This job view page is being replaced by Spyglass soon. Check out the new job view.
ResultFAILURE
Tests 0 failed / 0 succeeded
Started2021-05-09 17:58
Elapsed37m14s
Revisionmaster

No Test Failures!


Error lines from build-log.txt

... skipping 126 lines ...
I0509 17:58:58.049518    4004 dumplogs.go:38] /logs/artifacts/13405483-b0f0-11eb-ae37-56895b5bbc78/kops toolbox dump --name e2e-394a1565f9-8b358.test-cncf-aws.k8s.io --dir /logs/artifacts --private-key /etc/aws-ssh/aws-ssh-private --ssh-user ubuntu
I0509 17:58:58.066126    4023 featureflag.go:165] FeatureFlag "SpecOverrideFlag"=true
I0509 17:58:58.066220    4023 featureflag.go:165] FeatureFlag "AlphaAllowGCE"=true
I0509 17:58:58.066224    4023 featureflag.go:165] FeatureFlag "EnableExternalCloudController"=true

Cluster.kops.k8s.io "e2e-394a1565f9-8b358.test-cncf-aws.k8s.io" not found
W0509 17:58:58.590912    4004 down.go:34] Dumping cluster logs at the start of Down() failed: exit status 1
I0509 17:58:58.590965    4004 down.go:48] /logs/artifacts/13405483-b0f0-11eb-ae37-56895b5bbc78/kops delete cluster --name e2e-394a1565f9-8b358.test-cncf-aws.k8s.io --yes
I0509 17:58:58.604655    4033 featureflag.go:165] FeatureFlag "SpecOverrideFlag"=true
I0509 17:58:58.604732    4033 featureflag.go:165] FeatureFlag "AlphaAllowGCE"=true
I0509 17:58:58.604737    4033 featureflag.go:165] FeatureFlag "EnableExternalCloudController"=true

error reading cluster configuration: Cluster.kops.k8s.io "e2e-394a1565f9-8b358.test-cncf-aws.k8s.io" not found
I0509 17:58:59.098222    4004 http.go:37] curl http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/0/access-configs/0/external-ip
2021/05/09 17:58:59 failed to get external ip from metadata service: http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/0/access-configs/0/external-ip returned 404
I0509 17:58:59.105041    4004 http.go:37] curl https://ip.jsb.workers.dev
I0509 17:58:59.213141    4004 up.go:144] /logs/artifacts/13405483-b0f0-11eb-ae37-56895b5bbc78/kops create cluster --name e2e-394a1565f9-8b358.test-cncf-aws.k8s.io --cloud aws --kubernetes-version https://storage.googleapis.com/kubernetes-release/release/v1.21.0 --ssh-public-key /etc/aws-ssh/aws-ssh-public --override cluster.spec.nodePortAccess=0.0.0.0/0 --yes --image=099720109477/ubuntu/images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20210503 --channel=alpha --networking=kubenet --container-runtime=docker --override=cluster.spec.cloudConfig.awsEBSCSIDriver.enabled=true --admin-access 34.123.107.156/32 --master-count 1 --master-volume-size 48 --node-count 4 --node-volume-size 48 --zones ap-south-1a --master-size c5.large
I0509 17:58:59.226445    4044 featureflag.go:165] FeatureFlag "SpecOverrideFlag"=true
I0509 17:58:59.226513    4044 featureflag.go:165] FeatureFlag "AlphaAllowGCE"=true
I0509 17:58:59.226516    4044 featureflag.go:165] FeatureFlag "EnableExternalCloudController"=true
I0509 17:58:59.264476    4044 create_cluster.go:730] Using SSH public key: /etc/aws-ssh/aws-ssh-public
... skipping 43 lines ...

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 17:59:23.407914    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 17:59:33.437633    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 17:59:43.471320    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 17:59:53.515475    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:00:03.544215    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:00:13.591482    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:00:23.630537    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:00:33.666034    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:00:43.700097    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:00:53.733230    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:01:03.815201    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:01:13.849794    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:01:23.895953    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:01:33.928562    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:01:43.959150    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:01:53.989532    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:02:04.035526    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:02:14.072001    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:02:24.101383    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:02:34.132776    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:02:44.167102    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:02:54.196354    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:03:04.243032    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:03:14.277205    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:03:24.312834    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:03:34.353235    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:03:44.388335    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:03:54.418525    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:04:04.449871    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:04:14.479801    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

NODE STATUS
NAME	ROLE	READY

VALIDATION ERRORS
KIND	NAME		MESSAGE
dns	apiserver	Validation Failed

The dns-controller Kubernetes deployment has not updated the Kubernetes cluster's API DNS entry to the correct IP address.  The API DNS IP address is the placeholder address that kops creates: 203.0.113.123.  Please wait about 5-10 minutes for a master to start, dns-controller to launch, and DNS to propagate.  The protokube container and dns-controller deployment logs may contain more diagnostic information.  Etcd and the API DNS entries must be updated for a kops Kubernetes cluster to start.

Validation Failed
W0509 18:04:24.524502    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

... skipping 7 lines ...
Machine	i-06b2a8cf55cd2f611				machine "i-06b2a8cf55cd2f611" has not yet joined cluster
Machine	i-0a9e1374c3bae1e94				machine "i-0a9e1374c3bae1e94" has not yet joined cluster
Machine	i-0d2fccf962ca64ce8				machine "i-0d2fccf962ca64ce8" has not yet joined cluster
Pod	kube-system/coredns-66cbffdd77-zkthw		system-cluster-critical pod "coredns-66cbffdd77-zkthw" is pending
Pod	kube-system/coredns-autoscaler-6f594f4c58-jhvmb	system-cluster-critical pod "coredns-autoscaler-6f594f4c58-jhvmb" is pending

Validation Failed
W0509 18:04:39.938710    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

... skipping 10 lines ...
Pod	kube-system/coredns-66cbffdd77-zkthw		system-cluster-critical pod "coredns-66cbffdd77-zkthw" is pending
Pod	kube-system/coredns-autoscaler-6f594f4c58-jhvmb	system-cluster-critical pod "coredns-autoscaler-6f594f4c58-jhvmb" is pending
Pod	kube-system/ebs-csi-node-d2972			system-node-critical pod "ebs-csi-node-d2972" is pending
Pod	kube-system/ebs-csi-node-m677f			system-node-critical pod "ebs-csi-node-m677f" is pending
Pod	kube-system/ebs-csi-node-xrzrd			system-node-critical pod "ebs-csi-node-xrzrd" is pending

Validation Failed
W0509 18:04:53.632464    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

... skipping 9 lines ...
KIND	NAME					MESSAGE
Pod	kube-system/coredns-66cbffdd77-njn45	system-cluster-critical pod "coredns-66cbffdd77-njn45" is pending
Pod	kube-system/ebs-csi-node-d2972		system-node-critical pod "ebs-csi-node-d2972" is pending
Pod	kube-system/ebs-csi-node-m677f		system-node-critical pod "ebs-csi-node-m677f" is pending
Pod	kube-system/ebs-csi-node-sdftg		system-node-critical pod "ebs-csi-node-sdftg" is pending

Validation Failed
W0509 18:05:07.396816    4063 validate_cluster.go:221] (will retry): cluster not yet healthy
INSTANCE GROUPS
NAME			ROLE	MACHINETYPE	MIN	MAX	SUBNETS
master-ap-south-1a	Master	c5.large	1	1	ap-south-1a
nodes-ap-south-1a	Node	t3.medium	4	4	ap-south-1a

... skipping 1090 lines ...
STEP: Creating a kubernetes client
May  9 18:07:52.258: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename configmap
W0509 18:07:53.240532    4819 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+
May  9 18:07:53.240: INFO: No PodSecurityPolicies found; assuming PodSecurityPolicy is disabled.
STEP: Waiting for a default service account to be provisioned in namespace
[It] should fail to create ConfigMap with empty key [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating configMap that has name configmap-test-emptyKey-a957d9b8-d59c-4309-973e-1f036ac59ccc
[AfterEach] [sig-node] ConfigMap
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:07:53.963: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
STEP: Destroying namespace "configmap-8534" for this suite.

