:20.822 **** 2025-11-26 12:53:22,945 p=38345 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:53:22,954 p=38345 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-11-26 12:53:22,954 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:22 +0000 (0:00:00.024) 0:00:20.847 **** 2025-11-26 12:53:22,954 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:22 +0000 (0:00:00.024) 0:00:20.846 **** 2025-11-26 12:53:23,184 p=38345 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:53:23,193 p=38345 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-11-26 12:53:23,193 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:23 +0000 (0:00:00.239) 0:00:21.087 **** 2025-11-26 12:53:23,193 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:23 +0000 (0:00:00.239) 0:00:21.086 **** 2025-11-26 12:53:23,344 p=38345 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:53:23,356 p=38345 u=zuul n=ansible | TASK [run_hook : Run hook without retry - 90 Create manila resources] ********** 2025-11-26 12:53:23,356 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:23 +0000 (0:00:00.162) 0:00:21.249 **** 2025-11-26 12:53:23,356 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:23 +0000 (0:00:00.162) 0:00:21.249 **** 2025-11-26 12:53:23,402 p=38345 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_024_run_hook_without_retry_90.log 2025-11-26 12:53:29,958 p=38345 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:53:29,968 p=38345 u=zuul n=ansible | TASK [run_hook : Run hook with retry - 90 Create manila resources] ************* 2025-11-26 12:53:29,968 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:29 +0000 (0:00:06.612) 0:00:27.862 **** 2025-11-26 12:53:29,968 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:29 +0000 (0:00:06.612) 0:00:27.861 **** 2025-11-26 12:53:29,983 p=38345 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:53:29,992 p=38345 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-11-26 12:53:29,992 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:29 +0000 (0:00:00.023) 0:00:27.885 **** 2025-11-26 12:53:29,992 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:29 +0000 (0:00:00.023) 0:00:27.884 **** 2025-11-26 12:53:30,149 p=38345 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:53:30,157 p=38345 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-11-26 12:53:30,157 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:30 +0000 (0:00:00.165) 0:00:28.050 **** 2025-11-26 12:53:30,157 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:30 +0000 (0:00:00.165) 0:00:28.049 **** 2025-11-26 12:53:30,169 p=38345 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:53:30,185 p=38345 u=zuul n=ansible | TASK [test_operator : Cleanup previous test-operator resources _raw_params=cleanup.yaml] *** 2025-11-26 12:53:30,185 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:30 +0000 (0:00:00.027) 0:00:28.078 **** 2025-11-26 12:53:30,185 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:30 +0000 (0:00:00.027) 0:00:28.077 **** 2025-11-26 12:53:30,200 p=38345 u=zuul n=ansible | skipping: [localhost] 2025-11-26 12:53:30,211 p=38345 u=zuul n=ansible | TASK [test_operator : Ensure test_operator folder exists path={{ cifmw_test_operator_artifacts_basedir }}, state=directory, mode=0755, recurse=True, owner={{ ansible_user | default(lookup('env', 'USER')) }}, group={{ ansible_user | default(lookup('env', 'USER')) }}] *** 2025-11-26 12:53:30,211 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:30 +0000 (0:00:00.025) 0:00:28.104 **** 2025-11-26 12:53:30,211 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:30 +0000 (0:00:00.025) 0:00:28.103 **** 2025-11-26 12:53:30,371 p=38345 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:53:30,381 p=38345 u=zuul n=ansible | TASK [test_operator : Get openstack-operator csv information kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=ClusterServiceVersion, api_version=operators.coreos.com/v1alpha1, label_selectors=['operators.coreos.com/openstack-operator.openstack-operators'], namespace={{ cifmw_test_operator_controller_namespace }}] *** 2025-11-26 12:53:30,381 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:30 +0000 (0:00:00.169) 0:00:28.274 **** 2025-11-26 12:53:30,381 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:30 +0000 (0:00:00.169) 0:00:28.273 **** 2025-11-26 12:53:31,143 p=38345 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:53:31,157 p=38345 u=zuul n=ansible | TASK [test_operator : Get full name of openstack-operator CSV openstack_operator_csv_name={{ csv_info.resources | map(attribute='metadata.name') | list | first }}] *** 2025-11-26 12:53:31,157 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:31 +0000 (0:00:00.776) 0:00:29.051 **** 2025-11-26 12:53:31,158 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:31 +0000 (0:00:00.776) 0:00:29.050 **** 2025-11-26 12:53:31,189 p=38345 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:53:31,198 p=38345 u=zuul n=ansible | TASK [test_operator : Get index of test-operator image _raw_params=set -o pipefail; oc get ClusterServiceVersion {{ openstack_operator_csv_name }} -o json | jq '.spec.install.spec.deployments[0].spec.template.spec.containers[0].env | to_entries[] | select(.value.name == "RELATED_IMAGE_TEST_OPERATOR_MANAGER_IMAGE_URL").key'] *** 2025-11-26 12:53:31,198 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:31 +0000 (0:00:00.040) 0:00:29.091 **** 2025-11-26 12:53:31,198 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:31 +0000 (0:00:00.040) 0:00:29.091 **** 2025-11-26 12:53:31,471 p=38345 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:53:31,480 p=38345 u=zuul n=ansible | TASK [test_operator : Patch test-operator version in CSV kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=ClusterServiceVersion, api_version=operators.coreos.com/v1alpha1, namespace={{ cifmw_test_operator_controller_namespace }}, name={{ openstack_operator_csv_name }}, patch=[{'path': '/spec/install/spec/deployments/0/spec/template/spec/containers/0/env/{{ image_index.stdout }}/value', 'value': '{{ cifmw_test_operator_bundle }}', 'op': 'replace'}]] *** 2025-11-26 12:53:31,480 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:31 +0000 (0:00:00.281) 0:00:29.373 **** 2025-11-26 12:53:31,480 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:31 +0000 (0:00:00.281) 0:00:29.373 **** 2025-11-26 12:53:32,267 p=38345 u=zuul n=ansible | changed: [localhost] 2025-11-26 12:53:32,279 p=38345 u=zuul n=ansible | TASK [test_operator : Get test-operator-controller-manager pod information kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Pod, label_selectors=['control-plane=controller-manager', 'openstack.org/operator-name=test'], namespace={{ cifmw_test_operator_controller_namespace }}] *** 2025-11-26 12:53:32,280 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:32 +0000 (0:00:00.799) 0:00:30.173 **** 2025-11-26 12:53:32,280 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:32 +0000 (0:00:00.799) 0:00:30.172 **** 2025-11-26 12:53:32,866 p=38345 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:53:32,876 p=38345 u=zuul n=ansible | TASK [test_operator : Get full name of test-operator-controller-manager pod test_operator_controller_name={{ pod_info.resources | map(attribute='metadata.name') | list | first }}] *** 2025-11-26 12:53:32,876 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:32 +0000 (0:00:00.596) 0:00:30.770 **** 2025-11-26 12:53:32,877 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:32 +0000 (0:00:00.596) 0:00:30.769 **** 2025-11-26 12:53:32,907 p=38345 u=zuul n=ansible | ok: [localhost] 2025-11-26 12:53:32,916 p=38345 u=zuul n=ansible | TASK [test_operator : Wait until the test-operator-controller-manager is reloaded kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, namespace={{ cifmw_test_operator_controller_namespace }}, kind=Pod] *** 2025-11-26 12:53:32,916 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:32 +0000 (0:00:00.039) 0:00:30.809 **** 2025-11-26 12:53:32,916 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:53:32 +0000 (0:00:00.039) 0:00:30.809 **** 2025-11-26 12:53:33,654 p=38345 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ not ( pod_list.resources | map(attribute='metadata.name') | select('match', test_operator_controller_name) | list ) }} 2025-11-26 12:57:09,424 p=38345 u=zuul n=ansible | fatal: [localhost]: FAILED! => api_found: true attempts: 20 changed: false resources: - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.51/23"],"mac_address":"0a:58:0a:d9:00:33","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.51/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.51" ], "mac": "0a:58:0a:d9:00:33", "default": true, "dns": {} }] openshift.io/scc: restricted-v2 seccomp.security.alpha.kubernetes.io/pod: runtime/default creationTimestamp: '2025-11-26T12:23:10Z' generateName: 3711d63ee32771f989196ada809b479d54ff48bb9ee48b91ea976dcc5aae988- labels: batch.kubernetes.io/controller-uid: ac89a497-f5f2-4e58-9727-bf9a92c5dad1 batch.kubernetes.io/job-name: 3711d63ee32771f989196ada809b479d54ff48bb9ee48b91ea976dcc5aae988 controller-uid: ac89a497-f5f2-4e58-9727-bf9a92c5dad1 job-name: 3711d63ee32771f989196ada809b479d54ff48bb9ee48b91ea976dcc5aae988 olm.managed: 'true' managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:23:10Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:generateName: {} f:labels: .: {} f:batch.kubernetes.io/controller-uid: {} f:batch.kubernetes.io/job-name: {} f:controller-uid: {} f:job-name: {} f:olm.managed: {} f:ownerReferences: .: {} k:{"uid":"ac89a497-f5f2-4e58-9727-bf9a92c5dad1"}: {} f:spec: f:containers: k:{"name":"extract"}: .: {} f:command: {} f:env: .: {} k:{"name":"CONTAINER_IMAGE"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/bundle"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:initContainers: .: {} k:{"name":"pull"}: .: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/bundle"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/util"}: .: {} f:mountPath: {} f:name: {} k:{"name":"util"}: .: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/util"}: .: {} f:mountPath: {} f:name: {} f:nodeSelector: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:seccompProfile: .: {} f:type: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"bundle"}: .: {} f:emptyDir: {} f:name: {} k:{"name":"util"}: .: {} f:emptyDir: {} f:name: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:23:10Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:23:11Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:reason: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:reason: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:reason: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:initContainerStatuses: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.51"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:23:16Z' name: 3711d63ee32771f989196ada809b479d54ff48bb9ee48b91ea976dcc5akg8kf namespace: openstack-operators ownerReferences: - apiVersion: batch/v1 blockOwnerDeletion: true controller: true kind: Job name: 3711d63ee32771f989196ada809b479d54ff48bb9ee48b91ea976dcc5aae988 uid: ac89a497-f5f2-4e58-9727-bf9a92c5dad1 resourceVersion: '33537' uid: 7fa1d84c-4b0c-45bf-881d-01d0a25ea746 spec: containers: - command: - opm - alpha - bundle - extract - -m - /bundle/ - -n - openstack-operators - -c - 3711d63ee32771f989196ada809b479d54ff48bb9ee48b91ea976dcc5aae988 - -z env: - name: CONTAINER_IMAGE value: quay.io/openstack-k8s-operators/openstack-operator-bundle:ab6ae955857c5edfa67de51c197bb29b9882a630 image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c3cc3840d7a81ce1b420f06e07a923861faf37d9c10688aa3aa0b7b76c8706ad imagePullPolicy: IfNotPresent name: extract resources: requests: cpu: 10m memory: 50Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL runAsNonRoot: true runAsUser: 1000660000 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /bundle name: bundle - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-9fgzh readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: default-dockercfg-nnzmt initContainers: - command: - /bin/cp - -Rv - /bin/cpb - /util/cpb image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:47b0670fa1051335fd2d2c9e8361e4ed77c7760c33a2180b136f7c7f59863ec2 imagePullPolicy: IfNotPresent name: util resources: requests: cpu: 10m memory: 50Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL runAsNonRoot: true runAsUser: 1000660000 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /util name: util - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-9fgzh readOnly: true - command: - /util/cpb - /bundle image: quay.io/openstack-k8s-operators/openstack-operator-bundle:ab6ae955857c5edfa67de51c197bb29b9882a630 imagePullPolicy: Always name: pull resources: requests: cpu: 10m memory: 50Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL runAsNonRoot: true runAsUser: 1000660000 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /bundle name: bundle - mountPath: /util name: util - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-9fgzh readOnly: true nodeName: crc nodeSelector: kubernetes.io/os: linux preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Never schedulerName: default-scheduler securityContext: fsGroup: 1000660000 seLinuxOptions: level: s0:c26,c5 seccompProfile: type: RuntimeDefault serviceAccount: default serviceAccountName: default terminationGracePeriodSeconds: 30 tolerations: - key: kubernetes.io/arch operator: Equal value: amd64 - key: kubernetes.io/arch operator: Equal value: arm64 - key: kubernetes.io/arch operator: Equal value: ppc64le - key: kubernetes.io/arch operator: Equal value: s390x - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 300 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 300 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - emptyDir: {} name: bundle - emptyDir: {} name: util - name: kube-api-access-9fgzh projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:16Z' status: 'False' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:14Z' reason: PodCompleted status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:10Z' reason: PodCompleted status: 'False' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:10Z' reason: PodCompleted status: 'False' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:10Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://df7a7ca8b900d985bed1e5da46e9e5f19fb15d1b2a2887168004429170a82e2d image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c3cc3840d7a81ce1b420f06e07a923861faf37d9c10688aa3aa0b7b76c8706ad imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c3cc3840d7a81ce1b420f06e07a923861faf37d9c10688aa3aa0b7b76c8706ad lastState: {} name: extract ready: false restartCount: 0 started: false state: terminated: containerID: cri-o://df7a7ca8b900d985bed1e5da46e9e5f19fb15d1b2a2887168004429170a82e2d exitCode: 0 finishedAt: '2025-11-26T12:23:14Z' reason: Completed startedAt: '2025-11-26T12:23:14Z' volumeMounts: - mountPath: /bundle name: bundle - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-9fgzh readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 initContainerStatuses: - containerID: cri-o://20ce032f7068ea71ad2bb3aadbb0c0fd0231965d1a36769812f8a3acad0054f1 image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:47b0670fa1051335fd2d2c9e8361e4ed77c7760c33a2180b136f7c7f59863ec2 imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:47b0670fa1051335fd2d2c9e8361e4ed77c7760c33a2180b136f7c7f59863ec2 lastState: {} name: util ready: true restartCount: 0 started: false state: terminated: containerID: cri-o://20ce032f7068ea71ad2bb3aadbb0c0fd0231965d1a36769812f8a3acad0054f1 exitCode: 0 finishedAt: '2025-11-26T12:23:11Z' reason: Completed startedAt: '2025-11-26T12:23:11Z' volumeMounts: - mountPath: /util name: util - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-9fgzh readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://ef84a577ca0213d5eea74e4d455b97c8949abeeee4525f3f2607656d70182c7b image: quay.io/openstack-k8s-operators/openstack-operator-bundle:ab6ae955857c5edfa67de51c197bb29b9882a630 imageID: quay.io/openstack-k8s-operators/openstack-operator-bundle@sha256:5c4e27aa75db76b4a48f86d65f80ea5be54353b8234a1b2dd87d061a69284ea4 lastState: {} name: pull ready: true restartCount: 0 started: false state: terminated: containerID: cri-o://ef84a577ca0213d5eea74e4d455b97c8949abeeee4525f3f2607656d70182c7b exitCode: 0 finishedAt: '2025-11-26T12:23:13Z' reason: Completed startedAt: '2025-11-26T12:23:13Z' volumeMounts: - mountPath: /bundle name: bundle - mountPath: /util name: util - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-9fgzh readOnly: true recursiveReadOnly: Disabled phase: Succeeded podIP: 10.217.0.51 podIPs: - ip: 10.217.0.51 qosClass: Burstable startTime: '2025-11-26T12:23:10Z' - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.53/23"],"mac_address":"0a:58:0a:d9:00:35","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.53/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.53" ], "mac": "0a:58:0a:d9:00:35", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager openshift.io/scc: anyuid creationTimestamp: '2025-11-26T12:23:50Z' generateName: barbican-operator-controller-manager-7b64f4fb85- labels: app.kubernetes.io/name: barbican-operator control-plane: controller-manager openstack.org/operator-name: barbican pod-template-hash: 7b64f4fb85 managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:kubectl.kubernetes.io/default-container: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:control-plane: {} f:openstack.org/operator-name: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"8bca7312-1880-4cc2-9dba-7db3d90eff6c"}: {} f:spec: f:containers: k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} k:{"name":"manager"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"ENABLE_WEBHOOKS"}: .: {} f:name: {} f:value: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"METRICS_CERTS"}: .: {} f:name: {} f:value: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:23:51Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.53"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:24:11Z' name: barbican-operator-controller-manager-7b64f4fb85-c5rjq namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: barbican-operator-controller-manager-7b64f4fb85 uid: 8bca7312-1880-4cc2-9dba-7db3d90eff6c resourceVersion: '36126' uid: 90b33e2e-c7dc-4e9e-b479-dca5251277bc spec: containers: - args: - --leader-elect - --health-probe-bind-address=:8081 - --metrics-bind-address=127.0.0.1:8080 command: - /manager env: - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: ENABLE_WEBHOOKS value: 'false' - name: METRICS_CERTS value: 'false' image: quay.io/openstack-k8s-operators/barbican-operator@sha256:3dbf9fd9dce75f1fb250ee4c4097ad77d2f34110b61d85e37abd9c472e022e6c imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 512Mi requests: cpu: 10m memory: 256Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-zpx7b readOnly: true - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080/ - --logtostderr=true - --v=0 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: limits: cpu: 500m memory: 128Mi requests: cpu: 5m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-zpx7b readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: barbican-operator-controller-manager-dockercfg-fmqh4 nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seLinuxOptions: level: s0:c26,c5 serviceAccount: barbican-operator-controller-manager serviceAccountName: barbican-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-api-access-zpx7b projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:06Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:50Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:11Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:11Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:50Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://c54e998e28a4c78e1c43679dd8b3823b62bc06d6c37e1ba962d4f5868a4677e7 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imageID: quay.io/openstack-k8s-operators/kube-rbac-proxy@sha256:d28df2924a366ed857d6c2c14baac9741238032d41f3d02c12cd757189b68b8a lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:06Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-zpx7b readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://016545dd06e05c23fa1afd8a472dc3777822b400cef0cdecf3e1449e1ae062e1 image: quay.io/openstack-k8s-operators/barbican-operator@sha256:3dbf9fd9dce75f1fb250ee4c4097ad77d2f34110b61d85e37abd9c472e022e6c imageID: quay.io/openstack-k8s-operators/barbican-operator@sha256:3dbf9fd9dce75f1fb250ee4c4097ad77d2f34110b61d85e37abd9c472e022e6c lastState: {} name: manager ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:04Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-zpx7b readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.53 podIPs: - ip: 10.217.0.53 qosClass: Burstable startTime: '2025-11-26T12:23:50Z' - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.54/23"],"mac_address":"0a:58:0a:d9:00:36","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.54/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.54" ], "mac": "0a:58:0a:d9:00:36", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager openshift.io/scc: anyuid creationTimestamp: '2025-11-26T12:23:50Z' generateName: cinder-operator-controller-manager-6b7f75547b- labels: app.kubernetes.io/name: cinder-operator control-plane: controller-manager openstack.org/operator-name: cinder pod-template-hash: 6b7f75547b managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:kubectl.kubernetes.io/default-container: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:control-plane: {} f:openstack.org/operator-name: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"5dad2088-c912-4a8c-b04b-e4b695d95d67"}: {} f:spec: f:containers: k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} k:{"name":"manager"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"ENABLE_WEBHOOKS"}: .: {} f:name: {} f:value: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"METRICS_CERTS"}: .: {} f:name: {} f:value: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:23:51Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.54"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:24:12Z' name: cinder-operator-controller-manager-6b7f75547b-m4bdb namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: cinder-operator-controller-manager-6b7f75547b uid: 5dad2088-c912-4a8c-b04b-e4b695d95d67 resourceVersion: '36244' uid: d85e5da5-d129-4904-8bde-6ff4bb92614f spec: containers: - args: - --leader-elect - --health-probe-bind-address=:8081 - --metrics-bind-address=127.0.0.1:8080 command: - /manager env: - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: ENABLE_WEBHOOKS value: 'false' - name: METRICS_CERTS value: 'false' image: quay.io/openstack-k8s-operators/cinder-operator@sha256:ca332e48d07f932e470177e48dba9332848a1d14c857cff6f9bfb1adc1998482 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 512Mi requests: cpu: 10m memory: 256Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-6pzh5 readOnly: true - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080/ - --logtostderr=true - --v=0 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: limits: cpu: 500m memory: 128Mi requests: cpu: 5m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-6pzh5 readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: cinder-operator-controller-manager-dockercfg-jts8j nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seLinuxOptions: level: s0:c26,c5 serviceAccount: cinder-operator-controller-manager serviceAccountName: cinder-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-api-access-6pzh5 projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:04Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:50Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:12Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:12Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:50Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://77495747100ad7a9f2d599d5e236a136fef24a878aca972d8a2ad749b58c74bb image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imageID: quay.io/openstack-k8s-operators/kube-rbac-proxy@sha256:d28df2924a366ed857d6c2c14baac9741238032d41f3d02c12cd757189b68b8a lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:12Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-6pzh5 readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://1daf534db7a8c96587b03386bd0ad7819d989472aa5471cd286d58e4c344e2ce image: quay.io/openstack-k8s-operators/cinder-operator@sha256:ca332e48d07f932e470177e48dba9332848a1d14c857cff6f9bfb1adc1998482 imageID: quay.io/openstack-k8s-operators/cinder-operator@sha256:ca332e48d07f932e470177e48dba9332848a1d14c857cff6f9bfb1adc1998482 lastState: {} name: manager ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:04Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-6pzh5 readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.54 podIPs: - ip: 10.217.0.54 qosClass: Burstable startTime: '2025-11-26T12:23:50Z' - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.56/23"],"mac_address":"0a:58:0a:d9:00:38","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.56/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.56" ], "mac": "0a:58:0a:d9:00:38", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager openshift.io/scc: anyuid creationTimestamp: '2025-11-26T12:23:50Z' generateName: designate-operator-controller-manager-955677c94- labels: app.kubernetes.io/name: designate-operator control-plane: controller-manager openstack.org/operator-name: designate pod-template-hash: 955677c94 managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:kubectl.kubernetes.io/default-container: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:control-plane: {} f:openstack.org/operator-name: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"4dce8f14-b84a-4c18-8ea8-7051fb783294"}: {} f:spec: f:containers: k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} k:{"name":"manager"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"ENABLE_WEBHOOKS"}: .: {} f:name: {} f:value: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"METRICS_CERTS"}: .: {} f:name: {} f:value: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:23:51Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.56"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:24:11Z' name: designate-operator-controller-manager-955677c94-7vd97 namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: designate-operator-controller-manager-955677c94 uid: 4dce8f14-b84a-4c18-8ea8-7051fb783294 resourceVersion: '36138' uid: 702bd8a5-fc1e-4ee9-b85b-01ea9d177a97 spec: containers: - args: - --leader-elect - --health-probe-bind-address=:8081 - --metrics-bind-address=127.0.0.1:8080 command: - /manager env: - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: ENABLE_WEBHOOKS value: 'false' - name: METRICS_CERTS value: 'false' image: quay.io/openstack-k8s-operators/designate-operator@sha256:ec4e5c911c1d0f1ea211a04b251a9d2e95b69d141c1caf07a0381693b2d6368b imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 512Mi requests: cpu: 10m memory: 256Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-fc89t readOnly: true - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080/ - --logtostderr=true - --v=0 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: limits: cpu: 500m memory: 128Mi requests: cpu: 5m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-fc89t readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: designate-operator-controller-manager-dockercfg-fkrx8 nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seLinuxOptions: level: s0:c26,c5 serviceAccount: designate-operator-controller-manager serviceAccountName: designate-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-api-access-fc89t projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:06Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:50Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:11Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:11Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:50Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://c64e548136bd1f96cfcc84bc0e9ef0dcf50cc169c3cca2f039853bfa3bfd9f9e image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imageID: quay.io/openstack-k8s-operators/kube-rbac-proxy@sha256:d28df2924a366ed857d6c2c14baac9741238032d41f3d02c12cd757189b68b8a lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:06Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-fc89t readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://31c2c6a0186f622599b8160f3c6853ba472b18d2e96cb2595aaed91285864053 image: quay.io/openstack-k8s-operators/designate-operator@sha256:ec4e5c911c1d0f1ea211a04b251a9d2e95b69d141c1caf07a0381693b2d6368b imageID: quay.io/openstack-k8s-operators/designate-operator@sha256:ec4e5c911c1d0f1ea211a04b251a9d2e95b69d141c1caf07a0381693b2d6368b lastState: {} name: manager ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:04Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-fc89t readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.56 podIPs: - ip: 10.217.0.56 qosClass: Burstable startTime: '2025-11-26T12:23:50Z' - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.55/23"],"mac_address":"0a:58:0a:d9:00:37","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.55/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.55" ], "mac": "0a:58:0a:d9:00:37", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager openshift.io/scc: anyuid creationTimestamp: '2025-11-26T12:23:50Z' generateName: glance-operator-controller-manager-589cbd6b5b- labels: app.kubernetes.io/name: glance-operator control-plane: controller-manager openstack.org/operator-name: glance pod-template-hash: 589cbd6b5b managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:kubectl.kubernetes.io/default-container: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:control-plane: {} f:openstack.org/operator-name: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"70a6c354-ef48-41a5-8195-82a32ab4a92a"}: {} f:spec: f:containers: k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} k:{"name":"manager"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"ENABLE_WEBHOOKS"}: .: {} f:name: {} f:value: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"METRICS_CERTS"}: .: {} f:name: {} f:value: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:23:51Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.55"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:24:11Z' name: glance-operator-controller-manager-589cbd6b5b-st8n9 namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: glance-operator-controller-manager-589cbd6b5b uid: 70a6c354-ef48-41a5-8195-82a32ab4a92a resourceVersion: '36132' uid: c476edc2-bbe3-4dca-a1fc-9a9c95f758c3 spec: containers: - args: - --leader-elect - --health-probe-bind-address=:8081 - --metrics-bind-address=127.0.0.1:8080 command: - /manager env: - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: ENABLE_WEBHOOKS value: 'false' - name: METRICS_CERTS value: 'false' image: quay.io/openstack-k8s-operators/glance-operator@sha256:45ae665ce2ea81aef212ee402cb02693ee49001a7c88c40c9598ff2859b838a2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 512Mi requests: cpu: 10m memory: 256Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-sp5rk readOnly: true - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080/ - --logtostderr=true - --v=0 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: limits: cpu: 500m memory: 128Mi requests: cpu: 5m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-sp5rk readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: glance-operator-controller-manager-dockercfg-94wcp nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seLinuxOptions: level: s0:c26,c5 serviceAccount: glance-operator-controller-manager serviceAccountName: glance-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-api-access-sp5rk projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:06Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:50Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:11Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:11Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:50Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://add4c185efa0af478597b4d5c11c5a551809a23d16251c272cc0251442381236 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imageID: quay.io/openstack-k8s-operators/kube-rbac-proxy@sha256:d28df2924a366ed857d6c2c14baac9741238032d41f3d02c12cd757189b68b8a lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:06Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-sp5rk readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://7be722cd72065020fd9997fa99cefce144476daa52008b1fdd5dd48fd36ba2b1 image: quay.io/openstack-k8s-operators/glance-operator@sha256:45ae665ce2ea81aef212ee402cb02693ee49001a7c88c40c9598ff2859b838a2 imageID: quay.io/openstack-k8s-operators/glance-operator@sha256:45ae665ce2ea81aef212ee402cb02693ee49001a7c88c40c9598ff2859b838a2 lastState: {} name: manager ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:04Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-sp5rk readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.55 podIPs: - ip: 10.217.0.55 qosClass: Burstable startTime: '2025-11-26T12:23:50Z' - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.57/23"],"mac_address":"0a:58:0a:d9:00:39","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.57/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.57" ], "mac": "0a:58:0a:d9:00:39", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager openshift.io/scc: anyuid creationTimestamp: '2025-11-26T12:23:50Z' generateName: heat-operator-controller-manager-5b77f656f- labels: app.kubernetes.io/name: heat-operator control-plane: controller-manager openstack.org/operator-name: heat pod-template-hash: 5b77f656f managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:kubectl.kubernetes.io/default-container: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:control-plane: {} f:openstack.org/operator-name: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"a652a4c8-9c1b-45ea-b0a4-c741e503db6f"}: {} f:spec: f:containers: k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} k:{"name":"manager"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"ENABLE_WEBHOOKS"}: .: {} f:name: {} f:value: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"METRICS_CERTS"}: .: {} f:name: {} f:value: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:23:52Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.57"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:24:09Z' name: heat-operator-controller-manager-5b77f656f-zbptq namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: heat-operator-controller-manager-5b77f656f uid: a652a4c8-9c1b-45ea-b0a4-c741e503db6f resourceVersion: '36094' uid: 7b521baa-5390-41d7-8654-7b556346833d spec: containers: - args: - --leader-elect - --health-probe-bind-address=:8081 - --metrics-bind-address=127.0.0.1:8080 command: - /manager env: - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: ENABLE_WEBHOOKS value: 'false' - name: METRICS_CERTS value: 'false' image: quay.io/openstack-k8s-operators/heat-operator@sha256:2ee37ff474bee3203447df4f326a9279a515e770573153338296dd074722c677 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 512Mi requests: cpu: 10m memory: 256Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-lr828 readOnly: true - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080/ - --logtostderr=true - --v=0 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: limits: cpu: 500m memory: 128Mi requests: cpu: 5m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-lr828 readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: heat-operator-controller-manager-dockercfg-lqs4k nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seLinuxOptions: level: s0:c26,c5 serviceAccount: heat-operator-controller-manager serviceAccountName: heat-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-api-access-lr828 projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:07Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:50Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:09Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:09Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:50Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://33e7f1d7dea0a9585f49fa35e55bb642c26ee25da5020483042969524f41717c image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imageID: quay.io/openstack-k8s-operators/kube-rbac-proxy@sha256:d28df2924a366ed857d6c2c14baac9741238032d41f3d02c12cd757189b68b8a lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:07Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-lr828 readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://77a368d97230a17590a6c1a57e3428231a50bababde84cd7cea62b458bee78a8 image: quay.io/openstack-k8s-operators/heat-operator@sha256:2ee37ff474bee3203447df4f326a9279a515e770573153338296dd074722c677 imageID: quay.io/openstack-k8s-operators/heat-operator@sha256:2ee37ff474bee3203447df4f326a9279a515e770573153338296dd074722c677 lastState: {} name: manager ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:04Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-lr828 readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.57 podIPs: - ip: 10.217.0.57 qosClass: Burstable startTime: '2025-11-26T12:23:50Z' - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.63/23"],"mac_address":"0a:58:0a:d9:00:3f","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.63/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.63" ], "mac": "0a:58:0a:d9:00:3f", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager openshift.io/scc: anyuid creationTimestamp: '2025-11-26T12:23:50Z' generateName: horizon-operator-controller-manager-5d494799bf- labels: app.kubernetes.io/name: horizon-operator control-plane: controller-manager openstack.org/operator-name: horizon pod-template-hash: 5d494799bf managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:kubectl.kubernetes.io/default-container: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:control-plane: {} f:openstack.org/operator-name: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"cad9ebb3-0678-4565-9871-c36bd848eacc"}: {} f:spec: f:containers: k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} k:{"name":"manager"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"ENABLE_WEBHOOKS"}: .: {} f:name: {} f:value: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"METRICS_CERTS"}: .: {} f:name: {} f:value: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:23:52Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.63"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:24:11Z' name: horizon-operator-controller-manager-5d494799bf-h4t44 namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: horizon-operator-controller-manager-5d494799bf uid: cad9ebb3-0678-4565-9871-c36bd848eacc resourceVersion: '36143' uid: dc55c2f3-1e8f-48ac-9d6d-581737e07566 spec: containers: - args: - --leader-elect - --health-probe-bind-address=:8081 - --metrics-bind-address=127.0.0.1:8080 command: - /manager env: - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: ENABLE_WEBHOOKS value: 'false' - name: METRICS_CERTS value: 'false' image: quay.io/openstack-k8s-operators/horizon-operator@sha256:9413ed1bc2ae1a6bd28c59b1c7f7e91e1638de7b2a7d4729ed3fa2135182465d imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 512Mi requests: cpu: 10m memory: 256Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-wfscx readOnly: true - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080/ - --logtostderr=true - --v=0 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: limits: cpu: 500m memory: 128Mi requests: cpu: 5m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-wfscx readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: horizon-operator-controller-manager-dockercfg-m4fk7 nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seLinuxOptions: level: s0:c26,c5 serviceAccount: horizon-operator-controller-manager serviceAccountName: horizon-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-api-access-wfscx projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:06Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:50Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:11Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:11Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:50Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://2080b15f848c6c1dae220f5d90f07ea51559ee614978cc325ac11fb953512533 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imageID: quay.io/openstack-k8s-operators/kube-rbac-proxy@sha256:d28df2924a366ed857d6c2c14baac9741238032d41f3d02c12cd757189b68b8a lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:06Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-wfscx readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://a268624008eb0270d06e1c606807aad1831c60829171f164fc6d6479cd9ada30 image: quay.io/openstack-k8s-operators/horizon-operator@sha256:9413ed1bc2ae1a6bd28c59b1c7f7e91e1638de7b2a7d4729ed3fa2135182465d imageID: quay.io/openstack-k8s-operators/horizon-operator@sha256:9413ed1bc2ae1a6bd28c59b1c7f7e91e1638de7b2a7d4729ed3fa2135182465d lastState: {} name: manager ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:04Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-wfscx readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.63 podIPs: - ip: 10.217.0.63 qosClass: Burstable startTime: '2025-11-26T12:23:50Z' - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.72/23"],"mac_address":"0a:58:0a:d9:00:48","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.72/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.72" ], "mac": "0a:58:0a:d9:00:48", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager openshift.io/scc: anyuid creationTimestamp: '2025-11-26T12:23:50Z' generateName: infra-operator-controller-manager-57548d458d- labels: app.kubernetes.io/name: infra-operator control-plane: controller-manager openstack.org/operator-name: infra pod-template-hash: 57548d458d managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:kubectl.kubernetes.io/default-container: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:control-plane: {} f:openstack.org/operator-name: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"939f7747-d360-4954-af5e-870bf6b408a2"}: {} f:spec: f:containers: k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} k:{"name":"manager"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"ENABLE_WEBHOOKS"}: .: {} f:name: {} f:value: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"METRICS_CERTS"}: .: {} f:name: {} f:value: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/tmp/k8s-webhook-server/serving-certs"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:24:23Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.72"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:24:32Z' name: infra-operator-controller-manager-57548d458d-btq96 namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: infra-operator-controller-manager-57548d458d uid: 939f7747-d360-4954-af5e-870bf6b408a2 resourceVersion: '36482' uid: 7f07c17d-8260-47a7-b1e1-0f16226838a7 spec: containers: - args: - --leader-elect - --health-probe-bind-address=:8081 - --metrics-bind-address=127.0.0.1:8080 command: - /manager env: - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: ENABLE_WEBHOOKS value: 'true' - name: METRICS_CERTS value: 'false' image: quay.io/openstack-k8s-operators/infra-operator@sha256:09a6d0613ee2d3c1c809fc36c22678458ac271e0da87c970aec0a5339f5423f7 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 600m memory: 2Gi requests: cpu: 10m memory: 512Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /tmp/k8s-webhook-server/serving-certs name: cert readOnly: true - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-h5b6m readOnly: true - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080/ - --logtostderr=true - --v=0 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: limits: cpu: 500m memory: 128Mi requests: cpu: 5m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-h5b6m readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: infra-operator-controller-manager-dockercfg-dq8th nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seLinuxOptions: level: s0:c26,c5 serviceAccount: infra-operator-controller-manager serviceAccountName: infra-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: cert secret: defaultMode: 420 secretName: infra-operator-webhook-server-cert - name: kube-api-access-h5b6m projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:25Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:50Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:32Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:32Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:50Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://3da9d3f3fa96874e17ac9fc5ceef5bb081b232c10f927fd1930be69ebd8d10cb image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imageID: quay.io/openstack-k8s-operators/kube-rbac-proxy@sha256:d28df2924a366ed857d6c2c14baac9741238032d41f3d02c12cd757189b68b8a lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:25Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-h5b6m readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://9998a8cb51281700ad3c15340f61bf4ce33a955e16c732ce49ff4a5d83ded5de image: quay.io/openstack-k8s-operators/infra-operator@sha256:09a6d0613ee2d3c1c809fc36c22678458ac271e0da87c970aec0a5339f5423f7 imageID: quay.io/openstack-k8s-operators/infra-operator@sha256:09a6d0613ee2d3c1c809fc36c22678458ac271e0da87c970aec0a5339f5423f7 lastState: {} name: manager ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:25Z' volumeMounts: - mountPath: /tmp/k8s-webhook-server/serving-certs name: cert readOnly: true recursiveReadOnly: Disabled - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-h5b6m readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.72 podIPs: - ip: 10.217.0.72 qosClass: Burstable startTime: '2025-11-26T12:23:50Z' - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.73/23"],"mac_address":"0a:58:0a:d9:00:49","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.73/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.73" ], "mac": "0a:58:0a:d9:00:49", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager openshift.io/scc: anyuid creationTimestamp: '2025-11-26T12:23:50Z' generateName: ironic-operator-controller-manager-67cb4dc6d4- labels: app.kubernetes.io/name: ironic-operator control-plane: controller-manager openstack.org/operator-name: ironic pod-template-hash: 67cb4dc6d4 managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:kubectl.kubernetes.io/default-container: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:control-plane: {} f:openstack.org/operator-name: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"179a682e-b9b8-4396-847c-90718c2a5e8e"}: {} f:spec: f:containers: k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} k:{"name":"manager"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"ENABLE_WEBHOOKS"}: .: {} f:name: {} f:value: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"METRICS_CERTS"}: .: {} f:name: {} f:value: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:23:52Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.73"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:24:21Z' name: ironic-operator-controller-manager-67cb4dc6d4-xf2w7 namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: ironic-operator-controller-manager-67cb4dc6d4 uid: 179a682e-b9b8-4396-847c-90718c2a5e8e resourceVersion: '36366' uid: 2b31b20d-186a-4fb2-bfa2-914e5eda233e spec: containers: - args: - --leader-elect - --health-probe-bind-address=:8081 - --metrics-bind-address=127.0.0.1:8080 command: - /manager env: - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: ENABLE_WEBHOOKS value: 'false' - name: METRICS_CERTS value: 'false' image: quay.io/openstack-k8s-operators/ironic-operator@sha256:d65dbfc956e9cf376f3c48fc3a0942cb7306b5164f898c40d1efca106df81db7 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 512Mi requests: cpu: 10m memory: 256Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-nbh7v readOnly: true - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080/ - --logtostderr=true - --v=0 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: limits: cpu: 500m memory: 128Mi requests: cpu: 5m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-nbh7v readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: ironic-operator-controller-manager-dockercfg-kwn5m nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seLinuxOptions: level: s0:c26,c5 serviceAccount: ironic-operator-controller-manager serviceAccountName: ironic-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-api-access-nbh7v projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:52Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:50Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:21Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:21Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:50Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://93e2c6af4d12d6de3c1795739570c54be979e05eed91c65b1928cc4a7d62c872 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imageID: quay.io/openstack-k8s-operators/kube-rbac-proxy@sha256:d28df2924a366ed857d6c2c14baac9741238032d41f3d02c12cd757189b68b8a lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:12Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-nbh7v readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://d872673325d03d22a616cc41b2ebf632da9f05be89f50d8d235a8f313b3aef86 image: quay.io/openstack-k8s-operators/ironic-operator@sha256:d65dbfc956e9cf376f3c48fc3a0942cb7306b5164f898c40d1efca106df81db7 imageID: quay.io/openstack-k8s-operators/ironic-operator@sha256:d65dbfc956e9cf376f3c48fc3a0942cb7306b5164f898c40d1efca106df81db7 lastState: {} name: manager ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:12Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-nbh7v readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.73 podIPs: - ip: 10.217.0.73 qosClass: Burstable startTime: '2025-11-26T12:23:50Z' - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.74/23"],"mac_address":"0a:58:0a:d9:00:4a","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.74/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.74" ], "mac": "0a:58:0a:d9:00:4a", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager openshift.io/scc: anyuid creationTimestamp: '2025-11-26T12:23:50Z' generateName: keystone-operator-controller-manager-7b4567c7cf- labels: app.kubernetes.io/name: keystone-operator control-plane: controller-manager openstack.org/operator-name: keystone pod-template-hash: 7b4567c7cf managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:kubectl.kubernetes.io/default-container: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:control-plane: {} f:openstack.org/operator-name: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"8c4c3b7a-e1e5-4b18-9480-5c67108ba8c6"}: {} f:spec: f:containers: k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} k:{"name":"manager"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"ENABLE_WEBHOOKS"}: .: {} f:name: {} f:value: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"METRICS_CERTS"}: .: {} f:name: {} f:value: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:23:52Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.74"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:24:12Z' name: keystone-operator-controller-manager-7b4567c7cf-2gfhc namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: keystone-operator-controller-manager-7b4567c7cf uid: 8c4c3b7a-e1e5-4b18-9480-5c67108ba8c6 resourceVersion: '36235' uid: c6c80d48-ce10-48bd-8cfb-67db8079dc1b spec: containers: - args: - --leader-elect - --health-probe-bind-address=:8081 - --metrics-bind-address=127.0.0.1:8080 command: - /manager env: - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: ENABLE_WEBHOOKS value: 'false' - name: METRICS_CERTS value: 'false' image: quay.io/openstack-k8s-operators/keystone-operator@sha256:25faa5b0e4801d4d3b01a28b877ed3188eee71f33ad66f3c2e86b7921758e711 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 512Mi requests: cpu: 10m memory: 256Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-6d7kg readOnly: true - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080/ - --logtostderr=true - --v=0 