•
------------------------------
{"msg":"PASSED [sig-node] ConfigMap should fail to create ConfigMap with empty key [Conformance]","total":-1,"completed":1,"skipped":0,"failed":0}

SSSSS
------------------------------
[BeforeEach] [sig-network] Ingress API
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 33 lines ...
• [SLOW TEST:8.898 seconds]
[sig-network] Ingress API
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/network/common/framework.go:23
  should support creating Ingress API operations [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-network] Ingress API should support creating Ingress API operations [Conformance]","total":-1,"completed":1,"skipped":6,"failed":0}

SSS
------------------------------
[BeforeEach] [sig-cli] Kubectl client
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 34 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/framework.go:23
  Kubectl apply
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/kubectl.go:793
    should reuse port when apply to an existing SVC
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/kubectl.go:807
------------------------------
{"msg":"PASSED [sig-cli] Kubectl client Kubectl apply should reuse port when apply to an existing SVC","total":-1,"completed":1,"skipped":68,"failed":0}

SS
------------------------------
[BeforeEach] [sig-node] Container Runtime
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 20 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/runtime.go:41
    when running a container with a new image
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/runtime.go:266
      should be able to pull image [NodeConformance]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/runtime.go:382
------------------------------
{"msg":"PASSED [sig-node] Container Runtime blackbox test when running a container with a new image should be able to pull image [NodeConformance]","total":-1,"completed":1,"skipped":2,"failed":0}

SSS
------------------------------
[BeforeEach] [Testpattern: Inline-volume (ext3)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:08:02.246: INFO: Only supported for node OS distro [gci ubuntu custom] (not debian)
... skipping 68 lines ...
May  9 18:07:53.242: INFO: No PodSecurityPolicies found; assuming PodSecurityPolicy is disabled.
STEP: Waiting for a default service account to be provisioned in namespace
[BeforeEach] [sig-node] Security Context
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/security_context.go:46
[It] should run the container with uid 0 [LinuxOnly] [NodeConformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/security_context.go:99
May  9 18:07:53.989: INFO: Waiting up to 5m0s for pod "busybox-user-0-8f47e78c-6a9b-4484-996c-2975783effc2" in namespace "security-context-test-4082" to be "Succeeded or Failed"
May  9 18:07:54.233: INFO: Pod "busybox-user-0-8f47e78c-6a9b-4484-996c-2975783effc2": Phase="Pending", Reason="", readiness=false. Elapsed: 243.266546ms
May  9 18:07:56.475: INFO: Pod "busybox-user-0-8f47e78c-6a9b-4484-996c-2975783effc2": Phase="Pending", Reason="", readiness=false. Elapsed: 2.48600363s
May  9 18:07:58.717: INFO: Pod "busybox-user-0-8f47e78c-6a9b-4484-996c-2975783effc2": Phase="Pending", Reason="", readiness=false. Elapsed: 4.727865015s
May  9 18:08:00.959: INFO: Pod "busybox-user-0-8f47e78c-6a9b-4484-996c-2975783effc2": Phase="Pending", Reason="", readiness=false. Elapsed: 6.969778387s
May  9 18:08:03.200: INFO: Pod "busybox-user-0-8f47e78c-6a9b-4484-996c-2975783effc2": Phase="Succeeded", Reason="", readiness=false. Elapsed: 9.210974625s
May  9 18:08:03.200: INFO: Pod "busybox-user-0-8f47e78c-6a9b-4484-996c-2975783effc2" satisfied condition "Succeeded or Failed"
[AfterEach] [sig-node] Security Context
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:08:03.201: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
STEP: Destroying namespace "security-context-test-4082" for this suite.


... skipping 2 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/framework.go:23
  When creating a container with runAsUser
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/security_context.go:50
    should run the container with uid 0 [LinuxOnly] [NodeConformance]
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/security_context.go:99
------------------------------
{"msg":"PASSED [sig-node] Security Context When creating a container with runAsUser should run the container with uid 0 [LinuxOnly] [NodeConformance]","total":-1,"completed":1,"skipped":0,"failed":0}
[BeforeEach] [Testpattern: Dynamic PV (block volmode)] volumeMode
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:08:03.933: INFO: Only supported for node OS distro [gci ubuntu custom] (not debian)
[AfterEach] [Testpattern: Dynamic PV (block volmode)] volumeMode
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 22 lines ...
STEP: Waiting for a default service account to be provisioned in namespace
[BeforeEach] [sig-storage] Downward API volume
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/downwardapi_volume.go:41
[It] should provide container's cpu limit [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating a pod to test downward API volume plugin
May  9 18:07:53.968: INFO: Waiting up to 5m0s for pod "downwardapi-volume-9dc42015-1bf8-4811-aa60-adbd37c8c186" in namespace "downward-api-5945" to be "Succeeded or Failed"
May  9 18:07:54.204: INFO: Pod "downwardapi-volume-9dc42015-1bf8-4811-aa60-adbd37c8c186": Phase="Pending", Reason="", readiness=false. Elapsed: 236.174049ms
May  9 18:07:56.444: INFO: Pod "downwardapi-volume-9dc42015-1bf8-4811-aa60-adbd37c8c186": Phase="Pending", Reason="", readiness=false. Elapsed: 2.476603994s
May  9 18:07:58.682: INFO: Pod "downwardapi-volume-9dc42015-1bf8-4811-aa60-adbd37c8c186": Phase="Pending", Reason="", readiness=false. Elapsed: 4.714013688s
May  9 18:08:00.919: INFO: Pod "downwardapi-volume-9dc42015-1bf8-4811-aa60-adbd37c8c186": Phase="Pending", Reason="", readiness=false. Elapsed: 6.950987882s
May  9 18:08:03.156: INFO: Pod "downwardapi-volume-9dc42015-1bf8-4811-aa60-adbd37c8c186": Phase="Succeeded", Reason="", readiness=false. Elapsed: 9.18855426s
STEP: Saw pod success
May  9 18:08:03.156: INFO: Pod "downwardapi-volume-9dc42015-1bf8-4811-aa60-adbd37c8c186" satisfied condition "Succeeded or Failed"
May  9 18:08:03.393: INFO: Trying to get logs from node ip-172-20-33-176.ap-south-1.compute.internal pod downwardapi-volume-9dc42015-1bf8-4811-aa60-adbd37c8c186 container client-container: <nil>
STEP: delete the pod
May  9 18:08:03.888: INFO: Waiting for pod downwardapi-volume-9dc42015-1bf8-4811-aa60-adbd37c8c186 to disappear
May  9 18:08:04.124: INFO: Pod downwardapi-volume-9dc42015-1bf8-4811-aa60-adbd37c8c186 no longer exists
[AfterEach] [sig-storage] Downward API volume
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 4 lines ...
• [SLOW TEST:12.583 seconds]
[sig-storage] Downward API volume
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/framework.go:23
  should provide container's cpu limit [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-storage] Downward API volume should provide container's cpu limit [NodeConformance] [Conformance]","total":-1,"completed":1,"skipped":2,"failed":0}

S
------------------------------
[BeforeEach] [Testpattern: Inline-volume (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:08:04.847: INFO: Driver local doesn't support InlineVolume -- skipping
... skipping 60 lines ...
• [SLOW TEST:12.685 seconds]
[sig-apps] Job
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apps/framework.go:23
  should run a job to completion when tasks succeed
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apps/job.go:51
------------------------------
{"msg":"PASSED [sig-apps] Job should run a job to completion when tasks succeed","total":-1,"completed":1,"skipped":2,"failed":0}
[BeforeEach] [Testpattern: Dynamic PV (default fs)] provisioning
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:08:04.948: INFO: Driver emptydir doesn't support DynamicPV -- skipping
[AfterEach] [Testpattern: Dynamic PV (default fs)] provisioning
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 22 lines ...
STEP: Waiting for a default service account to be provisioned in namespace
[BeforeEach] [sig-storage] Downward API volume
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/downwardapi_volume.go:41
[It] should provide container's memory limit [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating a pod to test downward API volume plugin
May  9 18:07:54.416: INFO: Waiting up to 5m0s for pod "downwardapi-volume-57f8550b-7127-4189-b45d-c7def1042e08" in namespace "downward-api-3952" to be "Succeeded or Failed"
May  9 18:07:54.654: INFO: Pod "downwardapi-volume-57f8550b-7127-4189-b45d-c7def1042e08": Phase="Pending", Reason="", readiness=false. Elapsed: 238.116481ms
May  9 18:07:56.893: INFO: Pod "downwardapi-volume-57f8550b-7127-4189-b45d-c7def1042e08": Phase="Pending", Reason="", readiness=false. Elapsed: 2.476958735s
May  9 18:07:59.132: INFO: Pod "downwardapi-volume-57f8550b-7127-4189-b45d-c7def1042e08": Phase="Pending", Reason="", readiness=false. Elapsed: 4.715961252s
May  9 18:08:01.371: INFO: Pod "downwardapi-volume-57f8550b-7127-4189-b45d-c7def1042e08": Phase="Pending", Reason="", readiness=false. Elapsed: 6.954506975s
May  9 18:08:03.610: INFO: Pod "downwardapi-volume-57f8550b-7127-4189-b45d-c7def1042e08": Phase="Succeeded", Reason="", readiness=false. Elapsed: 9.194035331s
STEP: Saw pod success
May  9 18:08:03.610: INFO: Pod "downwardapi-volume-57f8550b-7127-4189-b45d-c7def1042e08" satisfied condition "Succeeded or Failed"
May  9 18:08:03.848: INFO: Trying to get logs from node ip-172-20-33-8.ap-south-1.compute.internal pod downwardapi-volume-57f8550b-7127-4189-b45d-c7def1042e08 container client-container: <nil>
STEP: delete the pod
May  9 18:08:04.352: INFO: Waiting for pod downwardapi-volume-57f8550b-7127-4189-b45d-c7def1042e08 to disappear
May  9 18:08:04.590: INFO: Pod downwardapi-volume-57f8550b-7127-4189-b45d-c7def1042e08 no longer exists
[AfterEach] [sig-storage] Downward API volume
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 17 lines ...
W0509 18:07:53.249519    4735 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+
May  9 18:07:53.249: INFO: No PodSecurityPolicies found; assuming PodSecurityPolicy is disabled.
STEP: Waiting for a default service account to be provisioned in namespace
[It] should support existing directories when readOnly specified in the volumeSource
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:394
May  9 18:07:53.729: INFO: In-tree plugin kubernetes.io/host-path is not migrated, not validating any metrics
May  9 18:07:54.473: INFO: Waiting up to 5m0s for pod "hostpath-symlink-prep-provisioning-451" in namespace "provisioning-451" to be "Succeeded or Failed"
May  9 18:07:54.714: INFO: Pod "hostpath-symlink-prep-provisioning-451": Phase="Pending", Reason="", readiness=false. Elapsed: 240.227909ms
May  9 18:07:56.955: INFO: Pod "hostpath-symlink-prep-provisioning-451": Phase="Pending", Reason="", readiness=false. Elapsed: 2.481653278s
May  9 18:07:59.197: INFO: Pod "hostpath-symlink-prep-provisioning-451": Phase="Pending", Reason="", readiness=false. Elapsed: 4.723539112s
May  9 18:08:01.438: INFO: Pod "hostpath-symlink-prep-provisioning-451": Phase="Succeeded", Reason="", readiness=false. Elapsed: 6.964590066s
STEP: Saw pod success
May  9 18:08:01.438: INFO: Pod "hostpath-symlink-prep-provisioning-451" satisfied condition "Succeeded or Failed"
May  9 18:08:01.438: INFO: Deleting pod "hostpath-symlink-prep-provisioning-451" in namespace "provisioning-451"
May  9 18:08:01.683: INFO: Wait up to 5m0s for pod "hostpath-symlink-prep-provisioning-451" to be fully deleted
May  9 18:08:01.924: INFO: Creating resource for inline volume
May  9 18:08:01.924: INFO: Driver hostPathSymlink on volume type InlineVolume doesn't support readOnly source
STEP: Deleting pod
May  9 18:08:01.924: INFO: Deleting pod "pod-subpath-test-inlinevolume-trfc" in namespace "provisioning-451"
May  9 18:08:02.409: INFO: Waiting up to 5m0s for pod "hostpath-symlink-prep-provisioning-451" in namespace "provisioning-451" to be "Succeeded or Failed"
May  9 18:08:02.650: INFO: Pod "hostpath-symlink-prep-provisioning-451": Phase="Pending", Reason="", readiness=false. Elapsed: 240.657025ms
May  9 18:08:04.891: INFO: Pod "hostpath-symlink-prep-provisioning-451": Phase="Succeeded", Reason="", readiness=false. Elapsed: 2.48173153s
STEP: Saw pod success
May  9 18:08:04.891: INFO: Pod "hostpath-symlink-prep-provisioning-451" satisfied condition "Succeeded or Failed"
May  9 18:08:04.891: INFO: Deleting pod "hostpath-symlink-prep-provisioning-451" in namespace "provisioning-451"
May  9 18:08:05.137: INFO: Wait up to 5m0s for pod "hostpath-symlink-prep-provisioning-451" to be fully deleted
[AfterEach] [Testpattern: Inline-volume (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:08:05.378: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
STEP: Destroying namespace "provisioning-451" for this suite.
... skipping 30 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:08:06.132: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
STEP: Destroying namespace "kubectl-9038" for this suite.

•
------------------------------
{"msg":"PASSED [sig-cli] Kubectl client Proxy server should support --unix-socket=/path  [Conformance]","total":-1,"completed":2,"skipped":16,"failed":0}

S
------------------------------
[BeforeEach] [Testpattern: Pre-provisioned PV (ext4)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:08:06.652: INFO: Driver local doesn't support ext4 -- skipping
... skipping 25 lines ...
STEP: Waiting for a default service account to be provisioned in namespace
[BeforeEach] [sig-storage] Downward API volume
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/downwardapi_volume.go:41
[It] should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating a pod to test downward API volume plugin
May  9 18:07:54.220: INFO: Waiting up to 5m0s for pod "downwardapi-volume-3cec8a38-5848-495f-b4ed-e2b587d88717" in namespace "downward-api-1239" to be "Succeeded or Failed"
May  9 18:07:54.459: INFO: Pod "downwardapi-volume-3cec8a38-5848-495f-b4ed-e2b587d88717": Phase="Pending", Reason="", readiness=false. Elapsed: 239.33406ms
May  9 18:07:56.698: INFO: Pod "downwardapi-volume-3cec8a38-5848-495f-b4ed-e2b587d88717": Phase="Pending", Reason="", readiness=false. Elapsed: 2.47826026s
May  9 18:07:58.938: INFO: Pod "downwardapi-volume-3cec8a38-5848-495f-b4ed-e2b587d88717": Phase="Pending", Reason="", readiness=false. Elapsed: 4.71774206s
May  9 18:08:01.177: INFO: Pod "downwardapi-volume-3cec8a38-5848-495f-b4ed-e2b587d88717": Phase="Pending", Reason="", readiness=false. Elapsed: 6.956857925s
May  9 18:08:03.417: INFO: Pod "downwardapi-volume-3cec8a38-5848-495f-b4ed-e2b587d88717": Phase="Pending", Reason="", readiness=false. Elapsed: 9.196709484s
May  9 18:08:05.656: INFO: Pod "downwardapi-volume-3cec8a38-5848-495f-b4ed-e2b587d88717": Phase="Succeeded", Reason="", readiness=false. Elapsed: 11.43628786s
STEP: Saw pod success
May  9 18:08:05.656: INFO: Pod "downwardapi-volume-3cec8a38-5848-495f-b4ed-e2b587d88717" satisfied condition "Succeeded or Failed"
May  9 18:08:05.898: INFO: Trying to get logs from node ip-172-20-61-172.ap-south-1.compute.internal pod downwardapi-volume-3cec8a38-5848-495f-b4ed-e2b587d88717 container client-container: <nil>
STEP: delete the pod
May  9 18:08:06.424: INFO: Waiting for pod downwardapi-volume-3cec8a38-5848-495f-b4ed-e2b587d88717 to disappear
May  9 18:08:06.663: INFO: Pod downwardapi-volume-3cec8a38-5848-495f-b4ed-e2b587d88717 no longer exists
[AfterEach] [sig-storage] Downward API volume
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 4 lines ...
• [SLOW TEST:15.152 seconds]
[sig-storage] Downward API volume
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/framework.go:23
  should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-storage] Downward API volume should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]","total":-1,"completed":1,"skipped":8,"failed":0}

S
------------------------------
[BeforeEach] [sig-cli] Kubectl Port forwarding
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 27 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/framework.go:23
  With a server listening on localhost
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/portforward.go:474
    should support forwarding over websockets
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/portforward.go:490
------------------------------
{"msg":"PASSED [sig-cli] Kubectl Port forwarding With a server listening on localhost should support forwarding over websockets","total":-1,"completed":1,"skipped":0,"failed":0}