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: limits: cpu: 500m memory: 128Mi requests: cpu: 5m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-6d7kg readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: keystone-operator-controller-manager-dockercfg-dlbs9 nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seLinuxOptions: level: s0:c26,c5 serviceAccount: keystone-operator-controller-manager serviceAccountName: keystone-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-api-access-6d7kg projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:04Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:50Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:12Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:12Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:50Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://22547309bfeea8f315b39566cbce84aff637e796d8f292520d9e74b198c25716 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imageID: quay.io/openstack-k8s-operators/kube-rbac-proxy@sha256:d28df2924a366ed857d6c2c14baac9741238032d41f3d02c12cd757189b68b8a lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:12Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-6d7kg readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://e04612a7e388fbd56d633257e830d9e02ce33ae5e5336a1d4b893a38358c1465 image: quay.io/openstack-k8s-operators/keystone-operator@sha256:25faa5b0e4801d4d3b01a28b877ed3188eee71f33ad66f3c2e86b7921758e711 imageID: quay.io/openstack-k8s-operators/keystone-operator@sha256:25faa5b0e4801d4d3b01a28b877ed3188eee71f33ad66f3c2e86b7921758e711 lastState: {} name: manager ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:04Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-6d7kg readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.74 podIPs: - ip: 10.217.0.74 qosClass: Burstable startTime: '2025-11-26T12:23:50Z' - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.75/23"],"mac_address":"0a:58:0a:d9:00:4b","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.75/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.75" ], "mac": "0a:58:0a:d9:00:4b", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager openshift.io/scc: anyuid creationTimestamp: '2025-11-26T12:23:50Z' generateName: manila-operator-controller-manager-5d499bf58b- labels: app.kubernetes.io/name: manila-operator control-plane: controller-manager openstack.org/operator-name: manila pod-template-hash: 5d499bf58b managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:kubectl.kubernetes.io/default-container: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:control-plane: {} f:openstack.org/operator-name: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"8d6b0e06-ca5b-42cd-a276-704c70865c37"}: {} f:spec: f:containers: k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} k:{"name":"manager"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"ENABLE_WEBHOOKS"}: .: {} f:name: {} f:value: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"METRICS_CERTS"}: .: {} f:name: {} f:value: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:23:52Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.75"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:24:11Z' name: manila-operator-controller-manager-5d499bf58b-ffwjp namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: manila-operator-controller-manager-5d499bf58b uid: 8d6b0e06-ca5b-42cd-a276-704c70865c37 resourceVersion: '36153' uid: a6b8f0bf-a405-4b2a-91b2-1934cd2997b2 spec: containers: - args: - --leader-elect - --health-probe-bind-address=:8081 - --metrics-bind-address=127.0.0.1:8080 command: - /manager env: - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: ENABLE_WEBHOOKS value: 'false' - name: METRICS_CERTS value: 'false' image: quay.io/openstack-k8s-operators/manila-operator@sha256:89910bc3ecceb7590d3207ac294eb7354de358cf39ef03c72323b26c598e50e6 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 512Mi requests: cpu: 10m memory: 256Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-tpgch readOnly: true - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080/ - --logtostderr=true - --v=0 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: limits: cpu: 500m memory: 128Mi requests: cpu: 5m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-tpgch readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: manila-operator-controller-manager-dockercfg-2ftv5 nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seLinuxOptions: level: s0:c26,c5 serviceAccount: manila-operator-controller-manager serviceAccountName: manila-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-api-access-tpgch projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:06Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:50Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:11Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:11Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:50Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://9abd35c6cad6687625f08afad3a91dc2ce7dd4fc8389f1fc19444dae05784dee image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imageID: quay.io/openstack-k8s-operators/kube-rbac-proxy@sha256:d28df2924a366ed857d6c2c14baac9741238032d41f3d02c12cd757189b68b8a lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:06Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-tpgch readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://cf32692bd07f4559e77a83770c2389409dd8ffadd38db92a5806726a31dbd660 image: quay.io/openstack-k8s-operators/manila-operator@sha256:89910bc3ecceb7590d3207ac294eb7354de358cf39ef03c72323b26c598e50e6 imageID: quay.io/openstack-k8s-operators/manila-operator@sha256:89910bc3ecceb7590d3207ac294eb7354de358cf39ef03c72323b26c598e50e6 lastState: {} name: manager ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:04Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-tpgch readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.75 podIPs: - ip: 10.217.0.75 qosClass: Burstable startTime: '2025-11-26T12:23:50Z' - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.76/23"],"mac_address":"0a:58:0a:d9:00:4c","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.76/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.76" ], "mac": "0a:58:0a:d9:00:4c", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager openshift.io/scc: anyuid creationTimestamp: '2025-11-26T12:23:50Z' generateName: mariadb-operator-controller-manager-66f4dd4bc7- labels: app.kubernetes.io/name: mariadb-operator control-plane: controller-manager openstack.org/operator-name: mariadb pod-template-hash: 66f4dd4bc7 managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:kubectl.kubernetes.io/default-container: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:control-plane: {} f:openstack.org/operator-name: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"7c1bd820-efd9-473a-b25a-c69da1b2e6d2"}: {} f:spec: f:containers: k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} k:{"name":"manager"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"ENABLE_WEBHOOKS"}: .: {} f:name: {} f:value: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"METRICS_CERTS"}: .: {} f:name: {} f:value: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:23:52Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.76"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:24:12Z' name: mariadb-operator-controller-manager-66f4dd4bc7-6phws namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: mariadb-operator-controller-manager-66f4dd4bc7 uid: 7c1bd820-efd9-473a-b25a-c69da1b2e6d2 resourceVersion: '36251' uid: 8911dae6-36bd-410e-847a-c7c7134bb5a4 spec: containers: - args: - --leader-elect - --health-probe-bind-address=:8081 - --metrics-bind-address=127.0.0.1:8080 command: - /manager env: - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: ENABLE_WEBHOOKS value: 'false' - name: METRICS_CERTS value: 'false' image: quay.io/openstack-k8s-operators/mariadb-operator@sha256:888edf6f432e52eaa5fc3caeae616fe38a3302b006bbba0e38885b2beba9f0f2 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 512Mi requests: cpu: 10m memory: 256Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-gv6qj readOnly: true - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080/ - --logtostderr=true - --v=0 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: limits: cpu: 500m memory: 128Mi requests: cpu: 5m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-gv6qj readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: mariadb-operator-controller-manager-dockercfg-m8fdr nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seLinuxOptions: level: s0:c26,c5 serviceAccount: mariadb-operator-controller-manager serviceAccountName: mariadb-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-api-access-gv6qj projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:04Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:51Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:12Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:12Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:50Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://efca76ea9829dfcb13fb612a6e3cdd2ef3efffea4fa1519c64688cb3f8aff9da image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imageID: quay.io/openstack-k8s-operators/kube-rbac-proxy@sha256:d28df2924a366ed857d6c2c14baac9741238032d41f3d02c12cd757189b68b8a lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:12Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-gv6qj readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://3937a23c9cf274dd328b704b2aafa6f0655d1a275e0df4ebbcc5f42fb08d5d9b image: quay.io/openstack-k8s-operators/mariadb-operator@sha256:888edf6f432e52eaa5fc3caeae616fe38a3302b006bbba0e38885b2beba9f0f2 imageID: quay.io/openstack-k8s-operators/mariadb-operator@sha256:888edf6f432e52eaa5fc3caeae616fe38a3302b006bbba0e38885b2beba9f0f2 lastState: {} name: manager ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:04Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-gv6qj readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.76 podIPs: - ip: 10.217.0.76 qosClass: Burstable startTime: '2025-11-26T12:23:51Z' - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.77/23"],"mac_address":"0a:58:0a:d9:00:4d","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.77/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.77" ], "mac": "0a:58:0a:d9:00:4d", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager openshift.io/scc: anyuid creationTimestamp: '2025-11-26T12:23:50Z' generateName: neutron-operator-controller-manager-6fdcddb789- labels: app.kubernetes.io/name: neutron-operator control-plane: controller-manager openstack.org/operator-name: neutron pod-template-hash: 6fdcddb789 managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:kubectl.kubernetes.io/default-container: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:control-plane: {} f:openstack.org/operator-name: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"503b9861-a282-47c1-bc3c-73eba6c46d60"}: {} f:spec: f:containers: k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} k:{"name":"manager"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"ENABLE_WEBHOOKS"}: .: {} f:name: {} f:value: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"METRICS_CERTS"}: .: {} f:name: {} f:value: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:23:52Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.77"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:24:21Z' name: neutron-operator-controller-manager-6fdcddb789-7nh8j namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: neutron-operator-controller-manager-6fdcddb789 uid: 503b9861-a282-47c1-bc3c-73eba6c46d60 resourceVersion: '36376' uid: 3811206c-bdee-4ea2-9f7c-7be96426f677 spec: containers: - args: - --leader-elect - --health-probe-bind-address=:8081 - --metrics-bind-address=127.0.0.1:8080 command: - /manager env: - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: ENABLE_WEBHOOKS value: 'false' - name: METRICS_CERTS value: 'false' image: quay.io/openstack-k8s-operators/neutron-operator@sha256:e00a9ed0ab26c5b745bd804ab1fe6b22428d026f17ea05a05f045e060342f46c imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 512Mi requests: cpu: 10m memory: 256Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-g9tv7 readOnly: true - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080/ - --logtostderr=true - --v=0 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: limits: cpu: 500m memory: 128Mi requests: cpu: 5m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-g9tv7 readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: neutron-operator-controller-manager-dockercfg-t9vh7 nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seLinuxOptions: level: s0:c26,c5 serviceAccount: neutron-operator-controller-manager serviceAccountName: neutron-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-api-access-g9tv7 projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:52Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:51Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:21Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:21Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:50Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://50f1df31cdd1cf2947e54aacc1caca4be14c97214d137f215a5f8f0e1587d5b4 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imageID: quay.io/openstack-k8s-operators/kube-rbac-proxy@sha256:d28df2924a366ed857d6c2c14baac9741238032d41f3d02c12cd757189b68b8a lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:09Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-g9tv7 readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://5d27e14532c672987ae8c7d87e21592b5b31d6b10daba6d60787d1e4f9c3cfac image: quay.io/openstack-k8s-operators/neutron-operator@sha256:e00a9ed0ab26c5b745bd804ab1fe6b22428d026f17ea05a05f045e060342f46c imageID: quay.io/openstack-k8s-operators/neutron-operator@sha256:e00a9ed0ab26c5b745bd804ab1fe6b22428d026f17ea05a05f045e060342f46c lastState: {} name: manager ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:09Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-g9tv7 readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.77 podIPs: - ip: 10.217.0.77 qosClass: Burstable startTime: '2025-11-26T12:23:51Z' - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.78/23"],"mac_address":"0a:58:0a:d9:00:4e","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.78/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.78" ], "mac": "0a:58:0a:d9:00:4e", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager openshift.io/scc: anyuid creationTimestamp: '2025-11-26T12:23:50Z' generateName: nova-operator-controller-manager-79556f57fc- labels: app.kubernetes.io/name: nova-operator control-plane: controller-manager openstack.org/operator-name: nova pod-template-hash: 79556f57fc managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:kubectl.kubernetes.io/default-container: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:control-plane: {} f:openstack.org/operator-name: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"d5bcba90-0774-4278-b61e-2646a72a90ba"}: {} f:spec: f:containers: k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} k:{"name":"manager"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"ENABLE_WEBHOOKS"}: .: {} f:name: {} f:value: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"METRICS_CERTS"}: .: {} f:name: {} f:value: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:23:51Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:23:52Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.78"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:24:09Z' name: nova-operator-controller-manager-79556f57fc-n4xj9 namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: nova-operator-controller-manager-79556f57fc uid: d5bcba90-0774-4278-b61e-2646a72a90ba resourceVersion: '36074' uid: 14c2b899-bac2-43dd-844e-a66f4d75954a spec: containers: - args: - --leader-elect - --health-probe-bind-address=:8081 - --metrics-bind-address=127.0.0.1:8080 command: - /manager env: - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: ENABLE_WEBHOOKS value: 'false' - name: METRICS_CERTS value: 'false' image: quay.io/openstack-k8s-operators/nova-operator@sha256:c053e34316044f14929e16e4f0d97f9f1b24cb68b5e22b925ca74c66aaaed0a7 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 512Mi requests: cpu: 10m memory: 256Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-pqmsv readOnly: true - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080/ - --logtostderr=true - --v=0 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: limits: cpu: 500m memory: 128Mi requests: cpu: 5m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-pqmsv readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: nova-operator-controller-manager-dockercfg-zzcwk nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seLinuxOptions: level: s0:c26,c5 serviceAccount: nova-operator-controller-manager serviceAccountName: nova-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-api-access-pqmsv projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:07Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:51Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:09Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:09Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:50Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://58549e6577f5c9f0e9a816bff847011af6994962016b9c432824a82fab23400c image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imageID: quay.io/openstack-k8s-operators/kube-rbac-proxy@sha256:d28df2924a366ed857d6c2c14baac9741238032d41f3d02c12cd757189b68b8a lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:07Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-pqmsv readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://3856c53ae1989968472651551581e3904f82b63e0553e99800683cc554945e02 image: quay.io/openstack-k8s-operators/nova-operator@sha256:c053e34316044f14929e16e4f0d97f9f1b24cb68b5e22b925ca74c66aaaed0a7 imageID: quay.io/openstack-k8s-operators/nova-operator@sha256:c053e34316044f14929e16e4f0d97f9f1b24cb68b5e22b925ca74c66aaaed0a7 lastState: {} name: manager ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:04Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-pqmsv readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.78 podIPs: - ip: 10.217.0.78 qosClass: Burstable startTime: '2025-11-26T12:23:51Z' - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.79/23"],"mac_address":"0a:58:0a:d9:00:4f","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.79/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.79" ], "mac": "0a:58:0a:d9:00:4f", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager openshift.io/scc: anyuid creationTimestamp: '2025-11-26T12:23:50Z' generateName: octavia-operator-controller-manager-64cdc6ff96- labels: app.kubernetes.io/name: octavia-operator control-plane: controller-manager openstack.org/operator-name: octavia pod-template-hash: 64cdc6ff96 managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:kubectl.kubernetes.io/default-container: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:control-plane: {} f:openstack.org/operator-name: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"96cd9399-6758-4c73-840c-138fa8b98fc1"}: {} f:spec: f:containers: k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} k:{"name":"manager"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"ENABLE_WEBHOOKS"}: .: {} f:name: {} f:value: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"METRICS_CERTS"}: .: {} f:name: {} f:value: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:23:50Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:23:51Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:23:52Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.79"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:24:21Z' name: octavia-operator-controller-manager-64cdc6ff96-kcp4x namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: octavia-operator-controller-manager-64cdc6ff96 uid: 96cd9399-6758-4c73-840c-138fa8b98fc1 resourceVersion: '36361' uid: 657e5afd-3aba-4acf-a85d-36ef32e8c5f8 spec: containers: - args: - --leader-elect - --health-probe-bind-address=:8081 - --metrics-bind-address=127.0.0.1:8080 command: - /manager env: - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: ENABLE_WEBHOOKS value: 'false' - name: METRICS_CERTS value: 'false' image: quay.io/openstack-k8s-operators/octavia-operator@sha256:ddc8a82f05930db8ee7a8d6d189b5a66373060656e4baf71ac302f89c477da4c imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 512Mi requests: cpu: 10m memory: 256Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-275zp readOnly: true - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080/ - --logtostderr=true - --v=0 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: limits: cpu: 500m memory: 128Mi requests: cpu: 5m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-275zp readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: octavia-operator-controller-manager-dockercfg-wrp9s nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seLinuxOptions: level: s0:c26,c5 serviceAccount: octavia-operator-controller-manager serviceAccountName: octavia-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-api-access-275zp projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:52Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:51Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:21Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:21Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:50Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://1952f0ceb1964bef02b474c181749f2132e7ec32c4d158be454246e20cf81c8f image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imageID: quay.io/openstack-k8s-operators/kube-rbac-proxy@sha256:d28df2924a366ed857d6c2c14baac9741238032d41f3d02c12cd757189b68b8a lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:09Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-275zp readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://d63a47c1726c41d5c1a63502a2e75dfc94d31a4ee43042a561edc444ee72b8c1 image: quay.io/openstack-k8s-operators/octavia-operator@sha256:ddc8a82f05930db8ee7a8d6d189b5a66373060656e4baf71ac302f89c477da4c imageID: quay.io/openstack-k8s-operators/octavia-operator@sha256:ddc8a82f05930db8ee7a8d6d189b5a66373060656e4baf71ac302f89c477da4c lastState: {} name: manager ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:09Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-275zp readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.79 podIPs: - ip: 10.217.0.79 qosClass: Burstable startTime: '2025-11-26T12:23:51Z' - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.81/23"],"mac_address":"0a:58:0a:d9:00:51","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.81/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.81" ], "mac": "0a:58:0a:d9:00:51", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager openshift.io/scc: restricted-v2 seccomp.security.alpha.kubernetes.io/pod: runtime/default creationTimestamp: '2025-11-26T12:23:51Z' generateName: openstack-baremetal-operator-controller-manager-674cb676c8- labels: app.kubernetes.io/name: openstack-baremetal-operator control-plane: controller-manager openstack.org/operator-name: openstack-baremetal pod-template-hash: 674cb676c8 managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:23:51Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:kubectl.kubernetes.io/default-container: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:control-plane: {} f:openstack.org/operator-name: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"e5193d8a-19db-4a54-8fbd-f476b1b9bee5"}: {} f:spec: f:containers: k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} k:{"name":"manager"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"ENABLE_WEBHOOKS"}: .: {} f:name: {} f:value: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"METRICS_CERTS"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_AGENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_ANSIBLEEE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_AODH_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_AODH_EVALUATOR_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_AODH_LISTENER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_AODH_NOTIFIER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_APACHE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_BARBICAN_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_BARBICAN_KEYSTONE_LISTENER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_BARBICAN_WORKER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CEILOMETER_CENTRAL_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CEILOMETER_COMPUTE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CEILOMETER_IPMI_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CEILOMETER_MYSQLD_EXPORTER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CEILOMETER_NOTIFICATION_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CEILOMETER_SGCORE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CINDER_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CINDER_BACKUP_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CINDER_SCHEDULER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CINDER_VOLUME_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CLOUDKITTY_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CLOUDKITTY_PROC_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_DESIGNATE_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_DESIGNATE_BACKENDBIND9_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_DESIGNATE_CENTRAL_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_DESIGNATE_MDNS_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_DESIGNATE_PRODUCER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_DESIGNATE_UNBOUND_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_DESIGNATE_WORKER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_FRR_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_ISCSID_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_KEPLER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_LOGROTATE_CROND_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_MULTIPATHD_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_NEUTRON_DHCP_AGENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_NEUTRON_METADATA_AGENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_NEUTRON_OVN_AGENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_NEUTRON_SRIOV_AGENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_NODE_EXPORTER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_OVN_BGP_AGENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_PODMAN_EXPORTER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_GLANCE_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_HEAT_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_HEAT_CFNAPI_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_HEAT_ENGINE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_HORIZON_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_INFRA_MEMCACHED_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_INFRA_REDIS_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_IRONIC_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_IRONIC_CONDUCTOR_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_IRONIC_INSPECTOR_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_IRONIC_NEUTRON_AGENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_IRONIC_PXE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_IRONIC_PYTHON_AGENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_KEYSTONE_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_KSM_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_MANILA_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_MANILA_SCHEDULER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_MANILA_SHARE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_MARIADB_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_NET_UTILS_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_NEUTRON_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_NOVA_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_NOVA_COMPUTE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_NOVA_CONDUCTOR_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_NOVA_NOVNC_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_NOVA_SCHEDULER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OCTAVIA_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OCTAVIA_HEALTHMANAGER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OCTAVIA_HOUSEKEEPING_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OCTAVIA_RSYSLOG_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OCTAVIA_WORKER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OPENSTACK_CLIENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OPENSTACK_MUST_GATHER_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OPENSTACK_NETWORK_EXPORTER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OS_CONTAINER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OVN_CONTROLLER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OVN_CONTROLLER_OVS_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OVN_NB_DBCLUSTER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OVN_NORTHD_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OVN_SB_DBCLUSTER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_PLACEMENT_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_RABBITMQ_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_SWIFT_ACCOUNT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_SWIFT_CONTAINER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_SWIFT_OBJECT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_SWIFT_PROXY_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_TEST_TEMPEST_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_WATCHER_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_WATCHER_APPLIER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_WATCHER_DECISION_ENGINE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/tmp/k8s-webhook-server/serving-certs"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:23:51Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:24:07Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.81"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:24:17Z' name: openstack-baremetal-operator-controller-manager-674cb676c8z4lrf namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: openstack-baremetal-operator-controller-manager-674cb676c8 uid: e5193d8a-19db-4a54-8fbd-f476b1b9bee5 resourceVersion: '36311' uid: e37121ad-deca-4553-ae91-2a61eb0f9aac spec: containers: - args: - --leader-elect - --health-probe-bind-address=:8081 - --metrics-bind-address=127.0.0.1:8080 command: - /manager env: - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: ENABLE_WEBHOOKS value: 'true' - name: RELATED_IMAGE_AGENT_IMAGE_URL_DEFAULT value: quay.io/openstack-k8s-operators/openstack-baremetal-operator-agent@sha256:d5f5c71b6e6992182d66adbf5430bdc67ccbbea2893d41a0b690309c38d67469 - name: RELATED_IMAGE_ANSIBLEEE_IMAGE_URL_DEFAULT value: quay.io/openstack-k8s-operators/openstack-ansibleee-runner@sha256:dac9e7b4f0cbdfc0ea387d33aa1c5406e468fc221f9c92eff2dd0071370c8747 - name: RELATED_IMAGE_AODH_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-aodh-api@sha256:c8101c77a82eae4407e41e1fd766dfc6e1b7f9ed1679e3efb6f91ff97a1557b2 - name: RELATED_IMAGE_AODH_EVALUATOR_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-aodh-evaluator@sha256:eb9743b21bbadca6f7cb9ac4fc46b5d58c51c674073c7e1121f4474a71304071 - name: RELATED_IMAGE_AODH_LISTENER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-aodh-listener@sha256:3d81f839b98c2e2a5bf0da79f2f9a92dff7d0a3c5a830b0e95c89dad8cf98a6a - name: RELATED_IMAGE_AODH_NOTIFIER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-aodh-notifier@sha256:d19ac99249b47dd8ea16cd6aaa5756346aa8a2f119ee50819c15c5366efb417d - name: RELATED_IMAGE_APACHE_IMAGE_URL_DEFAULT value: registry.redhat.io/ubi9/httpd-24@sha256:8536169e5537fe6c330eba814248abdcf39cdd8f7e7336034d74e6fda9544050 - name: RELATED_IMAGE_BARBICAN_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-barbican-api@sha256:4c93a5cccb9971e24f05daf93b3aa11ba71752bc3469a1a1a2c4906f92f69645 - name: RELATED_IMAGE_BARBICAN_KEYSTONE_LISTENER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-barbican-keystone-listener@sha256:4f1fa337760e82bfd67cdd142a97c121146dd7e621daac161940dd5e4ddb80dc - name: RELATED_IMAGE_BARBICAN_WORKER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-barbican-worker@sha256:3613b345d5baed98effd906f8b0242d863e14c97078ea473ef01fe1b0afc46f3 - name: RELATED_IMAGE_CEILOMETER_CENTRAL_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ceilometer-central@sha256:d375d370be5ead0dac71109af644849e5795f535f9ad8eeacea261d77ae6f140 - name: RELATED_IMAGE_CEILOMETER_COMPUTE_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ceilometer-compute@sha256:9f9f367ed4c85efb16c3a74a4bb707ff0db271d7bc5abc70a71e984b55f43003 - name: RELATED_IMAGE_CEILOMETER_IPMI_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ceilometer-ipmi@sha256:b73ad22b4955b06d584bce81742556d8c0c7828c495494f8ea7c99391c61b70f - name: RELATED_IMAGE_CEILOMETER_MYSQLD_EXPORTER_IMAGE_URL_DEFAULT value: quay.io/prometheus/mysqld-exporter@sha256:7211a617ec657701ca819aa0ba28e1d5750f5bf2c1391b755cc4a48cc360b0fa - name: RELATED_IMAGE_CEILOMETER_NOTIFICATION_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ceilometer-notification@sha256:aa1d3aaf6b394621ed4089a98e0a82b763f467e8b5c5db772f9fdf99fc86e333 - name: RELATED_IMAGE_CEILOMETER_SGCORE_IMAGE_URL_DEFAULT value: quay.io/openstack-k8s-operators/sg-core@sha256:09b5017c95d7697e66b9c64846bc48ef5826a009cba89b956ec54561e5f4a2d1 - name: RELATED_IMAGE_CINDER_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-cinder-api@sha256:37d64e0a00c54e71a4c1fcbbbf7e832f6886ffd03c9a02b6ee3ca48fabc30879 - name: RELATED_IMAGE_CINDER_BACKUP_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-cinder-backup@sha256:d6661053141b6df421288a7c9968a155ab82e478c1d75ab41f2cebe2f0ca02d2 - name: RELATED_IMAGE_CINDER_SCHEDULER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-cinder-scheduler@sha256:ce2d63258cb4e7d0d1c07234de6889c5434464190906798019311a1c7cf6387f - name: RELATED_IMAGE_CINDER_VOLUME_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-cinder-volume@sha256:0485ef9e5b4437f7cd2ba54034a87722ce4669ee86b3773c6b0c037ed8000e91 - name: RELATED_IMAGE_CLOUDKITTY_API_IMAGE_URL_DEFAULT value: quay.rdoproject.org/podified-master-centos10/openstack-cloudkitty-api@sha256:f3dcdb3eccaf5bc69f97de24225f071e251992f4595c931ed37e8a5d9ada8b21 - name: RELATED_IMAGE_CLOUDKITTY_PROC_IMAGE_URL_DEFAULT value: quay.rdoproject.org/podified-master-centos10/openstack-cloudkitty-processor@sha256:43b7d46663cd88410bb01870767f2c561e8c4bafebc1ae283c0aa59fecfaeb16 - name: RELATED_IMAGE_DESIGNATE_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-designate-api@sha256:ff0c553ceeb2e0f44b010e37dc6d0db8a251797b88e56468b7cf7f05253e4232 - name: RELATED_IMAGE_DESIGNATE_BACKENDBIND9_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-designate-backend-bind9@sha256:624f553f073af7493d34828b074adc9981cce403edd8e71482c7307008479fd9 - name: RELATED_IMAGE_DESIGNATE_CENTRAL_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-designate-central@sha256:e3874936a518c8560339db8f840fc5461885819f6050b5de8d3ab9199bea5094 - name: RELATED_IMAGE_DESIGNATE_MDNS_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-designate-mdns@sha256:1cea25f1d2a45affc80c46fb9d427749d3f06b61590ac6070a2910e3ec8a4e5d - name: RELATED_IMAGE_DESIGNATE_PRODUCER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-designate-producer@sha256:e36d5b9a65194f12f7b01c6422ba3ed52a687fd1695fbb21f4986c67d9f9317f - name: RELATED_IMAGE_DESIGNATE_UNBOUND_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-unbound@sha256:8b21bec527d54cd766e277889df6bcccd2baeaa946274606b986c0c3b7ca689f - name: RELATED_IMAGE_DESIGNATE_WORKER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-designate-worker@sha256:45aceca77f8fcf61127f0da650bdfdf11ede9b0944c78b63fab819d03283f96b - name: RELATED_IMAGE_EDPM_FRR_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-frr@sha256:709ac58998927dd61786821ae1e63343fd97ccf5763aac5edb4583eea9401d22 - name: RELATED_IMAGE_EDPM_ISCSID_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-iscsid@sha256:867d4ef7c21f75e6030a685b5762ab4d84b671316ed6b98d75200076e93342cd - name: RELATED_IMAGE_EDPM_KEPLER_IMAGE_URL_DEFAULT value: quay.io/sustainable_computing_io/kepler@sha256:581b65b646301e0fcb07582150ba63438f1353a85bf9acf1eb2acb4ce71c58bd - name: RELATED_IMAGE_EDPM_LOGROTATE_CROND_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-cron@sha256:2b90da93550b99d2fcfa95bd819f3363aa68346a416f8dc7baac3e9c5f487761 - name: RELATED_IMAGE_EDPM_MULTIPATHD_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-multipathd@sha256:6f86db36d668348be8c5b46dcda8b1fa23d34bfdc07164fbcbe7a6327fb4de24 - name: RELATED_IMAGE_EDPM_NEUTRON_DHCP_AGENT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-neutron-dhcp-agent@sha256:8cde52cef8795d1c91983b100d86541c7718160ec260fe0f97b96add4c2c8ee8 - name: RELATED_IMAGE_EDPM_NEUTRON_METADATA_AGENT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-neutron-metadata-agent-ovn@sha256:a9583cb3baf440d2358ef041373833afbeae60da8159dd031502379901141620 - name: RELATED_IMAGE_EDPM_NEUTRON_OVN_AGENT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-neutron-ovn-agent@sha256:835ebed082fe1c45bd799d1d5357595ce63efeb05ca876f26b08443facb9c164 - name: RELATED_IMAGE_EDPM_NEUTRON_SRIOV_AGENT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-neutron-sriov-agent@sha256:011d682241db724bc40736c9b54d2ea450ea7e6be095b1ff5fa28c8007466775 - name: RELATED_IMAGE_EDPM_NODE_EXPORTER_IMAGE_URL_DEFAULT value: quay.io/prometheus/node-exporter@sha256:39c642b2b337e38c18e80266fb14383754178202f40103646337722a594d984c - name: RELATED_IMAGE_EDPM_OVN_BGP_AGENT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ovn-bgp-agent@sha256:2025da90cff8f563deb08bee71efe16d4078edc2a767b2e225cca5c77f1aa2f9 - name: RELATED_IMAGE_EDPM_PODMAN_EXPORTER_IMAGE_URL_DEFAULT value: quay.io/navidys/prometheus-podman-exporter@sha256:d339ba049bbd1adccb795962bf163f5b22fd84dea865d88b9eb525e46247d6bd - name: RELATED_IMAGE_GLANCE_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-glance-api@sha256:26bd7b0bd6070856aefef6fe754c547d55c056396ea30d879d34c2d49b5a1d29 - name: RELATED_IMAGE_HEAT_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-heat-api@sha256:ff46cd5e0e13d105c4629e78c2734a50835f06b6a1e31da9e0462981d10c4be3 - name: RELATED_IMAGE_HEAT_CFNAPI_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-heat-api-cfn@sha256:5b4fd0c2b76fa5539f74687b11c5882d77bd31352452322b37ff51fa18f12a61 - name: RELATED_IMAGE_HEAT_ENGINE_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-heat-engine@sha256:5e03376bd895346dc8f627ca15ded942526ed8b5e92872f453ce272e694d18d4 - name: RELATED_IMAGE_HORIZON_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-horizon@sha256:65b94ff9fcd486845fb0544583bf2a973246a61a0ad32340fb92d632285f1057 - name: RELATED_IMAGE_INFRA_MEMCACHED_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-memcached@sha256:36a0fb31978aee0ded2483de311631e64a644d0b0685b5b055f65ede7eb8e8a2 - name: RELATED_IMAGE_INFRA_REDIS_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-redis@sha256:5f6045841aff0fde6f684a34cdf49f8dc7b2c3bcbdeab201f1058971e0c5f79e - name: RELATED_IMAGE_IRONIC_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ironic-api@sha256:448f4e1b740c30936e340bd6e8534d78c83357bf373a4223950aa64d3484f007 - name: RELATED_IMAGE_IRONIC_CONDUCTOR_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ironic-conductor@sha256:b68e3615af8a0eb0ef6bf9ceeef59540a6f4a9a85f6078a3620be115c73a7db8 - name: RELATED_IMAGE_IRONIC_INSPECTOR_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ironic-inspector@sha256:7eae01cf60383e523c9cd94d158a9162120a7370829a1dad20fdea6b0fd660bd - name: RELATED_IMAGE_IRONIC_NEUTRON_AGENT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ironic-neutron-agent@sha256:28cc10501788081eb61b5a1af35546191a92741f4f109df54c74e2b19439d0f9 - name: RELATED_IMAGE_IRONIC_PXE_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ironic-pxe@sha256:9a616e37acfd120612f78043237a8541266ba34883833c9beb43f3da313661ad - name: RELATED_IMAGE_IRONIC_PYTHON_AGENT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/ironic-python-agent@sha256:6b1be6cd94a0942259bca5d5d2c30cc7de4a33276b61f8ae3940226772106256 - name: RELATED_IMAGE_KEYSTONE_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-keystone@sha256:02d2c22d15401574941fbe057095442dee0d6f7a0a9341de35d25e6a12a3fe4b - name: RELATED_IMAGE_KSM_IMAGE_URL_DEFAULT value: registry.k8s.io/kube-state-metrics/kube-state-metrics@sha256:db384bf43222b066c378e77027a675d4cd9911107adba46c2922b3a55e10d6fb - name: RELATED_IMAGE_MANILA_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-manila-api@sha256:fc3b3a36b74fd653946723c54b208072d52200635850b531e9d595a7aaea5a01 - name: RELATED_IMAGE_MANILA_SCHEDULER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-manila-scheduler@sha256:7850ccbff320bf9a1c9c769c1c70777eb97117dd8cd5ae4435be9b4622cf807a - name: RELATED_IMAGE_MANILA_SHARE_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-manila-share@sha256:397dac7e39cf40d14a986e6ec4a60fb698ca35c197d0db315b1318514cc6d1d4 - name: RELATED_IMAGE_MARIADB_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-mariadb@sha256:10452e2144368e2f128c8fb8ef9e54880b06ef1d71d9f084a0217dcb099c51ce - name: RELATED_IMAGE_NET_UTILS_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-netutils@sha256:1c95142a36276686e720f86423ee171dc9adcc1e89879f627545b7c906ccd9bd - name: RELATED_IMAGE_NEUTRON_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-neutron-server@sha256:18f8463fe46fe6081d5682009e92bbcb3df33282b83b0a2857abaece795cf1ba - name: RELATED_IMAGE_NOVA_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-nova-api@sha256:e331a8fde6638e5ba154c4f0b38772a9a424f60656f2777245975fb1fa02f07d - name: RELATED_IMAGE_NOVA_COMPUTE_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-nova-compute@sha256:b6e1e8a249d36ef36c6ac4170af1e043dda1ccc0f9672832d3ff151bf3533076 - name: RELATED_IMAGE_NOVA_CONDUCTOR_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-nova-conductor@sha256:cd3cf7a34053e850b4d4f9f4ea4c74953a54a42fd18e47d7c01d44a88923e925 - name: RELATED_IMAGE_NOVA_NOVNC_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-nova-novncproxy@sha256:aee28476344fc0cc148fbe97daf9b1bfcedc22001550bba4bdc4e84be7b6989d - name: RELATED_IMAGE_NOVA_SCHEDULER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-nova-scheduler@sha256:cfa0b92c976603ee2a937d34013a238fcd8aa75f998e50642e33489f14124633 - name: RELATED_IMAGE_OCTAVIA_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-octavia-api@sha256:73c2f2d6eecf88acf4e45b133c8373d9bb006b530e0aff0b28f3b7420620a874 - name: RELATED_IMAGE_OCTAVIA_HEALTHMANAGER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-octavia-health-manager@sha256:927b405cc04abe5ff716186e8d35e2dc5fad1c8430194659ee6617d74e4e055d - name: RELATED_IMAGE_OCTAVIA_HOUSEKEEPING_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-octavia-housekeeping@sha256:6154d7cebd7c339afa5b86330262156171743aa5b79c2b78f9a2f378005ed8fb - name: RELATED_IMAGE_OCTAVIA_RSYSLOG_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-rsyslog@sha256:e2db2f4af8d3d0be7868c6efef0189f3a2c74a8f96ae10e3f991cdf83feaef29 - name: RELATED_IMAGE_OCTAVIA_WORKER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-octavia-worker@sha256:c773629df257726a6d3cacc24a6e4df0babcd7d37df04e6d14676a8da028b9c9 - name: RELATED_IMAGE_OPENSTACK_CLIENT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-openstackclient@sha256:776211111e2e6493706dbc49a3ba44f31d1b947919313ed3a0f35810e304ec52 - name: RELATED_IMAGE_OPENSTACK_MUST_GATHER_DEFAULT value: quay.io/openstack-k8s-operators/openstack-must-gather@sha256:ae4a20d9aad04cfaeaa3105fa8e37db4216c3b17530bc98daf1204555bc23485 - name: RELATED_IMAGE_OPENSTACK_NETWORK_EXPORTER_IMAGE_URL_DEFAULT value: quay.io/openstack-k8s-operators/openstack-network-exporter@sha256:ecd56e6733c475f2d441344fd98f288c3eac0261ba113695fec7520a954ccbc7 - name: RELATED_IMAGE_OS_CONTAINER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/edpm-hardened-uefi@sha256:7cccf24ad0a152f90ca39893064f48a1656950ee8142685a5d482c71f0bdc9f5 - name: RELATED_IMAGE_OVN_CONTROLLER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ovn-controller@sha256:af46761060c7987e1dee5f14c06d85b46f12ad8e09c83d4246ab4e3a65dfda3e - name: RELATED_IMAGE_OVN_CONTROLLER_OVS_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ovn-base@sha256:05450b48f6b5352b2686a26e933e8727748edae2ae9652d9164b7d7a1817c55a - name: RELATED_IMAGE_OVN_NB_DBCLUSTER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ovn-nb-db-server@sha256:fc9c99eeef91523482bd8f92661b393287e1f2a24ad2ba9e33191f8de9af74cf - name: RELATED_IMAGE_OVN_NORTHD_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ovn-northd@sha256:3e4ecc02b4b5e0860482a93599ba9ca598c5ce26c093c46e701f96fe51acb208 - name: RELATED_IMAGE_OVN_SB_DBCLUSTER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ovn-sb-db-server@sha256:2346037e064861c7892690d2e8b3e1eea1a26ce3c3a11fda0b41301965bc828c - name: RELATED_IMAGE_PLACEMENT_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-placement-api@sha256:7dd2e0dbb6bb5a6cecd1763e43479ca8cb6a0c502534e83c8795c0da2b50e099 - name: RELATED_IMAGE_RABBITMQ_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-rabbitmq@sha256:95d67f51dfedd5bd3ec785b488425295b2d8c41feae3e6386ef471615381809b - name: RELATED_IMAGE_SWIFT_ACCOUNT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-swift-account@sha256:c26c3ff9cabe3593ceb10006e782bf9391ac14785768ce9eec4f938c2d3cf228 - name: RELATED_IMAGE_SWIFT_CONTAINER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-swift-container@sha256:273fe8c27d08d0f62773a02f8cef6a761a7768116ee1a4be611f93bbf63f2b75 - name: RELATED_IMAGE_SWIFT_OBJECT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-swift-object@sha256:daa45220bb1c47922d0917aa8fe423bb82b03a01429f1c9e37635e701e352d71 - name: RELATED_IMAGE_SWIFT_PROXY_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-swift-proxy-server@sha256:a80a074e227d3238bb6f285788a9e886ae7a5909ccbc5c19c93c369bdfe5b3b8 - name: RELATED_IMAGE_TEST_TEMPEST_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-tempest-all@sha256:58ac66ca1be01fe0157977bd79a26cde4d0de153edfaf4162367c924826b2ef4 - name: RELATED_IMAGE_WATCHER_API_IMAGE_URL_DEFAULT value: quay.io/podified-master-centos9/openstack-watcher-api@sha256:5f22dc1a974f5b99fef0655d0e3d01389bcc632880ac921a65fec25652e74664 - name: RELATED_IMAGE_WATCHER_APPLIER_IMAGE_URL_DEFAULT value: quay.io/podified-master-centos9/openstack-watcher-applier@sha256:84958d1a17837198f9d91ac32c5d7be95d041a0228fe01d5c626c855241da8c9 - name: RELATED_IMAGE_WATCHER_DECISION_ENGINE_IMAGE_URL_DEFAULT value: quay.io/podified-master-centos9/openstack-watcher-decision-engine@sha256:8716afabd6004269722b3133937e846a87a8420941a3469852c031176aed5848 - name: METRICS_CERTS value: 'false' image: quay.io/openstack-k8s-operators/openstack-baremetal-operator@sha256:51a478c52d9012c08743f63b44a3721c7ff7a0599ba9c2cf89ad54ea41b19e41 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 512Mi requests: cpu: 10m memory: 256Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL runAsUser: 1000660000 terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /tmp/k8s-webhook-server/serving-certs name: cert readOnly: true - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-5wvm9 readOnly: true - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080/ - --logtostderr=true - --v=0 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: limits: cpu: 500m memory: 128Mi requests: cpu: 5m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL runAsUser: 1000660000 terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-5wvm9 readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: openstack-baremetal-operator-controller-manager-dockercfg-5t8bb nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: fsGroup: 1000660000 runAsNonRoot: true seLinuxOptions: level: s0:c26,c5 seccompProfile: type: RuntimeDefault serviceAccount: openstack-baremetal-operator-controller-manager serviceAccountName: openstack-baremetal-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: cert secret: defaultMode: 420 secretName: openstack-baremetal-operator-webhook-server-cert - name: kube-api-access-5wvm9 projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:12Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:51Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:17Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:17Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:51Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://6164766dd76048ad50eb0a79850066b3b4504777595ef2aba7934d57ee9cabcf image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imageID: quay.io/openstack-k8s-operators/kube-rbac-proxy@sha256:d28df2924a366ed857d6c2c14baac9741238032d41f3d02c12cd757189b68b8a lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:12Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-5wvm9 readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://13dee283cea3a21276b896e24c64f8e6b4b5feb860465e7e8eb412c719248c84 image: quay.io/openstack-k8s-operators/openstack-baremetal-operator@sha256:51a478c52d9012c08743f63b44a3721c7ff7a0599ba9c2cf89ad54ea41b19e41 imageID: quay.io/openstack-k8s-operators/openstack-baremetal-operator@sha256:51a478c52d9012c08743f63b44a3721c7ff7a0599ba9c2cf89ad54ea41b19e41 lastState: {} name: manager ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:12Z' volumeMounts: - mountPath: /tmp/k8s-webhook-server/serving-certs name: cert readOnly: true recursiveReadOnly: Disabled - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-5wvm9 readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.81 podIPs: - ip: 10.217.0.81 qosClass: Burstable startTime: '2025-11-26T12:23:51Z' - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.87/23"],"mac_address":"0a:58:0a:d9:00:57","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.87/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.87" ], "mac": "0a:58:0a:d9:00:57", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager openshift.io/scc: restricted-v2 seccomp.security.alpha.kubernetes.io/pod: runtime/default creationTimestamp: '2025-11-26T12:23:51Z' generateName: openstack-operator-controller-manager-659d75f7c6- labels: app.kubernetes.io/name: openstack-operator control-plane: controller-manager openstack.org/operator-name: openstack pod-template-hash: 659d75f7c6 managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:23:51Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:kubectl.kubernetes.io/default-container: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:control-plane: {} f:openstack.org/operator-name: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"f3326c9d-f4b5-41b7-91a7-12c95816f1d2"}: {} f:spec: f:containers: k:{"name":"manager"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"OPENSTACK_RELEASE_VERSION"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_AGENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_ANSIBLEEE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_AODH_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_AODH_EVALUATOR_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_AODH_LISTENER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_AODH_NOTIFIER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_APACHE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_BARBICAN_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_BARBICAN_KEYSTONE_LISTENER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_BARBICAN_WORKER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CEILOMETER_CENTRAL_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CEILOMETER_COMPUTE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CEILOMETER_IPMI_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CEILOMETER_MYSQLD_EXPORTER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CEILOMETER_NOTIFICATION_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CEILOMETER_SGCORE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CINDER_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CINDER_BACKUP_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CINDER_SCHEDULER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CINDER_VOLUME_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CLOUDKITTY_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CLOUDKITTY_PROC_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_DESIGNATE_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_DESIGNATE_BACKENDBIND9_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_DESIGNATE_CENTRAL_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_DESIGNATE_MDNS_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_DESIGNATE_PRODUCER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_DESIGNATE_UNBOUND_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_DESIGNATE_WORKER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_FRR_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_ISCSID_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_KEPLER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_LOGROTATE_CROND_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_MULTIPATHD_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_NEUTRON_DHCP_AGENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_NEUTRON_METADATA_AGENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_NEUTRON_OVN_AGENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_NEUTRON_SRIOV_AGENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_NODE_EXPORTER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_OVN_BGP_AGENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_PODMAN_EXPORTER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_GLANCE_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_HEAT_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_HEAT_CFNAPI_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_HEAT_ENGINE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_HORIZON_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_INFRA_MEMCACHED_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_INFRA_REDIS_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_IRONIC_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_IRONIC_CONDUCTOR_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_IRONIC_INSPECTOR_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_IRONIC_NEUTRON_AGENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_IRONIC_PXE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_IRONIC_PYTHON_AGENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_KEYSTONE_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_KSM_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_MANILA_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_MANILA_SCHEDULER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_MANILA_SHARE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_MARIADB_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_NET_UTILS_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_NEUTRON_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_NOVA_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_NOVA_COMPUTE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_NOVA_CONDUCTOR_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_NOVA_NOVNC_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_NOVA_SCHEDULER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OCTAVIA_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OCTAVIA_HEALTHMANAGER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OCTAVIA_HOUSEKEEPING_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OCTAVIA_RSYSLOG_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OCTAVIA_WORKER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OPENSTACK_CLIENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OPENSTACK_MUST_GATHER_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OPENSTACK_NETWORK_EXPORTER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OS_CONTAINER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OVN_CONTROLLER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OVN_CONTROLLER_OVS_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OVN_NB_DBCLUSTER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OVN_NORTHD_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OVN_SB_DBCLUSTER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_PLACEMENT_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_RABBITMQ_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_SWIFT_ACCOUNT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_SWIFT_CONTAINER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_SWIFT_OBJECT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_SWIFT_PROXY_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_TEST_TEMPEST_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_WATCHER_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_WATCHER_APPLIER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_WATCHER_DECISION_ENGINE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":9443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/tmp/k8s-metrics-server/metrics-certs"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/tmp/k8s-webhook-server/serving-certs"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:volumes: .: {} k:{"name":"metrics-certs"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:items: {} f:optional: {} f:secretName: {} k:{"name":"webhook-certs"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:23:51Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:24:07Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.87"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:24:17Z' name: openstack-operator-controller-manager-659d75f7c6-78m9j namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: openstack-operator-controller-manager-659d75f7c6 uid: f3326c9d-f4b5-41b7-91a7-12c95816f1d2 resourceVersion: '36319' uid: de8f1d07-0e85-4245-a378-51c81152ef64 spec: containers: - args: - --metrics-bind-address=:8443 - --leader-elect - --health-probe-bind-address=:8081 - --metrics-cert-path=/tmp/k8s-metrics-server/metrics-certs - --webhook-cert-path=/tmp/k8s-webhook-server/serving-certs command: - /manager env: - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: OPENSTACK_RELEASE_VERSION value: 0.5.0-1764151878 - name: RELATED_IMAGE_AGENT_IMAGE_URL_DEFAULT value: quay.io/openstack-k8s-operators/openstack-baremetal-operator-agent@sha256:d5f5c71b6e6992182d66adbf5430bdc67ccbbea2893d41a0b690309c38d67469 - name: RELATED_IMAGE_ANSIBLEEE_IMAGE_URL_DEFAULT value: quay.io/openstack-k8s-operators/openstack-ansibleee-runner@sha256:dac9e7b4f0cbdfc0ea387d33aa1c5406e468fc221f9c92eff2dd0071370c8747 - name: RELATED_IMAGE_AODH_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-aodh-api@sha256:c8101c77a82eae4407e41e1fd766dfc6e1b7f9ed1679e3efb6f91ff97a1557b2 - name: RELATED_IMAGE_AODH_EVALUATOR_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-aodh-evaluator@sha256:eb9743b21bbadca6f7cb9ac4fc46b5d58c51c674073c7e1121f4474a71304071 - name: RELATED_IMAGE_AODH_LISTENER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-aodh-listener@sha256:3d81f839b98c2e2a5bf0da79f2f9a92dff7d0a3c5a830b0e95c89dad8cf98a6a - name: RELATED_IMAGE_AODH_NOTIFIER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-aodh-notifier@sha256:d19ac99249b47dd8ea16cd6aaa5756346aa8a2f119ee50819c15c5366efb417d - name: RELATED_IMAGE_APACHE_IMAGE_URL_DEFAULT value: registry.redhat.io/ubi9/httpd-24@sha256:8536169e5537fe6c330eba814248abdcf39cdd8f7e7336034d74e6fda9544050 - name: RELATED_IMAGE_BARBICAN_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-barbican-api@sha256:4c93a5cccb9971e24f05daf93b3aa11ba71752bc3469a1a1a2c4906f92f69645 - name: RELATED_IMAGE_BARBICAN_KEYSTONE_LISTENER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-barbican-keystone-listener@sha256:4f1fa337760e82bfd67cdd142a97c121146dd7e621daac161940dd5e4ddb80dc - name: RELATED_IMAGE_BARBICAN_WORKER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-barbican-worker@sha256:3613b345d5baed98effd906f8b0242d863e14c97078ea473ef01fe1b0afc46f3 - name: RELATED_IMAGE_CEILOMETER_CENTRAL_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ceilometer-central@sha256:d375d370be5ead0dac71109af644849e5795f535f9ad8eeacea261d77ae6f140 - name: RELATED_IMAGE_CEILOMETER_COMPUTE_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ceilometer-compute@sha256:9f9f367ed4c85efb16c3a74a4bb707ff0db271d7bc5abc70a71e984b55f43003 - name: RELATED_IMAGE_CEILOMETER_IPMI_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ceilometer-ipmi@sha256:b73ad22b4955b06d584bce81742556d8c0c7828c495494f8ea7c99391c61b70f - name: RELATED_IMAGE_CEILOMETER_MYSQLD_EXPORTER_IMAGE_URL_DEFAULT value: quay.io/prometheus/mysqld-exporter@sha256:7211a617ec657701ca819aa0ba28e1d5750f5bf2c1391b755cc4a48cc360b0fa - name: RELATED_IMAGE_CEILOMETER_NOTIFICATION_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ceilometer-notification@sha256:aa1d3aaf6b394621ed4089a98e0a82b763f467e8b5c5db772f9fdf99fc86e333 - name: RELATED_IMAGE_CEILOMETER_SGCORE_IMAGE_URL_DEFAULT value: quay.io/openstack-k8s-operators/sg-core@sha256:09b5017c95d7697e66b9c64846bc48ef5826a009cba89b956ec54561e5f4a2d1 - name: RELATED_IMAGE_CINDER_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-cinder-api@sha256:37d64e0a00c54e71a4c1fcbbbf7e832f6886ffd03c9a02b6ee3ca48fabc30879 - name: RELATED_IMAGE_CINDER_BACKUP_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-cinder-backup@sha256:d6661053141b6df421288a7c9968a155ab82e478c1d75ab41f2cebe2f0ca02d2 - name: RELATED_IMAGE_CINDER_SCHEDULER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-cinder-scheduler@sha256:ce2d63258cb4e7d0d1c07234de6889c5434464190906798019311a1c7cf6387f - name: RELATED_IMAGE_CINDER_VOLUME_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-cinder-volume@sha256:0485ef9e5b4437f7cd2ba54034a87722ce4669ee86b3773c6b0c037ed8000e91 - name: RELATED_IMAGE_CLOUDKITTY_API_IMAGE_URL_DEFAULT value: quay.rdoproject.org/podified-master-centos10/openstack-cloudkitty-api@sha256:f3dcdb3eccaf5bc69f97de24225f071e251992f4595c931ed37e8a5d9ada8b21 - name: RELATED_IMAGE_CLOUDKITTY_PROC_IMAGE_URL_DEFAULT value: quay.rdoproject.org/podified-master-centos10/openstack-cloudkitty-processor@sha256:43b7d46663cd88410bb01870767f2c561e8c4bafebc1ae283c0aa59fecfaeb16 - name: RELATED_IMAGE_DESIGNATE_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-designate-api@sha256:ff0c553ceeb2e0f44b010e37dc6d0db8a251797b88e56468b7cf7f05253e4232 - name: RELATED_IMAGE_DESIGNATE_BACKENDBIND9_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-designate-backend-bind9@sha256:624f553f073af7493d34828b074adc9981cce403edd8e71482c7307008479fd9 - name: RELATED_IMAGE_DESIGNATE_CENTRAL_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-designate-central@sha256:e3874936a518c8560339db8f840fc5461885819f6050b5de8d3ab9199bea5094 - name: RELATED_IMAGE_DESIGNATE_MDNS_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-designate-mdns@sha256:1cea25f1d2a45affc80c46fb9d427749d3f06b61590ac6070a2910e3ec8a4e5d - name: RELATED_IMAGE_DESIGNATE_PRODUCER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-designate-producer@sha256:e36d5b9a65194f12f7b01c6422ba3ed52a687fd1695fbb21f4986c67d9f9317f - name: RELATED_IMAGE_DESIGNATE_UNBOUND_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-unbound@sha256:8b21bec527d54cd766e277889df6bcccd2baeaa946274606b986c0c3b7ca689f - name: RELATED_IMAGE_DESIGNATE_WORKER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-designate-worker@sha256:45aceca77f8fcf61127f0da650bdfdf11ede9b0944c78b63fab819d03283f96b - name: RELATED_IMAGE_EDPM_FRR_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-frr@sha256:709ac58998927dd61786821ae1e63343fd97ccf5763aac5edb4583eea9401d22 - name: RELATED_IMAGE_EDPM_ISCSID_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-iscsid@sha256:867d4ef7c21f75e6030a685b5762ab4d84b671316ed6b98d75200076e93342cd - name: RELATED_IMAGE_EDPM_KEPLER_IMAGE_URL_DEFAULT value: quay.io/sustainable_computing_io/kepler@sha256:581b65b646301e0fcb07582150ba63438f1353a85bf9acf1eb2acb4ce71c58bd - name: RELATED_IMAGE_EDPM_LOGROTATE_CROND_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-cron@sha256:2b90da93550b99d2fcfa95bd819f3363aa68346a416f8dc7baac3e9c5f487761 - name: RELATED_IMAGE_EDPM_MULTIPATHD_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-multipathd@sha256:6f86db36d668348be8c5b46dcda8b1fa23d34bfdc07164fbcbe7a6327fb4de24 - name: RELATED_IMAGE_EDPM_NEUTRON_DHCP_AGENT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-neutron-dhcp-agent@sha256:8cde52cef8795d1c91983b100d86541c7718160ec260fe0f97b96add4c2c8ee8 - name: RELATED_IMAGE_EDPM_NEUTRON_METADATA_AGENT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-neutron-metadata-agent-ovn@sha256:a9583cb3baf440d2358ef041373833afbeae60da8159dd031502379901141620 - name: RELATED_IMAGE_EDPM_NEUTRON_OVN_AGENT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-neutron-ovn-agent@sha256:835ebed082fe1c45bd799d1d5357595ce63efeb05ca876f26b08443facb9c164 - name: RELATED_IMAGE_EDPM_NEUTRON_SRIOV_AGENT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-neutron-sriov-agent@sha256:011d682241db724bc40736c9b54d2ea450ea7e6be095b1ff5fa28c8007466775 - name: RELATED_IMAGE_EDPM_NODE_EXPORTER_IMAGE_URL_DEFAULT value: quay.io/prometheus/node-exporter@sha256:39c642b2b337e38c18e80266fb14383754178202f40103646337722a594d984c - name: RELATED_IMAGE_EDPM_OVN_BGP_AGENT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ovn-bgp-agent@sha256:2025da90cff8f563deb08bee71efe16d4078edc2a767b2e225cca5c77f1aa2f9 - name: RELATED_IMAGE_EDPM_PODMAN_EXPORTER_IMAGE_URL_DEFAULT value: quay.io/navidys/prometheus-podman-exporter@sha256:d339ba049bbd1adccb795962bf163f5b22fd84dea865d88b9eb525e46247d6bd - name: RELATED_IMAGE_GLANCE_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-glance-api@sha256:26bd7b0bd6070856aefef6fe754c547d55c056396ea30d879d34c2d49b5a1d29 - name: RELATED_IMAGE_HEAT_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-heat-api@sha256:ff46cd5e0e13d105c4629e78c2734a50835f06b6a1e31da9e0462981d10c4be3 - name: RELATED_IMAGE_HEAT_CFNAPI_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-heat-api-cfn@sha256:5b4fd0c2b76fa5539f74687b11c5882d77bd31352452322b37ff51fa18f12a61 - name: RELATED_IMAGE_HEAT_ENGINE_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-heat-engine@sha256:5e03376bd895346dc8f627ca15ded942526ed8b5e92872f453ce272e694d18d4 - name: RELATED_IMAGE_HORIZON_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-horizon@sha256:65b94ff9fcd486845fb0544583bf2a973246a61a0ad32340fb92d632285f1057 - name: RELATED_IMAGE_INFRA_MEMCACHED_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-memcached@sha256:36a0fb31978aee0ded2483de311631e64a644d0b0685b5b055f65ede7eb8e8a2 - name: RELATED_IMAGE_INFRA_REDIS_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-redis@sha256:5f6045841aff0fde6f684a34cdf49f8dc7b2c3bcbdeab201f1058971e0c5f79e - name: RELATED_IMAGE_IRONIC_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ironic-api@sha256:448f4e1b740c30936e340bd6e8534d78c83357bf373a4223950aa64d3484f007 - name: RELATED_IMAGE_IRONIC_CONDUCTOR_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ironic-conductor@sha256:b68e3615af8a0eb0ef6bf9ceeef59540a6f4a9a85f6078a3620be115c73a7db8 - name: RELATED_IMAGE_IRONIC_INSPECTOR_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ironic-inspector@sha256:7eae01cf60383e523c9cd94d158a9162120a7370829a1dad20fdea6b0fd660bd - name: RELATED_IMAGE_IRONIC_NEUTRON_AGENT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ironic-neutron-agent@sha256:28cc10501788081eb61b5a1af35546191a92741f4f109df54c74e2b19439d0f9 - name: RELATED_IMAGE_IRONIC_PXE_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ironic-pxe@sha256:9a616e37acfd120612f78043237a8541266ba34883833c9beb43f3da313661ad - name: RELATED_IMAGE_IRONIC_PYTHON_AGENT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/ironic-python-agent@sha256:6b1be6cd94a0942259bca5d5d2c30cc7de4a33276b61f8ae3940226772106256 - name: RELATED_IMAGE_KEYSTONE_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-keystone@sha256:02d2c22d15401574941fbe057095442dee0d6f7a0a9341de35d25e6a12a3fe4b - name: RELATED_IMAGE_KSM_IMAGE_URL_DEFAULT value: registry.k8s.io/kube-state-metrics/kube-state-metrics@sha256:db384bf43222b066c378e77027a675d4cd9911107adba46c2922b3a55e10d6fb - name: RELATED_IMAGE_MANILA_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-manila-api@sha256:fc3b3a36b74fd653946723c54b208072d52200635850b531e9d595a7aaea5a01 - name: RELATED_IMAGE_MANILA_SCHEDULER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-manila-scheduler@sha256:7850ccbff320bf9a1c9c769c1c70777eb97117dd8cd5ae4435be9b4622cf807a - name: RELATED_IMAGE_MANILA_SHARE_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-manila-share@sha256:397dac7e39cf40d14a986e6ec4a60fb698ca35c197d0db315b1318514cc6d1d4 - name: RELATED_IMAGE_MARIADB_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-mariadb@sha256:10452e2144368e2f128c8fb8ef9e54880b06ef1d71d9f084a0217dcb099c51ce - name: RELATED_IMAGE_NET_UTILS_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-netutils@sha256:1c95142a36276686e720f86423ee171dc9adcc1e89879f627545b7c906ccd9bd - name: RELATED_IMAGE_NEUTRON_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-neutron-server@sha256:18f8463fe46fe6081d5682009e92bbcb3df33282b83b0a2857abaece795cf1ba - name: RELATED_IMAGE_NOVA_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-nova-api@sha256:e331a8fde6638e5ba154c4f0b38772a9a424f60656f2777245975fb1fa02f07d - name: RELATED_IMAGE_NOVA_COMPUTE_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-nova-compute@sha256:b6e1e8a249d36ef36c6ac4170af1e043dda1ccc0f9672832d3ff151bf3533076 - name: RELATED_IMAGE_NOVA_CONDUCTOR_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-nova-conductor@sha256:cd3cf7a34053e850b4d4f9f4ea4c74953a54a42fd18e47d7c01d44a88923e925 - name: RELATED_IMAGE_NOVA_NOVNC_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-nova-novncproxy@sha256:aee28476344fc0cc148fbe97daf9b1bfcedc22001550bba4bdc4e84be7b6989d - name: RELATED_IMAGE_NOVA_SCHEDULER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-nova-scheduler@sha256:cfa0b92c976603ee2a937d34013a238fcd8aa75f998e50642e33489f14124633 - name: RELATED_IMAGE_OCTAVIA_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-octavia-api@sha256:73c2f2d6eecf88acf4e45b133c8373d9bb006b530e0aff0b28f3b7420620a874 - name: RELATED_IMAGE_OCTAVIA_HEALTHMANAGER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-octavia-health-manager@sha256:927b405cc04abe5ff716186e8d35e2dc5fad1c8430194659ee6617d74e4e055d - name: RELATED_IMAGE_OCTAVIA_HOUSEKEEPING_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-octavia-housekeeping@sha256:6154d7cebd7c339afa5b86330262156171743aa5b79c2b78f9a2f378005ed8fb - name: RELATED_IMAGE_OCTAVIA_RSYSLOG_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-rsyslog@sha256:e2db2f4af8d3d0be7868c6efef0189f3a2c74a8f96ae10e3f991cdf83feaef29 - name: RELATED_IMAGE_OCTAVIA_WORKER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-octavia-worker@sha256:c773629df257726a6d3cacc24a6e4df0babcd7d37df04e6d14676a8da028b9c9 - name: RELATED_IMAGE_OPENSTACK_CLIENT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-openstackclient@sha256:776211111e2e6493706dbc49a3ba44f31d1b947919313ed3a0f35810e304ec52 - name: RELATED_IMAGE_OPENSTACK_MUST_GATHER_DEFAULT value: quay.io/openstack-k8s-operators/openstack-must-gather@sha256:ae4a20d9aad04cfaeaa3105fa8e37db4216c3b17530bc98daf1204555bc23485 - name: RELATED_IMAGE_OPENSTACK_NETWORK_EXPORTER_IMAGE_URL_DEFAULT value: quay.io/openstack-k8s-operators/openstack-network-exporter@sha256:ecd56e6733c475f2d441344fd98f288c3eac0261ba113695fec7520a954ccbc7 - name: RELATED_IMAGE_OS_CONTAINER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/edpm-hardened-uefi@sha256:7cccf24ad0a152f90ca39893064f48a1656950ee8142685a5d482c71f0bdc9f5 - name: RELATED_IMAGE_OVN_CONTROLLER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ovn-controller@sha256:af46761060c7987e1dee5f14c06d85b46f12ad8e09c83d4246ab4e3a65dfda3e - name: RELATED_IMAGE_OVN_CONTROLLER_OVS_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ovn-base@sha256:05450b48f6b5352b2686a26e933e8727748edae2ae9652d9164b7d7a1817c55a - name: RELATED_IMAGE_OVN_NB_DBCLUSTER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ovn-nb-db-server@sha256:fc9c99eeef91523482bd8f92661b393287e1f2a24ad2ba9e33191f8de9af74cf - name: RELATED_IMAGE_OVN_NORTHD_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ovn-northd@sha256:3e4ecc02b4b5e0860482a93599ba9ca598c5ce26c093c46e701f96fe51acb208 - name: RELATED_IMAGE_OVN_SB_DBCLUSTER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ovn-sb-db-server@sha256:2346037e064861c7892690d2e8b3e1eea1a26ce3c3a11fda0b41301965bc828c - name: RELATED_IMAGE_PLACEMENT_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-placement-api@sha256:7dd2e0dbb6bb5a6cecd1763e43479ca8cb6a0c502534e83c8795c0da2b50e099 - name: RELATED_IMAGE_RABBITMQ_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-rabbitmq@sha256:95d67f51dfedd5bd3ec785b488425295b2d8c41feae3e6386ef471615381809b - name: RELATED_IMAGE_SWIFT_ACCOUNT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-swift-account@sha256:c26c3ff9cabe3593ceb10006e782bf9391ac14785768ce9eec4f938c2d3cf228 - name: RELATED_IMAGE_SWIFT_CONTAINER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-swift-container@sha256:273fe8c27d08d0f62773a02f8cef6a761a7768116ee1a4be611f93bbf63f2b75 - name: RELATED_IMAGE_SWIFT_OBJECT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-swift-object@sha256:daa45220bb1c47922d0917aa8fe423bb82b03a01429f1c9e37635e701e352d71 - name: RELATED_IMAGE_SWIFT_PROXY_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-swift-proxy-server@sha256:a80a074e227d3238bb6f285788a9e886ae7a5909ccbc5c19c93c369bdfe5b3b8 - name: RELATED_IMAGE_TEST_TEMPEST_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-tempest-all@sha256:58ac66ca1be01fe0157977bd79a26cde4d0de153edfaf4162367c924826b2ef4 - name: RELATED_IMAGE_WATCHER_API_IMAGE_URL_DEFAULT value: quay.io/podified-master-centos9/openstack-watcher-api@sha256:5f22dc1a974f5b99fef0655d0e3d01389bcc632880ac921a65fec25652e74664 - name: RELATED_IMAGE_WATCHER_APPLIER_IMAGE_URL_DEFAULT value: quay.io/podified-master-centos9/openstack-watcher-applier@sha256:84958d1a17837198f9d91ac32c5d7be95d041a0228fe01d5c626c855241da8c9 - name: RELATED_IMAGE_WATCHER_DECISION_ENGINE_IMAGE_URL_DEFAULT value: quay.io/podified-master-centos9/openstack-watcher-decision-engine@sha256:8716afabd6004269722b3133937e846a87a8420941a3469852c031176aed5848 image: quay.io/openstack-k8s-operators/openstack-operator@sha256:b6007df09b7aa9dc5f4505d89abf1580a4f851b13879ccddb3cb4de62a6e90fa imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager ports: - containerPort: 9443 name: webhook-server protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 1Gi requests: cpu: 10m memory: 512Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL runAsUser: 1000660000 terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /tmp/k8s-metrics-server/metrics-certs name: metrics-certs readOnly: true - mountPath: /tmp/k8s-webhook-server/serving-certs name: webhook-certs readOnly: true - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-ktjqr readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: openstack-operator-controller-manager-dockercfg-wkh8b nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: fsGroup: 1000660000 runAsNonRoot: true seLinuxOptions: level: s0:c26,c5 seccompProfile: type: RuntimeDefault serviceAccount: openstack-operator-controller-manager serviceAccountName: openstack-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 300 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 300 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: metrics-certs secret: defaultMode: 420 items: - key: ca.crt path: ca.crt - key: tls.crt path: tls.crt - key: tls.key path: tls.key optional: false secretName: metrics-server-cert - name: webhook-certs secret: defaultMode: 420 secretName: webhook-server-cert - name: kube-api-access-ktjqr projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:09Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:51Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:17Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:17Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:51Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://a04c1ccbf0adc6314b1d4859f1991b87198c7861489852cd87ef7ccc02d2739e image: quay.io/openstack-k8s-operators/openstack-operator@sha256:b6007df09b7aa9dc5f4505d89abf1580a4f851b13879ccddb3cb4de62a6e90fa imageID: quay.io/openstack-k8s-operators/openstack-operator@sha256:b6007df09b7aa9dc5f4505d89abf1580a4f851b13879ccddb3cb4de62a6e90fa lastState: {} name: manager ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:09Z' volumeMounts: - mountPath: /tmp/k8s-metrics-server/metrics-certs name: metrics-certs readOnly: true recursiveReadOnly: Disabled - mountPath: /tmp/k8s-webhook-server/serving-certs name: webhook-certs readOnly: true recursiveReadOnly: Disabled - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-ktjqr readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.87 podIPs: - ip: 10.217.0.87 qosClass: Burstable startTime: '2025-11-26T12:23:51Z' - apiVersion: v1 kind: Pod metadata: annotations: alm-examples: |- [ { "apiVersion": "operator.openstack.org/v1beta1", "kind": "OpenStack", "metadata": { "labels": { "app.kubernetes.io/created-by": "openstack-operator", "app.kubernetes.io/instance": "openstack", "app.kubernetes.io/managed-by": "kustomize", "app.kubernetes.io/name": "openstack", "app.kubernetes.io/part-of": "openstack-operator" }, "name": "openstack", "namespace": "openstack-operators" }, "spec": { "operatorOverrides": [ { "controllerManager": { "resources": { "limits": { "cpu": "600m", "memory": "2Gi" } } }, "name": "infra", "replicas": 1 } ] } } ] capabilities: Seamless Upgrades createdAt: '2025-11-26T10:11:19Z' features.operators.openshift.io/disconnected: 'true' features.operators.openshift.io/fips-compliant: 'true' features.operators.openshift.io/proxy-aware: 'false' features.operators.openshift.io/tls-profiles: 'false' features.operators.openshift.io/token-auth-aws: 'false' features.operators.openshift.io/token-auth-azure: 'false' features.operators.openshift.io/token-auth-gcp: 'false' k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.248/23"],"mac_address":"0a:58:0a:d9:00:f8","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.248/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.248" ], "mac": "0a:58:0a:d9:00:f8", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: operator olm.operatorGroup: openstack olm.operatorNamespace: openstack-operators olm.targetNamespaces: '' openshift.io/scc: restricted-v2 operatorframework.io/initialization-resource: '{"apiVersion":"operator.openstack.org/v1beta1","kind":"OpenStack","metadata":{"name":"openstack","namespace":"openstack-operators"},"spec":{}}' operatorframework.io/properties: '{"properties":[{"type":"olm.gvk","value":{"group":"operator.openstack.org","kind":"OpenStack","version":"v1beta1"}},{"type":"olm.package","value":{"packageName":"openstack-operator","version":"0.5.0"}}]}' operatorframework.io/suggested-namespace: openstack-operators operators.openshift.io/valid-subscription: '["OpenShift Container Platform", "OpenShift Platform Plus"]' operators.operatorframework.io/builder: operator-sdk-v1.41.1 operators.operatorframework.io/project_layout: go.kubebuilder.io/v4 seccomp.security.alpha.kubernetes.io/pod: runtime/default creationTimestamp: '2025-11-26T12:53:32Z' generateName: openstack-operator-controller-operator-598cfbdbc- labels: app.kubernetes.io/name: openstack-operator-controller-operator control-plane: controller-manager openstack.org/operator-name: openstack-init pod-template-hash: 598cfbdbc managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:53:32Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:alm-examples: {} f:capabilities: {} f:createdAt: {} f:features.operators.openshift.io/disconnected: {} f:features.operators.openshift.io/fips-compliant: {} f:features.operators.openshift.io/proxy-aware: {} f:features.operators.openshift.io/tls-profiles: {} f:features.operators.openshift.io/token-auth-aws: {} f:features.operators.openshift.io/token-auth-azure: {} f:features.operators.openshift.io/token-auth-gcp: {} f:kubectl.kubernetes.io/default-container: {} f:olm.operatorGroup: {} f:olm.operatorNamespace: {} f:olm.targetNamespaces: {} f:operatorframework.io/initialization-resource: {} f:operatorframework.io/properties: {} f:operatorframework.io/suggested-namespace: {} f:operators.openshift.io/valid-subscription: {} f:operators.operatorframework.io/builder: {} f:operators.operatorframework.io/project_layout: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:control-plane: {} f:openstack.org/operator-name: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"36f08ae9-2434-465f-87a7-e50e0743bbff"}: {} f:spec: f:containers: k:{"name":"operator"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"ENABLE_WEBHOOKS"}: .: {} f:name: {} f:value: {} k:{"name":"KUBE_RBAC_PROXY"}: .: {} f:name: {} f:value: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"OPENSTACK_RELEASE_VERSION"}: .: {} f:name: {} f:value: {} k:{"name":"OPERATOR_CONDITION_NAME"}: .: {} f:name: {} f:value: {} k:{"name":"OPERATOR_IMAGE_URL"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_AGENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_ANSIBLEEE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_AODH_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_AODH_EVALUATOR_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_AODH_LISTENER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_AODH_NOTIFIER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_APACHE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_BARBICAN_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_BARBICAN_KEYSTONE_LISTENER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_BARBICAN_OPERATOR_MANAGER_IMAGE_URL"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_BARBICAN_WORKER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CEILOMETER_CENTRAL_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CEILOMETER_COMPUTE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CEILOMETER_IPMI_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CEILOMETER_MYSQLD_EXPORTER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CEILOMETER_NOTIFICATION_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CEILOMETER_SGCORE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CINDER_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CINDER_BACKUP_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CINDER_OPERATOR_MANAGER_IMAGE_URL"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CINDER_SCHEDULER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CINDER_VOLUME_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CLOUDKITTY_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_CLOUDKITTY_PROC_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_DESIGNATE_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_DESIGNATE_BACKENDBIND9_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_DESIGNATE_CENTRAL_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_DESIGNATE_MDNS_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_DESIGNATE_OPERATOR_MANAGER_IMAGE_URL"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_DESIGNATE_PRODUCER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_DESIGNATE_UNBOUND_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_DESIGNATE_WORKER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_FRR_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_ISCSID_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_KEPLER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_LOGROTATE_CROND_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_MULTIPATHD_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_NEUTRON_DHCP_AGENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_NEUTRON_METADATA_AGENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_NEUTRON_OVN_AGENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_NEUTRON_SRIOV_AGENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_NODE_EXPORTER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_OVN_BGP_AGENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_EDPM_PODMAN_EXPORTER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_GLANCE_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_GLANCE_OPERATOR_MANAGER_IMAGE_URL"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_HEAT_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_HEAT_CFNAPI_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_HEAT_ENGINE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_HEAT_OPERATOR_MANAGER_IMAGE_URL"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_HORIZON_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_HORIZON_OPERATOR_MANAGER_IMAGE_URL"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_INFRA_MEMCACHED_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_INFRA_OPERATOR_MANAGER_IMAGE_URL"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_INFRA_REDIS_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_IRONIC_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_IRONIC_CONDUCTOR_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_IRONIC_INSPECTOR_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_IRONIC_NEUTRON_AGENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_IRONIC_OPERATOR_MANAGER_IMAGE_URL"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_IRONIC_PXE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_IRONIC_PYTHON_AGENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_KEYSTONE_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_KEYSTONE_OPERATOR_MANAGER_IMAGE_URL"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_KSM_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_MANILA_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_MANILA_OPERATOR_MANAGER_IMAGE_URL"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_MANILA_SCHEDULER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_MANILA_SHARE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_MARIADB_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_MARIADB_OPERATOR_MANAGER_IMAGE_URL"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_NET_UTILS_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_NEUTRON_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_NEUTRON_OPERATOR_MANAGER_IMAGE_URL"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_NOVA_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_NOVA_COMPUTE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_NOVA_CONDUCTOR_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_NOVA_NOVNC_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_NOVA_OPERATOR_MANAGER_IMAGE_URL"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_NOVA_SCHEDULER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OCTAVIA_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OCTAVIA_HEALTHMANAGER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OCTAVIA_HOUSEKEEPING_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OCTAVIA_OPERATOR_MANAGER_IMAGE_URL"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OCTAVIA_RSYSLOG_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OCTAVIA_WORKER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OPENSTACK_BAREMETAL_OPERATOR_MANAGER_IMAGE_URL"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OPENSTACK_CLIENT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OPENSTACK_MUST_GATHER_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OPENSTACK_NETWORK_EXPORTER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OS_CONTAINER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OVN_CONTROLLER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OVN_CONTROLLER_OVS_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OVN_NB_DBCLUSTER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OVN_NORTHD_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OVN_OPERATOR_MANAGER_IMAGE_URL"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_OVN_SB_DBCLUSTER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_PLACEMENT_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_PLACEMENT_OPERATOR_MANAGER_IMAGE_URL"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_RABBITMQ_CLUSTER_OPERATOR_MANAGER_IMAGE_URL"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_RABBITMQ_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_SWIFT_ACCOUNT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_SWIFT_CONTAINER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_SWIFT_OBJECT_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_SWIFT_OPERATOR_MANAGER_IMAGE_URL"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_SWIFT_PROXY_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_TELEMETRY_OPERATOR_MANAGER_IMAGE_URL"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_TEST_OPERATOR_MANAGER_IMAGE_URL"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_TEST_TEMPEST_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_WATCHER_API_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_WATCHER_APPLIER_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_WATCHER_DECISION_ENGINE_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"RELATED_IMAGE_WATCHER_OPERATOR_MANAGER_IMAGE_URL"}: .: {} f:name: {} f:value: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} k:{"name":"TEST_ANSIBLETEST_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"TEST_HORIZONTEST_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} k:{"name":"TEST_TOBIKO_IMAGE_URL_DEFAULT"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:53:32Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:53:33Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.248"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:53:42Z' name: openstack-operator-controller-operator-598cfbdbc-hvk9z namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: openstack-operator-controller-operator-598cfbdbc uid: 36f08ae9-2434-465f-87a7-e50e0743bbff resourceVersion: '58839' uid: 8267804e-bacd-49ad-a0b2-0168e5d6be37 spec: containers: - args: - --leader-elect - --health-probe-bind-address=:8081 command: - /operator env: - name: RELATED_IMAGE_AGENT_IMAGE_URL_DEFAULT value: quay.io/openstack-k8s-operators/openstack-baremetal-operator-agent@sha256:d5f5c71b6e6992182d66adbf5430bdc67ccbbea2893d41a0b690309c38d67469 - name: RELATED_IMAGE_ANSIBLEEE_IMAGE_URL_DEFAULT value: quay.io/openstack-k8s-operators/openstack-ansibleee-runner@sha256:dac9e7b4f0cbdfc0ea387d33aa1c5406e468fc221f9c92eff2dd0071370c8747 - name: RELATED_IMAGE_AODH_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-aodh-api@sha256:c8101c77a82eae4407e41e1fd766dfc6e1b7f9ed1679e3efb6f91ff97a1557b2 - name: RELATED_IMAGE_AODH_EVALUATOR_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-aodh-evaluator@sha256:eb9743b21bbadca6f7cb9ac4fc46b5d58c51c674073c7e1121f4474a71304071 - name: RELATED_IMAGE_AODH_LISTENER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-aodh-listener@sha256:3d81f839b98c2e2a5bf0da79f2f9a92dff7d0a3c5a830b0e95c89dad8cf98a6a - name: RELATED_IMAGE_AODH_NOTIFIER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-aodh-notifier@sha256:d19ac99249b47dd8ea16cd6aaa5756346aa8a2f119ee50819c15c5366efb417d - name: RELATED_IMAGE_APACHE_IMAGE_URL_DEFAULT value: registry.redhat.io/ubi9/httpd-24@sha256:8536169e5537fe6c330eba814248abdcf39cdd8f7e7336034d74e6fda9544050 - name: RELATED_IMAGE_BARBICAN_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-barbican-api@sha256:4c93a5cccb9971e24f05daf93b3aa11ba71752bc3469a1a1a2c4906f92f69645 - name: RELATED_IMAGE_BARBICAN_KEYSTONE_LISTENER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-barbican-keystone-listener@sha256:4f1fa337760e82bfd67cdd142a97c121146dd7e621daac161940dd5e4ddb80dc - name: RELATED_IMAGE_BARBICAN_WORKER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-barbican-worker@sha256:3613b345d5baed98effd906f8b0242d863e14c97078ea473ef01fe1b0afc46f3 - name: RELATED_IMAGE_CEILOMETER_CENTRAL_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ceilometer-central@sha256:d375d370be5ead0dac71109af644849e5795f535f9ad8eeacea261d77ae6f140 - name: RELATED_IMAGE_CEILOMETER_COMPUTE_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ceilometer-compute@sha256:9f9f367ed4c85efb16c3a74a4bb707ff0db271d7bc5abc70a71e984b55f43003 - name: RELATED_IMAGE_CEILOMETER_IPMI_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ceilometer-ipmi@sha256:b73ad22b4955b06d584bce81742556d8c0c7828c495494f8ea7c99391c61b70f - name: RELATED_IMAGE_CEILOMETER_NOTIFICATION_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ceilometer-notification@sha256:aa1d3aaf6b394621ed4089a98e0a82b763f467e8b5c5db772f9fdf99fc86e333 - name: RELATED_IMAGE_CEILOMETER_MYSQLD_EXPORTER_IMAGE_URL_DEFAULT value: quay.io/prometheus/mysqld-exporter@sha256:7211a617ec657701ca819aa0ba28e1d5750f5bf2c1391b755cc4a48cc360b0fa - name: RELATED_IMAGE_CEILOMETER_SGCORE_IMAGE_URL_DEFAULT value: quay.io/openstack-k8s-operators/sg-core@sha256:09b5017c95d7697e66b9c64846bc48ef5826a009cba89b956ec54561e5f4a2d1 - name: RELATED_IMAGE_KSM_IMAGE_URL_DEFAULT value: registry.k8s.io/kube-state-metrics/kube-state-metrics@sha256:db384bf43222b066c378e77027a675d4cd9911107adba46c2922b3a55e10d6fb - name: RELATED_IMAGE_CINDER_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-cinder-api@sha256:37d64e0a00c54e71a4c1fcbbbf7e832f6886ffd03c9a02b6ee3ca48fabc30879 - name: RELATED_IMAGE_CINDER_BACKUP_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-cinder-backup@sha256:d6661053141b6df421288a7c9968a155ab82e478c1d75ab41f2cebe2f0ca02d2 - name: RELATED_IMAGE_CINDER_SCHEDULER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-cinder-scheduler@sha256:ce2d63258cb4e7d0d1c07234de6889c5434464190906798019311a1c7cf6387f - name: RELATED_IMAGE_CINDER_VOLUME_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-cinder-volume@sha256:0485ef9e5b4437f7cd2ba54034a87722ce4669ee86b3773c6b0c037ed8000e91 - name: RELATED_IMAGE_CLOUDKITTY_API_IMAGE_URL_DEFAULT value: quay.rdoproject.org/podified-master-centos10/openstack-cloudkitty-api@sha256:f3dcdb3eccaf5bc69f97de24225f071e251992f4595c931ed37e8a5d9ada8b21 - name: RELATED_IMAGE_CLOUDKITTY_PROC_IMAGE_URL_DEFAULT value: quay.rdoproject.org/podified-master-centos10/openstack-cloudkitty-processor@sha256:43b7d46663cd88410bb01870767f2c561e8c4bafebc1ae283c0aa59fecfaeb16 - name: RELATED_IMAGE_DESIGNATE_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-designate-api@sha256:ff0c553ceeb2e0f44b010e37dc6d0db8a251797b88e56468b7cf7f05253e4232 - name: RELATED_IMAGE_DESIGNATE_BACKENDBIND9_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-designate-backend-bind9@sha256:624f553f073af7493d34828b074adc9981cce403edd8e71482c7307008479fd9 - name: RELATED_IMAGE_DESIGNATE_CENTRAL_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-designate-central@sha256:e3874936a518c8560339db8f840fc5461885819f6050b5de8d3ab9199bea5094 - name: RELATED_IMAGE_DESIGNATE_MDNS_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-designate-mdns@sha256:1cea25f1d2a45affc80c46fb9d427749d3f06b61590ac6070a2910e3ec8a4e5d - name: RELATED_IMAGE_DESIGNATE_PRODUCER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-designate-producer@sha256:e36d5b9a65194f12f7b01c6422ba3ed52a687fd1695fbb21f4986c67d9f9317f - name: RELATED_IMAGE_DESIGNATE_UNBOUND_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-unbound@sha256:8b21bec527d54cd766e277889df6bcccd2baeaa946274606b986c0c3b7ca689f - name: RELATED_IMAGE_DESIGNATE_WORKER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-designate-worker@sha256:45aceca77f8fcf61127f0da650bdfdf11ede9b0944c78b63fab819d03283f96b - name: RELATED_IMAGE_EDPM_FRR_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-frr@sha256:709ac58998927dd61786821ae1e63343fd97ccf5763aac5edb4583eea9401d22 - name: RELATED_IMAGE_EDPM_ISCSID_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-iscsid@sha256:867d4ef7c21f75e6030a685b5762ab4d84b671316ed6b98d75200076e93342cd - name: RELATED_IMAGE_EDPM_LOGROTATE_CROND_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-cron@sha256:2b90da93550b99d2fcfa95bd819f3363aa68346a416f8dc7baac3e9c5f487761 - name: RELATED_IMAGE_EDPM_MULTIPATHD_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-multipathd@sha256:6f86db36d668348be8c5b46dcda8b1fa23d34bfdc07164fbcbe7a6327fb4de24 - name: RELATED_IMAGE_EDPM_NEUTRON_DHCP_AGENT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-neutron-dhcp-agent@sha256:8cde52cef8795d1c91983b100d86541c7718160ec260fe0f97b96add4c2c8ee8 - name: RELATED_IMAGE_EDPM_NEUTRON_METADATA_AGENT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-neutron-metadata-agent-ovn@sha256:a9583cb3baf440d2358ef041373833afbeae60da8159dd031502379901141620 - name: RELATED_IMAGE_EDPM_NEUTRON_OVN_AGENT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-neutron-ovn-agent@sha256:835ebed082fe1c45bd799d1d5357595ce63efeb05ca876f26b08443facb9c164 - name: RELATED_IMAGE_EDPM_NEUTRON_SRIOV_AGENT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-neutron-sriov-agent@sha256:011d682241db724bc40736c9b54d2ea450ea7e6be095b1ff5fa28c8007466775 - name: RELATED_IMAGE_EDPM_NODE_EXPORTER_IMAGE_URL_DEFAULT value: quay.io/prometheus/node-exporter@sha256:39c642b2b337e38c18e80266fb14383754178202f40103646337722a594d984c - name: RELATED_IMAGE_EDPM_KEPLER_IMAGE_URL_DEFAULT value: quay.io/sustainable_computing_io/kepler@sha256:581b65b646301e0fcb07582150ba63438f1353a85bf9acf1eb2acb4ce71c58bd - name: RELATED_IMAGE_OPENSTACK_NETWORK_EXPORTER_IMAGE_URL_DEFAULT value: quay.io/openstack-k8s-operators/openstack-network-exporter@sha256:ecd56e6733c475f2d441344fd98f288c3eac0261ba113695fec7520a954ccbc7 - name: RELATED_IMAGE_EDPM_OVN_BGP_AGENT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ovn-bgp-agent@sha256:2025da90cff8f563deb08bee71efe16d4078edc2a767b2e225cca5c77f1aa2f9 - name: RELATED_IMAGE_EDPM_PODMAN_EXPORTER_IMAGE_URL_DEFAULT value: quay.io/navidys/prometheus-podman-exporter@sha256:d339ba049bbd1adccb795962bf163f5b22fd84dea865d88b9eb525e46247d6bd - name: RELATED_IMAGE_GLANCE_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-glance-api@sha256:26bd7b0bd6070856aefef6fe754c547d55c056396ea30d879d34c2d49b5a1d29 - name: RELATED_IMAGE_HEAT_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-heat-api@sha256:ff46cd5e0e13d105c4629e78c2734a50835f06b6a1e31da9e0462981d10c4be3 - name: RELATED_IMAGE_HEAT_CFNAPI_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-heat-api-cfn@sha256:5b4fd0c2b76fa5539f74687b11c5882d77bd31352452322b37ff51fa18f12a61 - name: RELATED_IMAGE_HEAT_ENGINE_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-heat-engine@sha256:5e03376bd895346dc8f627ca15ded942526ed8b5e92872f453ce272e694d18d4 - name: RELATED_IMAGE_HORIZON_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-horizon@sha256:65b94ff9fcd486845fb0544583bf2a973246a61a0ad32340fb92d632285f1057 - name: RELATED_IMAGE_INFRA_MEMCACHED_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-memcached@sha256:36a0fb31978aee0ded2483de311631e64a644d0b0685b5b055f65ede7eb8e8a2 - name: RELATED_IMAGE_INFRA_REDIS_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-redis@sha256:5f6045841aff0fde6f684a34cdf49f8dc7b2c3bcbdeab201f1058971e0c5f79e - name: RELATED_IMAGE_IRONIC_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ironic-api@sha256:448f4e1b740c30936e340bd6e8534d78c83357bf373a4223950aa64d3484f007 - name: RELATED_IMAGE_IRONIC_CONDUCTOR_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ironic-conductor@sha256:b68e3615af8a0eb0ef6bf9ceeef59540a6f4a9a85f6078a3620be115c73a7db8 - name: RELATED_IMAGE_IRONIC_INSPECTOR_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ironic-inspector@sha256:7eae01cf60383e523c9cd94d158a9162120a7370829a1dad20fdea6b0fd660bd - name: RELATED_IMAGE_IRONIC_NEUTRON_AGENT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ironic-neutron-agent@sha256:28cc10501788081eb61b5a1af35546191a92741f4f109df54c74e2b19439d0f9 - name: RELATED_IMAGE_IRONIC_PXE_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ironic-pxe@sha256:9a616e37acfd120612f78043237a8541266ba34883833c9beb43f3da313661ad - name: RELATED_IMAGE_IRONIC_PYTHON_AGENT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/ironic-python-agent@sha256:6b1be6cd94a0942259bca5d5d2c30cc7de4a33276b61f8ae3940226772106256 - name: RELATED_IMAGE_KEYSTONE_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-keystone@sha256:02d2c22d15401574941fbe057095442dee0d6f7a0a9341de35d25e6a12a3fe4b - name: RELATED_IMAGE_MANILA_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-manila-api@sha256:fc3b3a36b74fd653946723c54b208072d52200635850b531e9d595a7aaea5a01 - name: RELATED_IMAGE_MANILA_SCHEDULER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-manila-scheduler@sha256:7850ccbff320bf9a1c9c769c1c70777eb97117dd8cd5ae4435be9b4622cf807a - name: RELATED_IMAGE_MANILA_SHARE_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-manila-share@sha256:397dac7e39cf40d14a986e6ec4a60fb698ca35c197d0db315b1318514cc6d1d4 - name: RELATED_IMAGE_MARIADB_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-mariadb@sha256:10452e2144368e2f128c8fb8ef9e54880b06ef1d71d9f084a0217dcb099c51ce - name: RELATED_IMAGE_NET_UTILS_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-netutils@sha256:1c95142a36276686e720f86423ee171dc9adcc1e89879f627545b7c906ccd9bd - name: RELATED_IMAGE_NEUTRON_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-neutron-server@sha256:18f8463fe46fe6081d5682009e92bbcb3df33282b83b0a2857abaece795cf1ba - name: RELATED_IMAGE_NOVA_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-nova-api@sha256:e331a8fde6638e5ba154c4f0b38772a9a424f60656f2777245975fb1fa02f07d - name: RELATED_IMAGE_NOVA_COMPUTE_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-nova-compute@sha256:b6e1e8a249d36ef36c6ac4170af1e043dda1ccc0f9672832d3ff151bf3533076 - name: RELATED_IMAGE_NOVA_CONDUCTOR_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-nova-conductor@sha256:cd3cf7a34053e850b4d4f9f4ea4c74953a54a42fd18e47d7c01d44a88923e925 - name: RELATED_IMAGE_NOVA_NOVNC_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-nova-novncproxy@sha256:aee28476344fc0cc148fbe97daf9b1bfcedc22001550bba4bdc4e84be7b6989d - name: RELATED_IMAGE_NOVA_SCHEDULER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-nova-scheduler@sha256:cfa0b92c976603ee2a937d34013a238fcd8aa75f998e50642e33489f14124633 - name: RELATED_IMAGE_OCTAVIA_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-octavia-api@sha256:73c2f2d6eecf88acf4e45b133c8373d9bb006b530e0aff0b28f3b7420620a874 - name: RELATED_IMAGE_OCTAVIA_HEALTHMANAGER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-octavia-health-manager@sha256:927b405cc04abe5ff716186e8d35e2dc5fad1c8430194659ee6617d74e4e055d - name: RELATED_IMAGE_OCTAVIA_HOUSEKEEPING_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-octavia-housekeeping@sha256:6154d7cebd7c339afa5b86330262156171743aa5b79c2b78f9a2f378005ed8fb - name: RELATED_IMAGE_OCTAVIA_WORKER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-octavia-worker@sha256:c773629df257726a6d3cacc24a6e4df0babcd7d37df04e6d14676a8da028b9c9 - name: RELATED_IMAGE_OCTAVIA_RSYSLOG_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-rsyslog@sha256:e2db2f4af8d3d0be7868c6efef0189f3a2c74a8f96ae10e3f991cdf83feaef29 - name: RELATED_IMAGE_OPENSTACK_CLIENT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-openstackclient@sha256:776211111e2e6493706dbc49a3ba44f31d1b947919313ed3a0f35810e304ec52 - name: RELATED_IMAGE_OS_CONTAINER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/edpm-hardened-uefi@sha256:7cccf24ad0a152f90ca39893064f48a1656950ee8142685a5d482c71f0bdc9f5 - name: RELATED_IMAGE_OVN_CONTROLLER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ovn-controller@sha256:af46761060c7987e1dee5f14c06d85b46f12ad8e09c83d4246ab4e3a65dfda3e - name: RELATED_IMAGE_OVN_CONTROLLER_OVS_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ovn-base@sha256:05450b48f6b5352b2686a26e933e8727748edae2ae9652d9164b7d7a1817c55a - name: RELATED_IMAGE_OVN_NB_DBCLUSTER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ovn-nb-db-server@sha256:fc9c99eeef91523482bd8f92661b393287e1f2a24ad2ba9e33191f8de9af74cf - name: RELATED_IMAGE_OVN_NORTHD_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ovn-northd@sha256:3e4ecc02b4b5e0860482a93599ba9ca598c5ce26c093c46e701f96fe51acb208 - name: RELATED_IMAGE_OVN_SB_DBCLUSTER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ovn-sb-db-server@sha256:2346037e064861c7892690d2e8b3e1eea1a26ce3c3a11fda0b41301965bc828c - name: RELATED_IMAGE_PLACEMENT_API_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-placement-api@sha256:7dd2e0dbb6bb5a6cecd1763e43479ca8cb6a0c502534e83c8795c0da2b50e099 - name: RELATED_IMAGE_RABBITMQ_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-rabbitmq@sha256:95d67f51dfedd5bd3ec785b488425295b2d8c41feae3e6386ef471615381809b - name: RELATED_IMAGE_SWIFT_ACCOUNT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-swift-account@sha256:c26c3ff9cabe3593ceb10006e782bf9391ac14785768ce9eec4f938c2d3cf228 - name: RELATED_IMAGE_SWIFT_CONTAINER_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-swift-container@sha256:273fe8c27d08d0f62773a02f8cef6a761a7768116ee1a4be611f93bbf63f2b75 - name: RELATED_IMAGE_SWIFT_OBJECT_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-swift-object@sha256:daa45220bb1c47922d0917aa8fe423bb82b03a01429f1c9e37635e701e352d71 - name: RELATED_IMAGE_SWIFT_PROXY_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-swift-proxy-server@sha256:a80a074e227d3238bb6f285788a9e886ae7a5909ccbc5c19c93c369bdfe5b3b8 - name: RELATED_IMAGE_TEST_TEMPEST_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-tempest-all@sha256:58ac66ca1be01fe0157977bd79a26cde4d0de153edfaf4162367c924826b2ef4 - name: RELATED_IMAGE_WATCHER_API_IMAGE_URL_DEFAULT value: quay.io/podified-master-centos9/openstack-watcher-api@sha256:5f22dc1a974f5b99fef0655d0e3d01389bcc632880ac921a65fec25652e74664 - name: RELATED_IMAGE_WATCHER_APPLIER_IMAGE_URL_DEFAULT value: quay.io/podified-master-centos9/openstack-watcher-applier@sha256:84958d1a17837198f9d91ac32c5d7be95d041a0228fe01d5c626c855241da8c9 - name: RELATED_IMAGE_WATCHER_DECISION_ENGINE_IMAGE_URL_DEFAULT value: quay.io/podified-master-centos9/openstack-watcher-decision-engine@sha256:8716afabd6004269722b3133937e846a87a8420941a3469852c031176aed5848 - name: TEST_TOBIKO_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-tobiko:current-podified - name: TEST_ANSIBLETEST_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-ansible-tests:current-podified - name: TEST_HORIZONTEST_IMAGE_URL_DEFAULT value: quay.io/podified-antelope-centos9/openstack-horizontest:current-podified - name: RELATED_IMAGE_OPENSTACK_MUST_GATHER_DEFAULT value: quay.io/openstack-k8s-operators/openstack-must-gather@sha256:ae4a20d9aad04cfaeaa3105fa8e37db4216c3b17530bc98daf1204555bc23485 - name: KUBE_RBAC_PROXY value: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 - name: RELATED_IMAGE_BARBICAN_OPERATOR_MANAGER_IMAGE_URL value: quay.io/openstack-k8s-operators/barbican-operator@sha256:3dbf9fd9dce75f1fb250ee4c4097ad77d2f34110b61d85e37abd9c472e022e6c - name: RELATED_IMAGE_CINDER_OPERATOR_MANAGER_IMAGE_URL value: quay.io/openstack-k8s-operators/cinder-operator@sha256:ca332e48d07f932e470177e48dba9332848a1d14c857cff6f9bfb1adc1998482 - name: RELATED_IMAGE_DESIGNATE_OPERATOR_MANAGER_IMAGE_URL value: quay.io/openstack-k8s-operators/designate-operator@sha256:ec4e5c911c1d0f1ea211a04b251a9d2e95b69d141c1caf07a0381693b2d6368b - name: RELATED_IMAGE_GLANCE_OPERATOR_MANAGER_IMAGE_URL value: quay.io/openstack-k8s-operators/glance-operator@sha256:45ae665ce2ea81aef212ee402cb02693ee49001a7c88c40c9598ff2859b838a2 - name: RELATED_IMAGE_HEAT_OPERATOR_MANAGER_IMAGE_URL value: quay.io/openstack-k8s-operators/heat-operator@sha256:2ee37ff474bee3203447df4f326a9279a515e770573153338296dd074722c677 - name: RELATED_IMAGE_HORIZON_OPERATOR_MANAGER_IMAGE_URL value: quay.io/openstack-k8s-operators/horizon-operator@sha256:9413ed1bc2ae1a6bd28c59b1c7f7e91e1638de7b2a7d4729ed3fa2135182465d - name: RELATED_IMAGE_INFRA_OPERATOR_MANAGER_IMAGE_URL value: quay.io/openstack-k8s-operators/infra-operator@sha256:09a6d0613ee2d3c1c809fc36c22678458ac271e0da87c970aec0a5339f5423f7 - name: RELATED_IMAGE_IRONIC_OPERATOR_MANAGER_IMAGE_URL value: quay.io/openstack-k8s-operators/ironic-operator@sha256:d65dbfc956e9cf376f3c48fc3a0942cb7306b5164f898c40d1efca106df81db7 - name: RELATED_IMAGE_KEYSTONE_OPERATOR_MANAGER_IMAGE_URL value: quay.io/openstack-k8s-operators/keystone-operator@sha256:25faa5b0e4801d4d3b01a28b877ed3188eee71f33ad66f3c2e86b7921758e711 - name: RELATED_IMAGE_MANILA_OPERATOR_MANAGER_IMAGE_URL value: quay.io/openstack-k8s-operators/manila-operator@sha256:89910bc3ecceb7590d3207ac294eb7354de358cf39ef03c72323b26c598e50e6 - name: RELATED_IMAGE_MARIADB_OPERATOR_MANAGER_IMAGE_URL value: quay.io/openstack-k8s-operators/mariadb-operator@sha256:888edf6f432e52eaa5fc3caeae616fe38a3302b006bbba0e38885b2beba9f0f2 - name: RELATED_IMAGE_NEUTRON_OPERATOR_MANAGER_IMAGE_URL value: quay.io/openstack-k8s-operators/neutron-operator@sha256:e00a9ed0ab26c5b745bd804ab1fe6b22428d026f17ea05a05f045e060342f46c - name: RELATED_IMAGE_NOVA_OPERATOR_MANAGER_IMAGE_URL value: quay.io/openstack-k8s-operators/nova-operator@sha256:c053e34316044f14929e16e4f0d97f9f1b24cb68b5e22b925ca74c66aaaed0a7 - name: RELATED_IMAGE_OCTAVIA_OPERATOR_MANAGER_IMAGE_URL value: quay.io/openstack-k8s-operators/octavia-operator@sha256:ddc8a82f05930db8ee7a8d6d189b5a66373060656e4baf71ac302f89c477da4c - name: RELATED_IMAGE_OPENSTACK_BAREMETAL_OPERATOR_MANAGER_IMAGE_URL value: quay.io/openstack-k8s-operators/openstack-baremetal-operator@sha256:51a478c52d9012c08743f63b44a3721c7ff7a0599ba9c2cf89ad54ea41b19e41 - name: RELATED_IMAGE_OVN_OPERATOR_MANAGER_IMAGE_URL value: quay.io/openstack-k8s-operators/ovn-operator@sha256:bbb543d2d67c73e5df5d6357c3251363eb34a99575c5bf10416edd45dbdae2f6 - name: RELATED_IMAGE_PLACEMENT_OPERATOR_MANAGER_IMAGE_URL value: quay.io/openstack-k8s-operators/placement-operator@sha256:225958f250a1075b69439d776a13acc45c78695c21abda23600fb53ca1640423 - name: RELATED_IMAGE_RABBITMQ_CLUSTER_OPERATOR_MANAGER_IMAGE_URL value: quay.io/openstack-k8s-operators/rabbitmq-cluster-operator@sha256:893e66303c1b0bc1d00a299a3f0380bad55c8dc813c8a1c6a4aab379f5aa12a2 - name: RELATED_IMAGE_SWIFT_OPERATOR_MANAGER_IMAGE_URL value: quay.io/openstack-k8s-operators/swift-operator@sha256:72236301580ff9080f7e311b832d7ba66666a9afeda51f969745229624ff26e4 - name: RELATED_IMAGE_TELEMETRY_OPERATOR_MANAGER_IMAGE_URL value: quay.io/openstack-k8s-operators/telemetry-operator@sha256:7d66757c0af67104f0389e851a7cc0daa44443ad202d157417bd86bbb57cc385 - name: RELATED_IMAGE_TEST_OPERATOR_MANAGER_IMAGE_URL value: 38.102.83.98:5001/openstack-k8s-operators/test-operator:68b77c48042be317ac8e0bb694f24ff66dc1b517 - name: RELATED_IMAGE_WATCHER_OPERATOR_MANAGER_IMAGE_URL value: quay.io/openstack-k8s-operators/watcher-operator@sha256:6bed55b172b9ee8ccc3952cbfc543d8bd44e2690f6db94348a754152fd78f4cf - name: OPENSTACK_RELEASE_VERSION value: 0.5.0-1764151878 - name: OPERATOR_IMAGE_URL value: quay.io/openstack-k8s-operators/openstack-operator@sha256:b6007df09b7aa9dc5f4505d89abf1580a4f851b13879ccddb3cb4de62a6e90fa - name: ENABLE_WEBHOOKS value: 'false' - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: OPERATOR_CONDITION_NAME value: openstack-operator.v0.5.0 image: quay.io/openstack-k8s-operators/openstack-operator@sha256:b6007df09b7aa9dc5f4505d89abf1580a4f851b13879ccddb3cb4de62a6e90fa imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: operator readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 256Mi requests: cpu: 10m memory: 128Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL runAsUser: 1000660000 terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-8kddc readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: openstack-operator-controller-operator-dockercfg-htnv9 nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: fsGroup: 1000660000 runAsNonRoot: true seLinuxOptions: level: s0:c26,c5 seccompProfile: type: RuntimeDefault serviceAccount: openstack-operator-controller-operator serviceAccountName: openstack-operator-controller-operator terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-api-access-8kddc projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:53:33Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:53:32Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:53:42Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:53:42Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:53:32Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://35f2ec7bb0f5e0de884b4678b9192d7b9a7e217bdf24a1c002500086fdc8f8f3 image: quay.io/openstack-k8s-operators/openstack-operator@sha256:b6007df09b7aa9dc5f4505d89abf1580a4f851b13879ccddb3cb4de62a6e90fa imageID: quay.io/openstack-k8s-operators/openstack-operator@sha256:b6007df09b7aa9dc5f4505d89abf1580a4f851b13879ccddb3cb4de62a6e90fa lastState: {} name: operator ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:53:33Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-8kddc readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.248 podIPs: - ip: 10.217.0.248 qosClass: Burstable startTime: '2025-11-26T12:53:32Z' - apiVersion: v1 kind: Pod metadata: annotations: cluster-autoscaler.kubernetes.io/safe-to-evict: 'true' k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.50/23"],"mac_address":"0a:58:0a:d9:00:32","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.50/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.50" ], "mac": "0a:58:0a:d9:00:32", "default": true, "dns": {} }] kubectl.kubernetes.io/last-applied-configuration: | {"apiVersion":"operators.coreos.com/v1alpha1","kind":"CatalogSource","metadata":{"annotations":{},"name":"openstack-operator-index","namespace":"openstack-operators"},"spec":{"image":"quay.io/openstack-k8s-operators/openstack-operator-index:latest","sourceType":"grpc"}} openshift.io/scc: anyuid creationTimestamp: '2025-11-26T12:22:58Z' generateName: openstack-operator-index- labels: olm.catalogSource: openstack-operator-index olm.managed: 'true' olm.pod-spec-hash: cTm6grrV5CUT7xT2SGpWKTGaBqbt13b1uZCc6x managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:cluster-autoscaler.kubernetes.io/safe-to-evict: {} f:kubectl.kubernetes.io/last-applied-configuration: {} f:generateName: {} f:labels: .: {} f:olm.catalogSource: {} f:olm.managed: {} f:olm.pod-spec-hash: {} f:ownerReferences: .: {} k:{"uid":"4840a2bd-06ae-4d00-8255-5f2f93b868ab"}: {} f:spec: f:containers: k:{"name":"registry-server"}: .: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:exec: .: {} f:command: {} f:failureThreshold: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":50051,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:exec: .: {} f:command: {} f:failureThreshold: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:readOnlyRootFilesystem: {} f:startupProbe: .: {} f:exec: .: {} f:command: {} f:failureThreshold: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:imagePullSecrets: .: {} k:{"name":"openstack-operator-index-dockercfg-ps48f"}: {} f:nodeSelector: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} manager: catalog operation: Update time: '2025-11-26T12:22:58Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:22:58Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:22:59Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.50"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:23:10Z' name: openstack-operator-index-x8kqp namespace: openstack-operators ownerReferences: - apiVersion: operators.coreos.com/v1alpha1 blockOwnerDeletion: false controller: true kind: CatalogSource name: openstack-operator-index uid: 4840a2bd-06ae-4d00-8255-5f2f93b868ab resourceVersion: '33488' uid: bf2e56f9-16d2-4807-9650-87625dcfacd2 spec: containers: - image: quay.io/openstack-k8s-operators/openstack-operator-index:latest imagePullPolicy: Always livenessProbe: exec: command: - grpc_health_probe - -addr=:50051 failureThreshold: 3 initialDelaySeconds: 10 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 5 name: registry-server ports: - containerPort: 50051 name: grpc protocol: TCP readinessProbe: exec: command: - grpc_health_probe - -addr=:50051 failureThreshold: 3 initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 5 resources: requests: cpu: 10m memory: 50Mi securityContext: capabilities: drop: - MKNOD readOnlyRootFilesystem: false startupProbe: exec: command: - grpc_health_probe - -addr=:50051 failureThreshold: 10 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 5 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-wgb8n readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: openstack-operator-index-dockercfg-ps48f nodeName: crc nodeSelector: kubernetes.io/os: linux preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: seLinuxOptions: level: s0:c26,c5 serviceAccount: openstack-operator-index serviceAccountName: openstack-operator-index terminationGracePeriodSeconds: 30 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 300 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 300 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-api-access-wgb8n projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:01Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:22:58Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:10Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:10Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:22:58Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://f2154c84547e264133393613008884afff441c4af038f63e7cb2dcf53bf2cc10 image: quay.io/openstack-k8s-operators/openstack-operator-index:latest imageID: quay.io/openstack-k8s-operators/openstack-operator-index@sha256:0e36a98067d2d479d8712686d1b30a9d03156c6d1471b32e3413c1c1ee9768ab lastState: {} name: registry-server ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:23:00Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-wgb8n readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.50 podIPs: - ip: 10.217.0.50 qosClass: Burstable startTime: '2025-11-26T12:22:58Z' - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.80/23"],"mac_address":"0a:58:0a:d9:00:50","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.80/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.80" ], "mac": "0a:58:0a:d9:00:50", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager openshift.io/scc: anyuid creationTimestamp: '2025-11-26T12:23:51Z' generateName: ovn-operator-controller-manager-56897c768d- labels: app.kubernetes.io/name: ovn-operator control-plane: controller-manager openstack.org/operator-name: ovn pod-template-hash: 56897c768d managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:23:51Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:kubectl.kubernetes.io/default-container: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:control-plane: {} f:openstack.org/operator-name: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"8b1830e0-45f8-48eb-ae04-78efb2ebb749"}: {} f:spec: f:containers: k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} k:{"name":"manager"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"ENABLE_WEBHOOKS"}: .: {} f:name: {} f:value: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"METRICS_CERTS"}: .: {} f:name: {} f:value: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:23:51Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:23:52Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.80"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:24:11Z' name: ovn-operator-controller-manager-56897c768d-5s84k namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: ovn-operator-controller-manager-56897c768d uid: 8b1830e0-45f8-48eb-ae04-78efb2ebb749 resourceVersion: '36161' uid: 796eea14-80b6-43fc-b682-1fdaf61253ee spec: containers: - args: - --leader-elect - --health-probe-bind-address=:8081 - --metrics-bind-address=127.0.0.1:8080 command: - /manager env: - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: ENABLE_WEBHOOKS value: 'false' - name: METRICS_CERTS value: 'false' image: quay.io/openstack-k8s-operators/ovn-operator@sha256:bbb543d2d67c73e5df5d6357c3251363eb34a99575c5bf10416edd45dbdae2f6 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 512Mi requests: cpu: 10m memory: 256Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-6mk4d readOnly: true - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080/ - --logtostderr=true - --v=0 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: limits: cpu: 500m memory: 128Mi requests: cpu: 5m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-6mk4d readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: ovn-operator-controller-manager-dockercfg-kxgjk nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seLinuxOptions: level: s0:c26,c5 serviceAccount: ovn-operator-controller-manager serviceAccountName: ovn-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-api-access-6mk4d projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:06Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:51Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:11Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:11Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:51Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://bfa05de2dca0e314faf66a985b2f18da837d5ffa59c0c30f495bb6b6ae3653c6 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imageID: quay.io/openstack-k8s-operators/kube-rbac-proxy@sha256:d28df2924a366ed857d6c2c14baac9741238032d41f3d02c12cd757189b68b8a lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:06Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-6mk4d readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://ad808b50fbc419f97fb5b0245d5409be3351fb10b394920fc6a075dee07b274e image: quay.io/openstack-k8s-operators/ovn-operator@sha256:bbb543d2d67c73e5df5d6357c3251363eb34a99575c5bf10416edd45dbdae2f6 imageID: quay.io/openstack-k8s-operators/ovn-operator@sha256:bbb543d2d67c73e5df5d6357c3251363eb34a99575c5bf10416edd45dbdae2f6 lastState: {} name: manager ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:04Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-6mk4d readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.80 podIPs: - ip: 10.217.0.80 qosClass: Burstable startTime: '2025-11-26T12:23:51Z' - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.82/23"],"mac_address":"0a:58:0a:d9:00:52","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.82/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.82" ], "mac": "0a:58:0a:d9:00:52", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager openshift.io/scc: anyuid creationTimestamp: '2025-11-26T12:23:51Z' generateName: placement-operator-controller-manager-57988cc5b5- labels: app.kubernetes.io/name: placement-operator control-plane: controller-manager openstack.org/operator-name: placement pod-template-hash: 57988cc5b5 managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:23:51Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:kubectl.kubernetes.io/default-container: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:control-plane: {} f:openstack.org/operator-name: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"ee080127-8ff6-4ae4-af9d-df2f5ea00e14"}: {} f:spec: f:containers: k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} k:{"name":"manager"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"ENABLE_WEBHOOKS"}: .: {} f:name: {} f:value: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"METRICS_CERTS"}: .: {} f:name: {} f:value: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:23:51Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:23:52Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.82"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:24:12Z' name: placement-operator-controller-manager-57988cc5b5-ppdpl namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: placement-operator-controller-manager-57988cc5b5 uid: ee080127-8ff6-4ae4-af9d-df2f5ea00e14 resourceVersion: '36260' uid: 39e5784b-2de7-45cb-9741-a0840599fb52 spec: containers: - args: - --leader-elect - --health-probe-bind-address=:8081 - --metrics-bind-address=127.0.0.1:8080 command: - /manager env: - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: ENABLE_WEBHOOKS value: 'false' - name: METRICS_CERTS value: 'false' image: quay.io/openstack-k8s-operators/placement-operator@sha256:225958f250a1075b69439d776a13acc45c78695c21abda23600fb53ca1640423 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 512Mi requests: cpu: 10m memory: 256Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-crrjj readOnly: true - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080/ - --logtostderr=true - --v=0 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: limits: cpu: 500m memory: 128Mi requests: cpu: 5m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-crrjj readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: placement-operator-controller-manager-dockercfg-nfchf nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seLinuxOptions: level: s0:c26,c5 serviceAccount: placement-operator-controller-manager serviceAccountName: placement-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-api-access-crrjj projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:04Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:51Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:12Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:12Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:51Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://de9f6015dbb9d871b4dd4f6dc34237e137a87795a3592c324828adf55840be3e image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imageID: quay.io/openstack-k8s-operators/kube-rbac-proxy@sha256:d28df2924a366ed857d6c2c14baac9741238032d41f3d02c12cd757189b68b8a lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:12Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-crrjj readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://747f6ced5f10788885db91bb827f57207c0a6059562e4499231460c776d64ccd image: quay.io/openstack-k8s-operators/placement-operator@sha256:225958f250a1075b69439d776a13acc45c78695c21abda23600fb53ca1640423 imageID: quay.io/openstack-k8s-operators/placement-operator@sha256:225958f250a1075b69439d776a13acc45c78695c21abda23600fb53ca1640423 lastState: {} name: manager ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:04Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-crrjj readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.82 podIPs: - ip: 10.217.0.82 qosClass: Burstable startTime: '2025-11-26T12:23:51Z' - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.88/23"],"mac_address":"0a:58:0a:d9:00:58","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.88/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.88" ], "mac": "0a:58:0a:d9:00:58", "default": true, "dns": {} }] openshift.io/scc: restricted-v2 seccomp.security.alpha.kubernetes.io/pod: runtime/default creationTimestamp: '2025-11-26T12:23:51Z' generateName: rabbitmq-cluster-operator-manager-668c99d594- labels: app.kubernetes.io/component: rabbitmq-operator app.kubernetes.io/name: rabbitmq-cluster-operator app.kubernetes.io/part-of: rabbitmq pod-template-hash: 668c99d594 managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:23:51Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:generateName: {} f:labels: .: {} f:app.kubernetes.io/component: {} f:app.kubernetes.io/name: {} f:app.kubernetes.io/part-of: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"7d7a6c70-3b79-48a1-9081-4d28cf551bfc"}: {} f:spec: f:containers: k:{"name":"operator"}: .: {} f:command: {} f:env: .: {} k:{"name":"ENABLE_WEBHOOKS"}: .: {} f:name: {} f:value: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"METRICS_CERTS"}: .: {} f:name: {} f:value: {} k:{"name":"OPERATOR_NAMESPACE"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":9782,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:23:51Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:23:52Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.88"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:24:12Z' name: rabbitmq-cluster-operator-manager-668c99d594-qmpxl namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: rabbitmq-cluster-operator-manager-668c99d594 uid: 7d7a6c70-3b79-48a1-9081-4d28cf551bfc resourceVersion: '36240' uid: d4c6fd9f-cee0-4f73-8a60-214b4c99e0f9 spec: containers: - command: - /manager env: - name: OPERATOR_NAMESPACE valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.namespace - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: ENABLE_WEBHOOKS value: 'false' - name: METRICS_CERTS value: 'false' image: quay.io/openstack-k8s-operators/rabbitmq-cluster-operator@sha256:893e66303c1b0bc1d00a299a3f0380bad55c8dc813c8a1c6a4aab379f5aa12a2 imagePullPolicy: IfNotPresent name: operator ports: - containerPort: 9782 name: metrics protocol: TCP resources: limits: cpu: 200m memory: 500Mi requests: cpu: 5m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL runAsNonRoot: true runAsUser: 1000660000 terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-c58cf readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: rabbitmq-cluster-operator-controller-manager-dockercfg-nzmbv nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: fsGroup: 1000660000 seLinuxOptions: level: s0:c26,c5 seccompProfile: type: RuntimeDefault serviceAccount: rabbitmq-cluster-operator-controller-manager serviceAccountName: rabbitmq-cluster-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-api-access-c58cf projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:52Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:51Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:12Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:12Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:51Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://261bf9b9d3815387166184d5c727a16f0be24fa8ed73e8b3628edcd29279f2ed image: quay.io/openstack-k8s-operators/rabbitmq-cluster-operator@sha256:893e66303c1b0bc1d00a299a3f0380bad55c8dc813c8a1c6a4aab379f5aa12a2 imageID: quay.io/openstack-k8s-operators/rabbitmq-cluster-operator@sha256:893e66303c1b0bc1d00a299a3f0380bad55c8dc813c8a1c6a4aab379f5aa12a2 lastState: {} name: operator ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:12Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-c58cf readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.88 podIPs: - ip: 10.217.0.88 qosClass: Burstable startTime: '2025-11-26T12:23:51Z' - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.83/23"],"mac_address":"0a:58:0a:d9:00:53","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.83/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.83" ], "mac": "0a:58:0a:d9:00:53", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager openshift.io/scc: restricted-v2 seccomp.security.alpha.kubernetes.io/pod: runtime/default creationTimestamp: '2025-11-26T12:23:51Z' generateName: swift-operator-controller-manager-d77b94747- labels: app.kubernetes.io/name: swift-operator control-plane: controller-manager openstack.org/operator-name: swift pod-template-hash: d77b94747 managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:23:51Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:kubectl.kubernetes.io/default-container: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:control-plane: {} f:openstack.org/operator-name: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"d28530d1-aaac-461c-9e62-dca9d49fbd60"}: {} f:spec: f:containers: k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} k:{"name":"manager"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"ENABLE_WEBHOOKS"}: .: {} f:name: {} f:value: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"METRICS_CERTS"}: .: {} f:name: {} f:value: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:23:51Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:23:52Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.83"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:24:09Z' name: swift-operator-controller-manager-d77b94747-jtv6r namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: swift-operator-controller-manager-d77b94747 uid: d28530d1-aaac-461c-9e62-dca9d49fbd60 resourceVersion: '36090' uid: c9fbb19b-a6b3-47d2-b5c8-6574fa71c069 spec: containers: - args: - --leader-elect - --health-probe-bind-address=:8081 - --metrics-bind-address=127.0.0.1:8080 command: - /manager env: - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: ENABLE_WEBHOOKS value: 'false' - name: METRICS_CERTS value: 'false' image: quay.io/openstack-k8s-operators/swift-operator@sha256:72236301580ff9080f7e311b832d7ba66666a9afeda51f969745229624ff26e4 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 512Mi requests: cpu: 10m memory: 256Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL runAsUser: 1000660000 terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-kz7jg readOnly: true - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080/ - --logtostderr=true - --v=0 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: limits: cpu: 500m memory: 128Mi requests: cpu: 5m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL runAsUser: 1000660000 terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-kz7jg readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: swift-operator-controller-manager-dockercfg-vznng nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: fsGroup: 1000660000 runAsNonRoot: true seLinuxOptions: level: s0:c26,c5 seccompProfile: type: RuntimeDefault serviceAccount: swift-operator-controller-manager serviceAccountName: swift-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-api-access-kz7jg projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:07Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:51Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:09Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:09Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:51Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://c9882e7e11908a6ab14a9a49df3dfb8a84ec2a630d2f4fad110f6dbdba48e6b4 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imageID: quay.io/openstack-k8s-operators/kube-rbac-proxy@sha256:d28df2924a366ed857d6c2c14baac9741238032d41f3d02c12cd757189b68b8a lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:07Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-kz7jg readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://4c96edf5550eb1b1f05b9f2794a1cc66c9e25d8d252d745d9658322c52dcbff8 image: quay.io/openstack-k8s-operators/swift-operator@sha256:72236301580ff9080f7e311b832d7ba66666a9afeda51f969745229624ff26e4 imageID: quay.io/openstack-k8s-operators/swift-operator@sha256:72236301580ff9080f7e311b832d7ba66666a9afeda51f969745229624ff26e4 lastState: {} name: manager ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:04Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-kz7jg readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.83 podIPs: - ip: 10.217.0.83 qosClass: Burstable startTime: '2025-11-26T12:23:51Z' - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.84/23"],"mac_address":"0a:58:0a:d9:00:54","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.84/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.84" ], "mac": "0a:58:0a:d9:00:54", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager openshift.io/scc: anyuid creationTimestamp: '2025-11-26T12:23:51Z' generateName: telemetry-operator-controller-manager-76cc84c6bb- labels: app.kubernetes.io/name: telemetry-operator control-plane: controller-manager openstack.org/operator-name: telemetry pod-template-hash: 76cc84c6bb managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:23:51Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:kubectl.kubernetes.io/default-container: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:control-plane: {} f:openstack.org/operator-name: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"bac5b2ce-a99f-4a4d-9839-6066dba037c9"}: {} f:spec: f:containers: k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} k:{"name":"manager"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"ENABLE_WEBHOOKS"}: .: {} f:name: {} f:value: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"METRICS_CERTS"}: .: {} f:name: {} f:value: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:23:51Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:23:52Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.84"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:24:21Z' name: telemetry-operator-controller-manager-76cc84c6bb-wz75v namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: telemetry-operator-controller-manager-76cc84c6bb uid: bac5b2ce-a99f-4a4d-9839-6066dba037c9 resourceVersion: '36371' uid: 6ab4e014-587f-483e-83dd-4e0327e17828 spec: containers: - args: - --leader-elect - --health-probe-bind-address=:8081 - --metrics-bind-address=127.0.0.1:8080 command: - /manager env: - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: ENABLE_WEBHOOKS value: 'false' - name: METRICS_CERTS value: 'false' image: quay.io/openstack-k8s-operators/telemetry-operator@sha256:7d66757c0af67104f0389e851a7cc0daa44443ad202d157417bd86bbb57cc385 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 512Mi requests: cpu: 10m memory: 256Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-l8s9m readOnly: true - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080/ - --logtostderr=true - --v=0 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: limits: cpu: 500m memory: 128Mi requests: cpu: 5m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-l8s9m readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: telemetry-operator-controller-manager-dockercfg-k42bn nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seLinuxOptions: level: s0:c26,c5 serviceAccount: telemetry-operator-controller-manager serviceAccountName: telemetry-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-api-access-l8s9m projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:52Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:51Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:21Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:21Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:51Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://7539e9e2072e91274dd095e208b915367e99f23cb6438a7658490793b6523e85 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imageID: quay.io/openstack-k8s-operators/kube-rbac-proxy@sha256:d28df2924a366ed857d6c2c14baac9741238032d41f3d02c12cd757189b68b8a lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:09Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-l8s9m readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://817b6e9027c977fea54dfc7f50ec518b904e3c355608a202f30d6ff501ffbed4 image: quay.io/openstack-k8s-operators/telemetry-operator@sha256:7d66757c0af67104f0389e851a7cc0daa44443ad202d157417bd86bbb57cc385 imageID: quay.io/openstack-k8s-operators/telemetry-operator@sha256:7d66757c0af67104f0389e851a7cc0daa44443ad202d157417bd86bbb57cc385 lastState: {} name: manager ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:09Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-l8s9m readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.84 podIPs: - ip: 10.217.0.84 qosClass: Burstable startTime: '2025-11-26T12:23:51Z' - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.85/23"],"mac_address":"0a:58:0a:d9:00:55","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.85/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.85" ], "mac": "0a:58:0a:d9:00:55", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager openshift.io/scc: anyuid creationTimestamp: '2025-11-26T12:23:51Z' generateName: test-operator-controller-manager-5cd6c7f4c8- labels: app.kubernetes.io/name: test-operator control-plane: controller-manager openstack.org/operator-name: test pod-template-hash: 5cd6c7f4c8 managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:23:51Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:kubectl.kubernetes.io/default-container: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:control-plane: {} f:openstack.org/operator-name: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"9eff6fc6-592e-4906-8934-c185c76136b5"}: {} f:spec: f:containers: k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} k:{"name":"manager"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"ENABLE_WEBHOOKS"}: .: {} f:name: {} f:value: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"METRICS_CERTS"}: .: {} f:name: {} f:value: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:23:51Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:23:52Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.85"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:24:21Z' name: test-operator-controller-manager-5cd6c7f4c8-7s4pw namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: test-operator-controller-manager-5cd6c7f4c8 uid: 9eff6fc6-592e-4906-8934-c185c76136b5 resourceVersion: '36382' uid: ddae14f0-dc74-43ea-937c-144dd9ecdb62 spec: containers: - args: - --leader-elect - --health-probe-bind-address=:8081 - --metrics-bind-address=127.0.0.1:8080 command: - /manager env: - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: ENABLE_WEBHOOKS value: 'false' - name: METRICS_CERTS value: 'false' image: quay.io/openstack-k8s-operators/test-operator@sha256:210517b918e30df1c95fc7d961c8e57e9a9d1cc2b9fe7eb4dad2034dd53a90aa imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 512Mi requests: cpu: 10m memory: 256Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-7h5nk readOnly: true - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080/ - --logtostderr=true - --v=0 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: limits: cpu: 500m memory: 128Mi requests: cpu: 5m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-7h5nk readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: test-operator-controller-manager-dockercfg-s65gs nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seLinuxOptions: level: s0:c26,c5 serviceAccount: test-operator-controller-manager serviceAccountName: test-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-api-access-7h5nk projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:52Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:51Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:21Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:21Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:51Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://454c9f5af50ef3fab1637ac366e6905dd130857ec3c14ca1c75029d25860f51a image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imageID: quay.io/openstack-k8s-operators/kube-rbac-proxy@sha256:d28df2924a366ed857d6c2c14baac9741238032d41f3d02c12cd757189b68b8a lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:12Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-7h5nk readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://f31436944145e44c43ed6881ca16000ed6028f4f716cc66411362df8d4228710 image: quay.io/openstack-k8s-operators/test-operator@sha256:210517b918e30df1c95fc7d961c8e57e9a9d1cc2b9fe7eb4dad2034dd53a90aa imageID: quay.io/openstack-k8s-operators/test-operator@sha256:210517b918e30df1c95fc7d961c8e57e9a9d1cc2b9fe7eb4dad2034dd53a90aa lastState: {} name: manager ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:12Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-7h5nk readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.85 podIPs: - ip: 10.217.0.85 qosClass: Burstable startTime: '2025-11-26T12:23:51Z' - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.249/23"],"mac_address":"0a:58:0a:d9:00:f9","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.249/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.249" ], "mac": "0a:58:0a:d9:00:f9", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager openshift.io/scc: anyuid creationTimestamp: '2025-11-26T12:54:18Z' generateName: test-operator-controller-manager-6f76cf5bc4- labels: app.kubernetes.io/name: test-operator control-plane: controller-manager openstack.org/operator-name: test pod-template-hash: 6f76cf5bc4 managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:54:18Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:kubectl.kubernetes.io/default-container: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:control-plane: {} f:openstack.org/operator-name: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"2b8ea6b5-85bc-4aad-b328-dbb9b2f16703"}: {} f:spec: f:containers: k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} k:{"name":"manager"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"ENABLE_WEBHOOKS"}: .: {} f:name: {} f:value: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"METRICS_CERTS"}: .: {} f:name: {} f:value: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:54:18Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:54:19Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:message: {} f:reason: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:message: {} f:reason: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.249"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:56:21Z' name: test-operator-controller-manager-6f76cf5bc4-m745d namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: test-operator-controller-manager-6f76cf5bc4 uid: 2b8ea6b5-85bc-4aad-b328-dbb9b2f16703 resourceVersion: '60207' uid: 8c0416e2-355c-4b19-b275-10d029919025 spec: containers: - args: - --leader-elect - --health-probe-bind-address=:8081 - --metrics-bind-address=127.0.0.1:8080 command: - /manager env: - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: ENABLE_WEBHOOKS value: 'false' - name: METRICS_CERTS value: 'false' image: 38.102.83.98:5001/openstack-k8s-operators/test-operator:68b77c48042be317ac8e0bb694f24ff66dc1b517 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 512Mi requests: cpu: 10m memory: 256Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-wm75x readOnly: true - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080/ - --logtostderr=true - --v=0 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: limits: cpu: 500m memory: 128Mi requests: cpu: 5m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-wm75x readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: test-operator-controller-manager-dockercfg-s65gs nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seLinuxOptions: level: s0:c26,c5 serviceAccount: test-operator-controller-manager serviceAccountName: test-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-api-access-wm75x projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:56:20Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:54:18Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:54:18Z' message: 'containers with unready status: [manager]' reason: ContainersNotReady status: 'False' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:54:18Z' message: 'containers with unready status: [manager]' reason: ContainersNotReady status: 'False' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:54:18Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://90c7e88e63f7edcf2c2231b7d4af03a1439fe27c3072d1a64ff25a9adc029ca0 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imageID: quay.io/openstack-k8s-operators/kube-rbac-proxy@sha256:d28df2924a366ed857d6c2c14baac9741238032d41f3d02c12cd757189b68b8a lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:56:19Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-wm75x readOnly: true recursiveReadOnly: Disabled - image: 38.102.83.98:5001/openstack-k8s-operators/test-operator:68b77c48042be317ac8e0bb694f24ff66dc1b517 imageID: '' lastState: {} name: manager ready: false restartCount: 0 started: false state: waiting: message: Back-off pulling image "38.102.83.98:5001/openstack-k8s-operators/test-operator:68b77c48042be317ac8e0bb694f24ff66dc1b517" reason: ImagePullBackOff volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-wm75x readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Pending podIP: 10.217.0.249 podIPs: - ip: 10.217.0.249 qosClass: Burstable startTime: '2025-11-26T12:54:18Z' - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.217.0.86/23"],"mac_address":"0a:58:0a:d9:00:56","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.86/23","gateway_ip":"10.217.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.217.0.86" ], "mac": "0a:58:0a:d9:00:56", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager openshift.io/scc: anyuid creationTimestamp: '2025-11-26T12:23:51Z' generateName: watcher-operator-controller-manager-656dcb59d4- labels: app.kubernetes.io/name: watcher-operator control-plane: controller-manager openstack.org/operator-name: watcher pod-template-hash: 656dcb59d4 managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: crc operation: Update subresource: status time: '2025-11-26T12:23:51Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:kubectl.kubernetes.io/default-container: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:control-plane: {} f:openstack.org/operator-name: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"cd4a3d98-dcef-4c5e-8314-64ce6d45b7fe"}: {} f:spec: f:containers: k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} k:{"name":"manager"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"ENABLE_WEBHOOKS"}: .: {} f:name: {} f:value: {} k:{"name":"LEASE_DURATION"}: .: {} f:name: {} f:value: {} k:{"name":"METRICS_CERTS"}: .: {} f:name: {} f:value: {} k:{"name":"RENEW_DEADLINE"}: .: {} f:name: {} f:value: {} k:{"name":"RETRY_PERIOD"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:limits: .: {} f:cpu: {} f:memory: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} manager: kube-controller-manager operation: Update time: '2025-11-26T12:23:51Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: '2025-11-26T12:23:52Z' - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.217.0.86"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: '2025-11-26T12:24:09Z' name: watcher-operator-controller-manager-656dcb59d4-dfcmd namespace: openstack-operators ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: watcher-operator-controller-manager-656dcb59d4 uid: cd4a3d98-dcef-4c5e-8314-64ce6d45b7fe resourceVersion: '36079' uid: 52aee873-a614-4018-aa3d-beb4021c29f6 spec: containers: - args: - --leader-elect - --health-probe-bind-address=:8081 - --metrics-bind-address=127.0.0.1:8080 command: - /manager env: - name: LEASE_DURATION value: '30' - name: RENEW_DEADLINE value: '20' - name: RETRY_PERIOD value: '5' - name: ENABLE_WEBHOOKS value: 'false' - name: METRICS_CERTS value: 'false' image: quay.io/openstack-k8s-operators/watcher-operator@sha256:6bed55b172b9ee8ccc3952cbfc543d8bd44e2690f6db94348a754152fd78f4cf imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 512Mi requests: cpu: 10m memory: 256Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-6ww62 readOnly: true - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080/ - --logtostderr=true - --v=0 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: limits: cpu: 500m memory: 128Mi requests: cpu: 5m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - MKNOD terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-6ww62 readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: watcher-operator-controller-manager-dockercfg-l4mz5 nodeName: crc preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seLinuxOptions: level: s0:c26,c5 serviceAccount: watcher-operator-controller-manager serviceAccountName: watcher-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-api-access-6ww62 projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:07Z' status: 'True' type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:51Z' status: 'True' type: Initialized - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:09Z' status: 'True' type: Ready - lastProbeTime: null lastTransitionTime: '2025-11-26T12:24:09Z' status: 'True' type: ContainersReady - lastProbeTime: null lastTransitionTime: '2025-11-26T12:23:51Z' status: 'True' type: PodScheduled containerStatuses: - containerID: cri-o://2005eb59a9332d212cae5e8fe3d32deaaf9ab3b6a1bb33f6af8a9664939ec375 image: quay.io/openstack-k8s-operators/kube-rbac-proxy:v0.16.0 imageID: quay.io/openstack-k8s-operators/kube-rbac-proxy@sha256:d28df2924a366ed857d6c2c14baac9741238032d41f3d02c12cd757189b68b8a lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:07Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-6ww62 readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://b59456343e9b54e44c1b9193f314e5455f9fb272d16d1d1a069cad188a4a565a image: quay.io/openstack-k8s-operators/watcher-operator@sha256:6bed55b172b9ee8ccc3952cbfc543d8bd44e2690f6db94348a754152fd78f4cf imageID: quay.io/openstack-k8s-operators/watcher-operator@sha256:6bed55b172b9ee8ccc3952cbfc543d8bd44e2690f6db94348a754152fd78f4cf lastState: {} name: manager ready: true restartCount: 0 started: true state: running: startedAt: '2025-11-26T12:24:04Z' volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-6ww62 readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.126.11 hostIPs: - ip: 192.168.126.11 phase: Running podIP: 10.217.0.86 podIPs: - ip: 10.217.0.86 qosClass: Burstable startTime: '2025-11-26T12:23:51Z' 2025-11-26 12:57:09,516 p=38345 u=zuul n=ansible | NO MORE HOSTS LEFT ************************************************************* 2025-11-26 12:57:09,518 p=38345 u=zuul n=ansible | PLAY RECAP ********************************************************************* 2025-11-26 12:57:09,518 p=38345 u=zuul n=ansible | localhost : ok=32 changed=10 unreachable=0 failed=1 skipped=6 rescued=0 ignored=0 2025-11-26 12:57:09,518 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:57:09 +0000 (0:03:36.601) 0:04:07.411 **** 2025-11-26 12:57:09,518 p=38345 u=zuul n=ansible | =============================================================================== 2025-11-26 12:57:09,518 p=38345 u=zuul n=ansible | test_operator : Wait until the test-operator-controller-manager is reloaded - 216.60s 2025-11-26 12:57:09,518 p=38345 u=zuul n=ansible | run_hook : Run hook without retry - 90 Create manila resources ---------- 6.61s 2025-11-26 12:57:09,518 p=38345 u=zuul n=ansible | os_net_setup : Create subnet pools -------------------------------------- 5.00s 2025-11-26 12:57:09,518 p=38345 u=zuul n=ansible | os_net_setup : Delete existing subnet pools ----------------------------- 4.17s 2025-11-26 12:57:09,518 p=38345 u=zuul n=ansible | os_net_setup : Create subnets ------------------------------------------- 3.48s 2025-11-26 12:57:09,518 p=38345 u=zuul n=ansible | os_net_setup : Create networks ------------------------------------------ 2.50s 2025-11-26 12:57:09,518 p=38345 u=zuul n=ansible | os_net_setup : Delete existing subnets ---------------------------------- 2.07s 2025-11-26 12:57:09,518 p=38345 u=zuul n=ansible | os_net_setup : Delete existing networks --------------------------------- 1.97s 2025-11-26 12:57:09,518 p=38345 u=zuul n=ansible | test_operator : Patch test-operator version in CSV ---------------------- 0.80s 2025-11-26 12:57:09,518 p=38345 u=zuul n=ansible | test_operator : Get openstack-operator csv information ------------------ 0.78s 2025-11-26 12:57:09,518 p=38345 u=zuul n=ansible | test_operator : Get test-operator-controller-manager pod information ---- 0.60s 2025-11-26 12:57:09,518 p=38345 u=zuul n=ansible | test_operator : Get index of test-operator image ------------------------ 0.28s 2025-11-26 12:57:09,518 p=38345 u=zuul n=ansible | run_hook : Get file stat ------------------------------------------------ 0.25s 2025-11-26 12:57:09,518 p=38345 u=zuul n=ansible | run_hook : Ensure log directory exists ---------------------------------- 0.24s 2025-11-26 12:57:09,519 p=38345 u=zuul n=ansible | run_hook : Get parameters files ----------------------------------------- 0.24s 2025-11-26 12:57:09,519 p=38345 u=zuul n=ansible | test_operator : Ensure test_operator folder exists ---------------------- 0.17s 2025-11-26 12:57:09,519 p=38345 u=zuul n=ansible | run_hook : Check if we have a file -------------------------------------- 0.17s 2025-11-26 12:57:09,519 p=38345 u=zuul n=ansible | run_hook : Ensure artifacts directory exists ---------------------------- 0.16s 2025-11-26 12:57:09,519 p=38345 u=zuul n=ansible | run_hook : Loop on hooks for pre_tests ---------------------------------- 0.15s 2025-11-26 12:57:09,519 p=38345 u=zuul n=ansible | run_hook : Assert single hooks are all mappings ------------------------- 0.10s 2025-11-26 12:57:09,519 p=38345 u=zuul n=ansible | Wednesday 26 November 2025 12:57:09 +0000 (0:03:36.602) 0:04:07.411 **** 2025-11-26 12:57:09,519 p=38345 u=zuul n=ansible | =============================================================================== 2025-11-26 12:57:09,519 p=38345 u=zuul n=ansible | test_operator --------------------------------------------------------- 219.33s 2025-11-26 12:57:09,519 p=38345 u=zuul n=ansible | os_net_setup ----------------------------------------------------------- 19.45s 2025-11-26 12:57:09,519 p=38345 u=zuul n=ansible | run_hook ---------------------------------------------------------------- 8.55s 2025-11-26 12:57:09,519 p=38345 u=zuul n=ansible | cifmw_setup ------------------------------------------------------------- 0.05s 2025-11-26 12:57:09,519 p=38345 u=zuul n=ansible | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2025-11-26 12:57:09,519 p=38345 u=zuul n=ansible | total ----------------------------------------------------------------- 247.38s