SS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:08:08.399: INFO: Driver local doesn't support DynamicPV -- skipping
... skipping 73 lines ...
STEP: Waiting for a default service account to be provisioned in namespace
[BeforeEach] [sig-storage] Projected downwardAPI
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/projected_downwardapi.go:41
[It] should provide podname only [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating a pod to test downward API volume plugin
May  9 18:07:53.983: INFO: Waiting up to 5m0s for pod "downwardapi-volume-6b05b83d-96d8-4754-aed6-584982c65642" in namespace "projected-7681" to be "Succeeded or Failed"
May  9 18:07:54.222: INFO: Pod "downwardapi-volume-6b05b83d-96d8-4754-aed6-584982c65642": Phase="Pending", Reason="", readiness=false. Elapsed: 238.852742ms
May  9 18:07:56.461: INFO: Pod "downwardapi-volume-6b05b83d-96d8-4754-aed6-584982c65642": Phase="Pending", Reason="", readiness=false. Elapsed: 2.477836464s
May  9 18:07:58.701: INFO: Pod "downwardapi-volume-6b05b83d-96d8-4754-aed6-584982c65642": Phase="Pending", Reason="", readiness=false. Elapsed: 4.71714861s
May  9 18:08:00.940: INFO: Pod "downwardapi-volume-6b05b83d-96d8-4754-aed6-584982c65642": Phase="Pending", Reason="", readiness=false. Elapsed: 6.956752461s
May  9 18:08:03.178: INFO: Pod "downwardapi-volume-6b05b83d-96d8-4754-aed6-584982c65642": Phase="Pending", Reason="", readiness=false. Elapsed: 9.194626416s
May  9 18:08:05.416: INFO: Pod "downwardapi-volume-6b05b83d-96d8-4754-aed6-584982c65642": Phase="Pending", Reason="", readiness=false. Elapsed: 11.432836471s
May  9 18:08:07.655: INFO: Pod "downwardapi-volume-6b05b83d-96d8-4754-aed6-584982c65642": Phase="Succeeded", Reason="", readiness=false. Elapsed: 13.671564704s
STEP: Saw pod success
May  9 18:08:07.655: INFO: Pod "downwardapi-volume-6b05b83d-96d8-4754-aed6-584982c65642" satisfied condition "Succeeded or Failed"
May  9 18:08:07.893: INFO: Trying to get logs from node ip-172-20-61-172.ap-south-1.compute.internal pod downwardapi-volume-6b05b83d-96d8-4754-aed6-584982c65642 container client-container: <nil>
STEP: delete the pod
May  9 18:08:08.376: INFO: Waiting for pod downwardapi-volume-6b05b83d-96d8-4754-aed6-584982c65642 to disappear
May  9 18:08:08.613: INFO: Pod downwardapi-volume-6b05b83d-96d8-4754-aed6-584982c65642 no longer exists
[AfterEach] [sig-storage] Projected downwardAPI
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 35 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/runtime.go:41
    on terminated container
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/runtime.go:134
      should report termination message [LinuxOnly] if TerminationMessagePath is set [NodeConformance]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/runtime.go:171
------------------------------
{"msg":"PASSED [sig-node] Container Runtime blackbox test on terminated container should report termination message [LinuxOnly] if TerminationMessagePath is set [NodeConformance]","total":-1,"completed":2,"skipped":70,"failed":0}

SSS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:08:10.002: INFO: Only supported for node OS distro [gci ubuntu custom] (not debian)
... skipping 85 lines ...
• [SLOW TEST:19.397 seconds]
[sig-storage] EmptyDir wrapper volumes
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/framework.go:23
  should not conflict [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-api-machinery] CustomResourceConversionWebhook [Privileged:ClusterAdmin] should be able to convert from CR v1 to CR v2 [Conformance]","total":-1,"completed":1,"skipped":2,"failed":0}
[BeforeEach] [Testpattern: Dynamic PV (default fs)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:08:11.905: INFO: Only supported for providers [gce gke] (not aws)
[AfterEach] [Testpattern: Dynamic PV (default fs)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 9 lines ...
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volumes.go:159

      Only supported for providers [gce gke] (not aws)

      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/drivers/in_tree.go:1301
------------------------------
{"msg":"PASSED [sig-storage] EmptyDir wrapper volumes should not conflict [Conformance]","total":-1,"completed":1,"skipped":10,"failed":0}
[BeforeEach] [Testpattern: Inline-volume (ext4)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:08:12.057: INFO: Only supported for node OS distro [gci ubuntu custom] (not debian)
[AfterEach] [Testpattern: Inline-volume (ext4)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 132 lines ...
STEP: Building a namespace api object, basename projected
STEP: Waiting for a default service account to be provisioned in namespace
[It] should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating projection with secret that has name projected-secret-test-map-1af98848-bf5f-4272-b7ed-767cbd44127c
STEP: Creating a pod to test consume secrets
May  9 18:08:06.704: INFO: Waiting up to 5m0s for pod "pod-projected-secrets-f86ec642-8250-43f0-9b2e-61c8d7464f30" in namespace "projected-6810" to be "Succeeded or Failed"
May  9 18:08:06.962: INFO: Pod "pod-projected-secrets-f86ec642-8250-43f0-9b2e-61c8d7464f30": Phase="Pending", Reason="", readiness=false. Elapsed: 258.461195ms
May  9 18:08:09.203: INFO: Pod "pod-projected-secrets-f86ec642-8250-43f0-9b2e-61c8d7464f30": Phase="Pending", Reason="", readiness=false. Elapsed: 2.499295938s
May  9 18:08:11.452: INFO: Pod "pod-projected-secrets-f86ec642-8250-43f0-9b2e-61c8d7464f30": Phase="Succeeded", Reason="", readiness=false. Elapsed: 4.748222853s
STEP: Saw pod success
May  9 18:08:11.452: INFO: Pod "pod-projected-secrets-f86ec642-8250-43f0-9b2e-61c8d7464f30" satisfied condition "Succeeded or Failed"
May  9 18:08:11.693: INFO: Trying to get logs from node ip-172-20-33-176.ap-south-1.compute.internal pod pod-projected-secrets-f86ec642-8250-43f0-9b2e-61c8d7464f30 container projected-secret-volume-test: <nil>
STEP: delete the pod
May  9 18:08:12.184: INFO: Waiting for pod pod-projected-secrets-f86ec642-8250-43f0-9b2e-61c8d7464f30 to disappear
May  9 18:08:12.424: INFO: Pod pod-projected-secrets-f86ec642-8250-43f0-9b2e-61c8d7464f30 no longer exists
[AfterEach] [sig-storage] Projected secret
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 4 lines ...
• [SLOW TEST:7.954 seconds]
[sig-storage] Projected secret
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/framework.go:23
  should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-storage] Projected secret should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]","total":-1,"completed":2,"skipped":3,"failed":0}

S
------------------------------
[BeforeEach] [sig-apps] ReplicationController
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 27 lines ...
• [SLOW TEST:21.173 seconds]
[sig-apps] ReplicationController
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apps/framework.go:23
  should adopt matching pods on creation [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-apps] ReplicationController should adopt matching pods on creation [Conformance]","total":-1,"completed":1,"skipped":16,"failed":0}

SSSS
------------------------------
[BeforeEach] [Testpattern: Inline-volume (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
[BeforeEach] [Testpattern: Inline-volume (default fs)] subPath
... skipping 7 lines ...
[It] should support non-existent path
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:194
May  9 18:07:54.925: INFO: In-tree plugin kubernetes.io/host-path is not migrated, not validating any metrics
May  9 18:07:55.403: INFO: Creating resource for inline volume
STEP: Creating pod pod-subpath-test-inlinevolume-dm6t
STEP: Creating a pod to test subpath
May  9 18:07:55.647: INFO: Waiting up to 5m0s for pod "pod-subpath-test-inlinevolume-dm6t" in namespace "provisioning-6821" to be "Succeeded or Failed"
May  9 18:07:55.890: INFO: Pod "pod-subpath-test-inlinevolume-dm6t": Phase="Pending", Reason="", readiness=false. Elapsed: 242.011439ms
May  9 18:07:58.129: INFO: Pod "pod-subpath-test-inlinevolume-dm6t": Phase="Pending", Reason="", readiness=false. Elapsed: 2.481933976s
May  9 18:08:00.371: INFO: Pod "pod-subpath-test-inlinevolume-dm6t": Phase="Pending", Reason="", readiness=false. Elapsed: 4.723138409s
May  9 18:08:02.612: INFO: Pod "pod-subpath-test-inlinevolume-dm6t": Phase="Pending", Reason="", readiness=false. Elapsed: 6.96440437s
May  9 18:08:04.855: INFO: Pod "pod-subpath-test-inlinevolume-dm6t": Phase="Pending", Reason="", readiness=false. Elapsed: 9.207571331s
May  9 18:08:07.096: INFO: Pod "pod-subpath-test-inlinevolume-dm6t": Phase="Pending", Reason="", readiness=false. Elapsed: 11.448667519s
May  9 18:08:09.338: INFO: Pod "pod-subpath-test-inlinevolume-dm6t": Phase="Pending", Reason="", readiness=false. Elapsed: 13.690732424s
May  9 18:08:11.580: INFO: Pod "pod-subpath-test-inlinevolume-dm6t": Phase="Pending", Reason="", readiness=false. Elapsed: 15.931991427s
May  9 18:08:13.819: INFO: Pod "pod-subpath-test-inlinevolume-dm6t": Phase="Succeeded", Reason="", readiness=false. Elapsed: 18.171483909s
STEP: Saw pod success
May  9 18:08:13.819: INFO: Pod "pod-subpath-test-inlinevolume-dm6t" satisfied condition "Succeeded or Failed"
May  9 18:08:14.059: INFO: Trying to get logs from node ip-172-20-33-8.ap-south-1.compute.internal pod pod-subpath-test-inlinevolume-dm6t container test-container-volume-inlinevolume-dm6t: <nil>
STEP: delete the pod
May  9 18:08:14.549: INFO: Waiting for pod pod-subpath-test-inlinevolume-dm6t to disappear
May  9 18:08:14.789: INFO: Pod pod-subpath-test-inlinevolume-dm6t no longer exists
STEP: Deleting pod pod-subpath-test-inlinevolume-dm6t
May  9 18:08:14.789: INFO: Deleting pod "pod-subpath-test-inlinevolume-dm6t" in namespace "provisioning-6821"
... skipping 12 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Inline-volume (default fs)] subPath
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should support non-existent path
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:194
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path","total":-1,"completed":1,"skipped":10,"failed":0}

SSS
------------------------------
[BeforeEach] [sig-node] Security Context
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:08:12.126: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename security-context
STEP: Waiting for a default service account to be provisioned in namespace
[It] should support pod.Spec.SecurityContext.SupplementalGroups [LinuxOnly]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/node/security_context.go:69
STEP: Creating a pod to test pod.Spec.SecurityContext.SupplementalGroups
May  9 18:08:13.577: INFO: Waiting up to 5m0s for pod "security-context-186f0245-9d5b-4c70-81c5-e45784ee9fb4" in namespace "security-context-4214" to be "Succeeded or Failed"
May  9 18:08:13.818: INFO: Pod "security-context-186f0245-9d5b-4c70-81c5-e45784ee9fb4": Phase="Pending", Reason="", readiness=false. Elapsed: 240.849854ms
May  9 18:08:16.059: INFO: Pod "security-context-186f0245-9d5b-4c70-81c5-e45784ee9fb4": Phase="Succeeded", Reason="", readiness=false. Elapsed: 2.482429238s
STEP: Saw pod success
May  9 18:08:16.059: INFO: Pod "security-context-186f0245-9d5b-4c70-81c5-e45784ee9fb4" satisfied condition "Succeeded or Failed"
May  9 18:08:16.301: INFO: Trying to get logs from node ip-172-20-33-8.ap-south-1.compute.internal pod security-context-186f0245-9d5b-4c70-81c5-e45784ee9fb4 container test-container: <nil>
STEP: delete the pod
May  9 18:08:16.793: INFO: Waiting for pod security-context-186f0245-9d5b-4c70-81c5-e45784ee9fb4 to disappear
May  9 18:08:17.034: INFO: Pod security-context-186f0245-9d5b-4c70-81c5-e45784ee9fb4 no longer exists
[AfterEach] [sig-node] Security Context
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 4 lines ...
• [SLOW TEST:5.394 seconds]
[sig-node] Security Context
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/node/framework.go:23
  should support pod.Spec.SecurityContext.SupplementalGroups [LinuxOnly]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/node/security_context.go:69
------------------------------
{"msg":"PASSED [sig-node] Security Context should support pod.Spec.SecurityContext.SupplementalGroups [LinuxOnly]","total":-1,"completed":2,"skipped":8,"failed":0}

SSSS
------------------------------
[BeforeEach] [Testpattern: Inline-volume (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:08:17.543: INFO: Driver local doesn't support InlineVolume -- skipping
... skipping 82 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/persistent_volumes-local.go:192
    One pod requesting one prebound PVC
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/persistent_volumes-local.go:209
      should be able to mount volume and write from pod1
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/persistent_volumes-local.go:238
------------------------------
{"msg":"PASSED [sig-storage] PersistentVolumes-local  [Volume type: dir-link-bindmounted] One pod requesting one prebound PVC should be able to mount volume and write from pod1","total":-1,"completed":1,"skipped":0,"failed":0}

SS
------------------------------
{"msg":"PASSED [sig-storage] Downward API volume should provide container's memory limit [NodeConformance] [Conformance]","total":-1,"completed":1,"skipped":3,"failed":0}
[BeforeEach] [sig-network] Services
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:08:05.312: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename services
STEP: Waiting for a default service account to be provisioned in namespace
... skipping 25 lines ...
• [SLOW TEST:14.889 seconds]
[sig-network] Services
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/network/common/framework.go:23
  should be able to change the type from ExternalName to ClusterIP [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-network] Services should be able to change the type from ExternalName to ClusterIP [Conformance]","total":-1,"completed":2,"skipped":3,"failed":0}

SSSSSSSSSSSS
------------------------------
[BeforeEach] [sig-cli] Kubectl Port forwarding
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 37 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/portforward.go:452
    that expects a client request
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/portforward.go:453
      should support a client that connects, sends DATA, and disconnects
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/portforward.go:457
------------------------------
{"msg":"PASSED [sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 that expects a client request should support a client that connects, sends DATA, and disconnects","total":-1,"completed":2,"skipped":9,"failed":0}

SSS
------------------------------
[BeforeEach] [sig-node] Variable Expansion
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:08:15.782: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename var-expansion
STEP: Waiting for a default service account to be provisioned in namespace
[It] should allow substituting values in a container's command [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating a pod to test substitution in container's command
May  9 18:08:17.223: INFO: Waiting up to 5m0s for pod "var-expansion-edffdf1c-d71d-4c64-b59c-fe0733d7d220" in namespace "var-expansion-603" to be "Succeeded or Failed"
May  9 18:08:17.463: INFO: Pod "var-expansion-edffdf1c-d71d-4c64-b59c-fe0733d7d220": Phase="Pending", Reason="", readiness=false. Elapsed: 239.924523ms
May  9 18:08:19.724: INFO: Pod "var-expansion-edffdf1c-d71d-4c64-b59c-fe0733d7d220": Phase="Succeeded", Reason="", readiness=false. Elapsed: 2.500892993s
STEP: Saw pod success
May  9 18:08:19.724: INFO: Pod "var-expansion-edffdf1c-d71d-4c64-b59c-fe0733d7d220" satisfied condition "Succeeded or Failed"
May  9 18:08:19.963: INFO: Trying to get logs from node ip-172-20-33-8.ap-south-1.compute.internal pod var-expansion-edffdf1c-d71d-4c64-b59c-fe0733d7d220 container dapi-container: <nil>
STEP: delete the pod
May  9 18:08:20.455: INFO: Waiting for pod var-expansion-edffdf1c-d71d-4c64-b59c-fe0733d7d220 to disappear
May  9 18:08:20.695: INFO: Pod var-expansion-edffdf1c-d71d-4c64-b59c-fe0733d7d220 no longer exists
[AfterEach] [sig-node] Variable Expansion
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 29 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:08:21.309: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
STEP: Destroying namespace "nettest-8729" for this suite.

•
------------------------------
{"msg":"PASSED [sig-network] Networking should provide unchanging, static URL paths for kubernetes api services","total":-1,"completed":3,"skipped":14,"failed":0}

SSSS
------------------------------
[BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:08:21.820: INFO: Only supported for providers [gce gke] (not aws)
... skipping 27 lines ...
W0509 18:07:53.243617    4661 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+
May  9 18:07:53.243: INFO: No PodSecurityPolicies found; assuming PodSecurityPolicy is disabled.
STEP: Waiting for a default service account to be provisioned in namespace
[It] should be able to unmount after the subpath directory is deleted [LinuxOnly]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:444
May  9 18:07:53.723: INFO: In-tree plugin kubernetes.io/host-path is not migrated, not validating any metrics
May  9 18:07:54.466: INFO: Waiting up to 5m0s for pod "hostpath-symlink-prep-provisioning-7133" in namespace "provisioning-7133" to be "Succeeded or Failed"
May  9 18:07:54.706: INFO: Pod "hostpath-symlink-prep-provisioning-7133": Phase="Pending", Reason="", readiness=false. Elapsed: 240.900181ms
May  9 18:07:56.949: INFO: Pod "hostpath-symlink-prep-provisioning-7133": Phase="Pending", Reason="", readiness=false. Elapsed: 2.483425306s
May  9 18:07:59.191: INFO: Pod "hostpath-symlink-prep-provisioning-7133": Phase="Pending", Reason="", readiness=false. Elapsed: 4.725408846s
May  9 18:08:01.434: INFO: Pod "hostpath-symlink-prep-provisioning-7133": Phase="Pending", Reason="", readiness=false. Elapsed: 6.9679493s
May  9 18:08:03.675: INFO: Pod "hostpath-symlink-prep-provisioning-7133": Phase="Succeeded", Reason="", readiness=false. Elapsed: 9.20958105s
STEP: Saw pod success
May  9 18:08:03.675: INFO: Pod "hostpath-symlink-prep-provisioning-7133" satisfied condition "Succeeded or Failed"
May  9 18:08:03.675: INFO: Deleting pod "hostpath-symlink-prep-provisioning-7133" in namespace "provisioning-7133"
May  9 18:08:03.921: INFO: Wait up to 5m0s for pod "hostpath-symlink-prep-provisioning-7133" to be fully deleted
May  9 18:08:04.162: INFO: Creating resource for inline volume
STEP: Creating pod pod-subpath-test-inlinevolume-vhps
May  9 18:08:10.909: INFO: Running '/tmp/kubectl3539518766/kubectl --server=https://api.e2e-394a1565f9-8b358.test-cncf-aws.k8s.io --kubeconfig=/root/.kube/config --namespace=provisioning-7133 exec pod-subpath-test-inlinevolume-vhps --container test-container-volume-inlinevolume-vhps -- /bin/sh -c rm -r /test-volume/provisioning-7133'
May  9 18:08:13.302: INFO: stderr: ""
May  9 18:08:13.302: INFO: stdout: ""
STEP: Deleting pod pod-subpath-test-inlinevolume-vhps
May  9 18:08:13.302: INFO: Deleting pod "pod-subpath-test-inlinevolume-vhps" in namespace "provisioning-7133"
May  9 18:08:13.554: INFO: Wait up to 5m0s for pod "pod-subpath-test-inlinevolume-vhps" to be fully deleted
STEP: Deleting pod
May  9 18:08:18.056: INFO: Deleting pod "pod-subpath-test-inlinevolume-vhps" in namespace "provisioning-7133"
May  9 18:08:18.542: INFO: Waiting up to 5m0s for pod "hostpath-symlink-prep-provisioning-7133" in namespace "provisioning-7133" to be "Succeeded or Failed"
May  9 18:08:18.783: INFO: Pod "hostpath-symlink-prep-provisioning-7133": Phase="Pending", Reason="", readiness=false. Elapsed: 241.045037ms
May  9 18:08:21.031: INFO: Pod "hostpath-symlink-prep-provisioning-7133": Phase="Succeeded", Reason="", readiness=false. Elapsed: 2.489052831s
STEP: Saw pod success
May  9 18:08:21.031: INFO: Pod "hostpath-symlink-prep-provisioning-7133" satisfied condition "Succeeded or Failed"
May  9 18:08:21.031: INFO: Deleting pod "hostpath-symlink-prep-provisioning-7133" in namespace "provisioning-7133"
May  9 18:08:21.278: INFO: Wait up to 5m0s for pod "hostpath-symlink-prep-provisioning-7133" to be fully deleted
[AfterEach] [Testpattern: Inline-volume (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:08:21.519: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
STEP: Destroying namespace "provisioning-7133" for this suite.
... skipping 6 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Inline-volume (default fs)] subPath
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should be able to unmount after the subpath directory is deleted [LinuxOnly]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:444
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]","total":-1,"completed":1,"skipped":1,"failed":0}

SS
------------------------------
[BeforeEach] [Testpattern: Inline-volume (ext4)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:08:22.019: INFO: Driver hostPathSymlink doesn't support ext4 -- skipping
... skipping 37 lines ...
      Driver supports dynamic provisioning, skipping InlineVolume pattern

      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/base.go:233
------------------------------
S
------------------------------
{"msg":"PASSED [sig-storage] Projected downwardAPI should provide podname only [NodeConformance] [Conformance]","total":-1,"completed":1,"skipped":0,"failed":0}
[BeforeEach] [sig-node] Pods
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:08:09.349: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename pods
STEP: Waiting for a default service account to be provisioned in namespace
... skipping 10 lines ...
May  9 18:08:19.373: INFO: The status of Pod pod-update-activedeadlineseconds-7d6fe899-dc55-473c-93c4-43ce09208376 is Running (Ready = true)
STEP: verifying the pod is in kubernetes
STEP: updating the pod
May  9 18:08:20.830: INFO: Successfully updated pod "pod-update-activedeadlineseconds-7d6fe899-dc55-473c-93c4-43ce09208376"
May  9 18:08:20.830: INFO: Waiting up to 5m0s for pod "pod-update-activedeadlineseconds-7d6fe899-dc55-473c-93c4-43ce09208376" in namespace "pods-226" to be "terminated due to deadline exceeded"
May  9 18:08:21.068: INFO: Pod "pod-update-activedeadlineseconds-7d6fe899-dc55-473c-93c4-43ce09208376": Phase="Running", Reason="", readiness=true. Elapsed: 237.803354ms
May  9 18:08:23.307: INFO: Pod "pod-update-activedeadlineseconds-7d6fe899-dc55-473c-93c4-43ce09208376": Phase="Failed", Reason="DeadlineExceeded", readiness=false. Elapsed: 2.477217804s
May  9 18:08:23.307: INFO: Pod "pod-update-activedeadlineseconds-7d6fe899-dc55-473c-93c4-43ce09208376" satisfied condition "terminated due to deadline exceeded"
[AfterEach] [sig-node] Pods
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:08:23.307: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
STEP: Destroying namespace "pods-226" for this suite.


• [SLOW TEST:14.436 seconds]
[sig-node] Pods
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/framework.go:23
  should allow activeDeadlineSeconds to be updated [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-node] Pods should allow activeDeadlineSeconds to be updated [NodeConformance] [Conformance]","total":-1,"completed":2,"skipped":0,"failed":0}

SSSSSSS
------------------------------
[BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
[BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath
... skipping 18 lines ...
May  9 18:08:05.837: INFO: PersistentVolumeClaim pvc-bp2sz found but phase is Pending instead of Bound.
May  9 18:08:08.082: INFO: PersistentVolumeClaim pvc-bp2sz found and phase=Bound (4.733624553s)
May  9 18:08:08.082: INFO: Waiting up to 3m0s for PersistentVolume local-6xjsq to have phase Bound
May  9 18:08:08.326: INFO: PersistentVolume local-6xjsq found and phase=Bound (243.555487ms)
STEP: Creating pod pod-subpath-test-preprovisionedpv-zjpj
STEP: Creating a pod to test subpath
May  9 18:08:09.061: INFO: Waiting up to 5m0s for pod "pod-subpath-test-preprovisionedpv-zjpj" in namespace "provisioning-6472" to be "Succeeded or Failed"
May  9 18:08:09.305: INFO: Pod "pod-subpath-test-preprovisionedpv-zjpj": Phase="Pending", Reason="", readiness=false. Elapsed: 243.285404ms
May  9 18:08:11.549: INFO: Pod "pod-subpath-test-preprovisionedpv-zjpj": Phase="Pending", Reason="", readiness=false. Elapsed: 2.487476335s
May  9 18:08:13.794: INFO: Pod "pod-subpath-test-preprovisionedpv-zjpj": Phase="Pending", Reason="", readiness=false. Elapsed: 4.732517995s
May  9 18:08:16.043: INFO: Pod "pod-subpath-test-preprovisionedpv-zjpj": Phase="Pending", Reason="", readiness=false. Elapsed: 6.981875469s
May  9 18:08:18.287: INFO: Pod "pod-subpath-test-preprovisionedpv-zjpj": Phase="Pending", Reason="", readiness=false. Elapsed: 9.225395304s
May  9 18:08:20.530: INFO: Pod "pod-subpath-test-preprovisionedpv-zjpj": Phase="Succeeded", Reason="", readiness=false. Elapsed: 11.468848702s
STEP: Saw pod success
May  9 18:08:20.530: INFO: Pod "pod-subpath-test-preprovisionedpv-zjpj" satisfied condition "Succeeded or Failed"
May  9 18:08:20.776: INFO: Trying to get logs from node ip-172-20-33-176.ap-south-1.compute.internal pod pod-subpath-test-preprovisionedpv-zjpj container test-container-subpath-preprovisionedpv-zjpj: <nil>
STEP: delete the pod
May  9 18:08:21.283: INFO: Waiting for pod pod-subpath-test-preprovisionedpv-zjpj to disappear
May  9 18:08:21.526: INFO: Pod pod-subpath-test-preprovisionedpv-zjpj no longer exists
STEP: Deleting pod pod-subpath-test-preprovisionedpv-zjpj
May  9 18:08:21.526: INFO: Deleting pod "pod-subpath-test-preprovisionedpv-zjpj" in namespace "provisioning-6472"
... skipping 19 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Pre-provisioned PV (default fs)] subPath
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should support readOnly file specified in the volumeMount [LinuxOnly]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:379
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]","total":-1,"completed":1,"skipped":5,"failed":0}
[BeforeEach] [Testpattern: Inline-volume (ext4)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:08:25.023: INFO: Only supported for providers [openstack] (not aws)
[AfterEach] [Testpattern: Inline-volume (ext4)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 93 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/subpath.go:38
STEP: Setting up data
[It] should support subpaths with projected pod [LinuxOnly] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating pod pod-subpath-test-projected-rmmk
STEP: Creating a pod to test atomic-volume-subpath
May  9 18:07:54.537: INFO: Waiting up to 5m0s for pod "pod-subpath-test-projected-rmmk" in namespace "subpath-9849" to be "Succeeded or Failed"
May  9 18:07:54.777: INFO: Pod "pod-subpath-test-projected-rmmk": Phase="Pending", Reason="", readiness=false. Elapsed: 239.996399ms
May  9 18:07:57.015: INFO: Pod "pod-subpath-test-projected-rmmk": Phase="Pending", Reason="", readiness=false. Elapsed: 2.478078758s
May  9 18:07:59.253: INFO: Pod "pod-subpath-test-projected-rmmk": Phase="Pending", Reason="", readiness=false. Elapsed: 4.715925643s
May  9 18:08:01.492: INFO: Pod "pod-subpath-test-projected-rmmk": Phase="Pending", Reason="", readiness=false. Elapsed: 6.955361242s
May  9 18:08:03.731: INFO: Pod "pod-subpath-test-projected-rmmk": Phase="Pending", Reason="", readiness=false. Elapsed: 9.194505249s
May  9 18:08:05.970: INFO: Pod "pod-subpath-test-projected-rmmk": Phase="Running", Reason="", readiness=true. Elapsed: 11.433162964s
... skipping 5 lines ...
May  9 18:08:19.400: INFO: Pod "pod-subpath-test-projected-rmmk": Phase="Running", Reason="", readiness=true. Elapsed: 24.863730414s
May  9 18:08:21.641: INFO: Pod "pod-subpath-test-projected-rmmk": Phase="Running", Reason="", readiness=true. Elapsed: 27.104369247s
May  9 18:08:23.880: INFO: Pod "pod-subpath-test-projected-rmmk": Phase="Running", Reason="", readiness=true. Elapsed: 29.343228198s
May  9 18:08:26.118: INFO: Pod "pod-subpath-test-projected-rmmk": Phase="Running", Reason="", readiness=true. Elapsed: 31.581612946s
May  9 18:08:28.357: INFO: Pod "pod-subpath-test-projected-rmmk": Phase="Succeeded", Reason="", readiness=false. Elapsed: 33.820105647s
STEP: Saw pod success
May  9 18:08:28.357: INFO: Pod "pod-subpath-test-projected-rmmk" satisfied condition "Succeeded or Failed"
May  9 18:08:28.594: INFO: Trying to get logs from node ip-172-20-61-172.ap-south-1.compute.internal pod pod-subpath-test-projected-rmmk container test-container-subpath-projected-rmmk: <nil>
STEP: delete the pod
May  9 18:08:29.089: INFO: Waiting for pod pod-subpath-test-projected-rmmk to disappear
May  9 18:08:29.326: INFO: Pod pod-subpath-test-projected-rmmk no longer exists
STEP: Deleting pod pod-subpath-test-projected-rmmk
May  9 18:08:29.326: INFO: Deleting pod "pod-subpath-test-projected-rmmk" in namespace "subpath-9849"
... skipping 8 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/framework.go:23
  Atomic writer volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/subpath.go:34
    should support subpaths with projected pod [LinuxOnly] [Conformance]
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-storage] Subpath Atomic writer volumes should support subpaths with projected pod [LinuxOnly] [Conformance]","total":-1,"completed":1,"skipped":2,"failed":0}

SSSS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)] capacity
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:08:30.298: INFO: Only supported for providers [vsphere] (not aws)
... skipping 77 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/framework.go:23
  when create a pod with lifecycle hook
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/lifecycle_hook.go:43
    should execute prestop http hook properly [NodeConformance] [Conformance]
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop http hook properly [NodeConformance] [Conformance]","total":-1,"completed":2,"skipped":20,"failed":0}

S
------------------------------
[BeforeEach] [sig-storage] ConfigMap
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 15 lines ...
• [SLOW TEST:13.355 seconds]
[sig-storage] ConfigMap
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/framework.go:23
  binary data should be reflected in volume [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-storage] ConfigMap binary data should be reflected in volume [NodeConformance] [Conformance]","total":-1,"completed":3,"skipped":15,"failed":0}

SS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)] provisioning
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:08:33.621: INFO: Driver local doesn't support DynamicPV -- skipping
... skipping 46 lines ...
May  9 18:08:21.835: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename security-context
STEP: Waiting for a default service account to be provisioned in namespace
[It] should support seccomp unconfined on the container [LinuxOnly]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/node/security_context.go:161
STEP: Creating a pod to test seccomp.security.alpha.kubernetes.io/pod
May  9 18:08:23.308: INFO: Waiting up to 5m0s for pod "security-context-ed260586-e7c2-4ec0-804c-fa6b40fe3cc8" in namespace "security-context-9078" to be "Succeeded or Failed"
May  9 18:08:23.549: INFO: Pod "security-context-ed260586-e7c2-4ec0-804c-fa6b40fe3cc8": Phase="Pending", Reason="", readiness=false. Elapsed: 241.389575ms
May  9 18:08:25.791: INFO: Pod "security-context-ed260586-e7c2-4ec0-804c-fa6b40fe3cc8": Phase="Pending", Reason="", readiness=false. Elapsed: 2.482844309s
May  9 18:08:28.039: INFO: Pod "security-context-ed260586-e7c2-4ec0-804c-fa6b40fe3cc8": Phase="Pending", Reason="", readiness=false. Elapsed: 4.731433619s
May  9 18:08:30.281: INFO: Pod "security-context-ed260586-e7c2-4ec0-804c-fa6b40fe3cc8": Phase="Pending", Reason="", readiness=false. Elapsed: 6.972693589s
May  9 18:08:32.523: INFO: Pod "security-context-ed260586-e7c2-4ec0-804c-fa6b40fe3cc8": Phase="Succeeded", Reason="", readiness=false. Elapsed: 9.215155388s
STEP: Saw pod success
May  9 18:08:32.523: INFO: Pod "security-context-ed260586-e7c2-4ec0-804c-fa6b40fe3cc8" satisfied condition "Succeeded or Failed"
May  9 18:08:32.764: INFO: Trying to get logs from node ip-172-20-33-8.ap-south-1.compute.internal pod security-context-ed260586-e7c2-4ec0-804c-fa6b40fe3cc8 container test-container: <nil>
STEP: delete the pod
May  9 18:08:33.255: INFO: Waiting for pod security-context-ed260586-e7c2-4ec0-804c-fa6b40fe3cc8 to disappear
May  9 18:08:33.497: INFO: Pod security-context-ed260586-e7c2-4ec0-804c-fa6b40fe3cc8 no longer exists
[AfterEach] [sig-node] Security Context
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 4 lines ...
• [SLOW TEST:12.146 seconds]
[sig-node] Security Context
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/node/framework.go:23
  should support seccomp unconfined on the container [LinuxOnly]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/node/security_context.go:161
------------------------------
{"msg":"PASSED [sig-node] Security Context should support seccomp unconfined on the container [LinuxOnly]","total":-1,"completed":4,"skipped":21,"failed":0}
[BeforeEach] [Testpattern: Inline-volume (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:08:33.989: INFO: Only supported for providers [gce gke] (not aws)
[AfterEach] [Testpattern: Inline-volume (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 142 lines ...
[It] should support readOnly file specified in the volumeMount [LinuxOnly]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:379
May  9 18:08:20.075: INFO: In-tree plugin kubernetes.io/empty-dir is not migrated, not validating any metrics
May  9 18:08:20.076: INFO: Creating resource for inline volume
STEP: Creating pod pod-subpath-test-inlinevolume-tnp4
STEP: Creating a pod to test subpath
May  9 18:08:20.329: INFO: Waiting up to 5m0s for pod "pod-subpath-test-inlinevolume-tnp4" in namespace "provisioning-5568" to be "Succeeded or Failed"
May  9 18:08:20.567: INFO: Pod "pod-subpath-test-inlinevolume-tnp4": Phase="Pending", Reason="", readiness=false. Elapsed: 238.485259ms
May  9 18:08:22.804: INFO: Pod "pod-subpath-test-inlinevolume-tnp4": Phase="Pending", Reason="", readiness=false. Elapsed: 2.474760383s
May  9 18:08:25.040: INFO: Pod "pod-subpath-test-inlinevolume-tnp4": Phase="Pending", Reason="", readiness=false. Elapsed: 4.711263069s
May  9 18:08:27.277: INFO: Pod "pod-subpath-test-inlinevolume-tnp4": Phase="Pending", Reason="", readiness=false. Elapsed: 6.948413556s
May  9 18:08:29.513: INFO: Pod "pod-subpath-test-inlinevolume-tnp4": Phase="Pending", Reason="", readiness=false. Elapsed: 9.18440666s
May  9 18:08:31.751: INFO: Pod "pod-subpath-test-inlinevolume-tnp4": Phase="Pending", Reason="", readiness=false. Elapsed: 11.421693369s
May  9 18:08:33.988: INFO: Pod "pod-subpath-test-inlinevolume-tnp4": Phase="Succeeded", Reason="", readiness=false. Elapsed: 13.658721668s
STEP: Saw pod success
May  9 18:08:33.988: INFO: Pod "pod-subpath-test-inlinevolume-tnp4" satisfied condition "Succeeded or Failed"
May  9 18:08:34.224: INFO: Trying to get logs from node ip-172-20-33-8.ap-south-1.compute.internal pod pod-subpath-test-inlinevolume-tnp4 container test-container-subpath-inlinevolume-tnp4: <nil>
STEP: delete the pod
May  9 18:08:34.707: INFO: Waiting for pod pod-subpath-test-inlinevolume-tnp4 to disappear
May  9 18:08:34.943: INFO: Pod pod-subpath-test-inlinevolume-tnp4 no longer exists
STEP: Deleting pod pod-subpath-test-inlinevolume-tnp4
May  9 18:08:34.943: INFO: Deleting pod "pod-subpath-test-inlinevolume-tnp4" in namespace "provisioning-5568"
... skipping 12 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Inline-volume (default fs)] subPath
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should support readOnly file specified in the volumeMount [LinuxOnly]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:379
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]","total":-1,"completed":2,"skipped":2,"failed":0}

SSSSS
------------------------------
[BeforeEach] [sig-apps] Job
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 20 lines ...
• [SLOW TEST:44.750 seconds]
[sig-apps] Job
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apps/framework.go:23
  should delete a job [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-apps] Job should delete a job [Conformance]","total":-1,"completed":1,"skipped":5,"failed":0}

SSSS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)] provisioning
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:08:36.992: INFO: Driver local doesn't support DynamicPV -- skipping
... skipping 45 lines ...
May  9 18:08:19.274: INFO: PersistentVolumeClaim pvc-v7k9g found but phase is Pending instead of Bound.
May  9 18:08:21.509: INFO: PersistentVolumeClaim pvc-v7k9g found and phase=Bound (13.651568036s)
May  9 18:08:21.509: INFO: Waiting up to 3m0s for PersistentVolume local-jtzsq to have phase Bound
May  9 18:08:21.743: INFO: PersistentVolume local-jtzsq found and phase=Bound (234.359624ms)
STEP: Creating pod pod-subpath-test-preprovisionedpv-hfrc
STEP: Creating a pod to test subpath
May  9 18:08:22.450: INFO: Waiting up to 5m0s for pod "pod-subpath-test-preprovisionedpv-hfrc" in namespace "provisioning-108" to be "Succeeded or Failed"
May  9 18:08:22.684: INFO: Pod "pod-subpath-test-preprovisionedpv-hfrc": Phase="Pending", Reason="", readiness=false. Elapsed: 234.224018ms
May  9 18:08:24.919: INFO: Pod "pod-subpath-test-preprovisionedpv-hfrc": Phase="Pending", Reason="", readiness=false. Elapsed: 2.46895147s
May  9 18:08:27.160: INFO: Pod "pod-subpath-test-preprovisionedpv-hfrc": Phase="Pending", Reason="", readiness=false. Elapsed: 4.710147406s
May  9 18:08:29.395: INFO: Pod "pod-subpath-test-preprovisionedpv-hfrc": Phase="Pending", Reason="", readiness=false. Elapsed: 6.945856346s
May  9 18:08:31.630: INFO: Pod "pod-subpath-test-preprovisionedpv-hfrc": Phase="Pending", Reason="", readiness=false. Elapsed: 9.18079269s
May  9 18:08:33.868: INFO: Pod "pod-subpath-test-preprovisionedpv-hfrc": Phase="Pending", Reason="", readiness=false. Elapsed: 11.418638314s
May  9 18:08:36.103: INFO: Pod "pod-subpath-test-preprovisionedpv-hfrc": Phase="Succeeded", Reason="", readiness=false. Elapsed: 13.653484133s
STEP: Saw pod success
May  9 18:08:36.103: INFO: Pod "pod-subpath-test-preprovisionedpv-hfrc" satisfied condition "Succeeded or Failed"
May  9 18:08:36.337: INFO: Trying to get logs from node ip-172-20-33-176.ap-south-1.compute.internal pod pod-subpath-test-preprovisionedpv-hfrc container test-container-subpath-preprovisionedpv-hfrc: <nil>
STEP: delete the pod
May  9 18:08:36.823: INFO: Waiting for pod pod-subpath-test-preprovisionedpv-hfrc to disappear
May  9 18:08:37.061: INFO: Pod pod-subpath-test-preprovisionedpv-hfrc no longer exists
STEP: Deleting pod pod-subpath-test-preprovisionedpv-hfrc
May  9 18:08:37.061: INFO: Deleting pod "pod-subpath-test-preprovisionedpv-hfrc" in namespace "provisioning-108"
... skipping 84 lines ...
STEP: Building a namespace api object, basename security-context-test
STEP: Waiting for a default service account to be provisioned in namespace
[BeforeEach] [sig-node] Security Context
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/security_context.go:46
[It] should not allow privilege escalation when false [LinuxOnly] [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
May  9 18:08:38.436: INFO: Waiting up to 5m0s for pod "alpine-nnp-false-532f9f78-9c7a-4936-a1d2-61ce4e32d06d" in namespace "security-context-test-3936" to be "Succeeded or Failed"
May  9 18:08:38.677: INFO: Pod "alpine-nnp-false-532f9f78-9c7a-4936-a1d2-61ce4e32d06d": Phase="Pending", Reason="", readiness=false. Elapsed: 241.504084ms
May  9 18:08:40.915: INFO: Pod "alpine-nnp-false-532f9f78-9c7a-4936-a1d2-61ce4e32d06d": Phase="Pending", Reason="", readiness=false. Elapsed: 2.479579517s
May  9 18:08:43.152: INFO: Pod "alpine-nnp-false-532f9f78-9c7a-4936-a1d2-61ce4e32d06d": Phase="Pending", Reason="", readiness=false. Elapsed: 4.716060316s
May  9 18:08:45.388: INFO: Pod "alpine-nnp-false-532f9f78-9c7a-4936-a1d2-61ce4e32d06d": Phase="Succeeded", Reason="", readiness=false. Elapsed: 6.951728143s
May  9 18:08:45.388: INFO: Pod "alpine-nnp-false-532f9f78-9c7a-4936-a1d2-61ce4e32d06d" satisfied condition "Succeeded or Failed"
[AfterEach] [sig-node] Security Context
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:08:45.633: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
STEP: Destroying namespace "security-context-test-3936" for this suite.


... skipping 2 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/framework.go:23
  when creating containers with AllowPrivilegeEscalation
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/security_context.go:296
    should not allow privilege escalation when false [LinuxOnly] [NodeConformance] [Conformance]
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-node] Security Context when creating containers with AllowPrivilegeEscalation should not allow privilege escalation when false [LinuxOnly] [NodeConformance] [Conformance]","total":-1,"completed":2,"skipped":17,"failed":0}

SS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:08:46.125: INFO: Driver local doesn't support DynamicPV -- skipping
... skipping 26 lines ...
[It] should support readOnly file specified in the volumeMount [LinuxOnly]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:379
May  9 18:08:37.099: INFO: In-tree plugin kubernetes.io/host-path is not migrated, not validating any metrics
May  9 18:08:37.336: INFO: Creating resource for inline volume
STEP: Creating pod pod-subpath-test-inlinevolume-brf9
STEP: Creating a pod to test subpath
May  9 18:08:37.577: INFO: Waiting up to 5m0s for pod "pod-subpath-test-inlinevolume-brf9" in namespace "provisioning-8503" to be "Succeeded or Failed"
May  9 18:08:37.813: INFO: Pod "pod-subpath-test-inlinevolume-brf9": Phase="Pending", Reason="", readiness=false. Elapsed: 235.90521ms
May  9 18:08:40.049: INFO: Pod "pod-subpath-test-inlinevolume-brf9": Phase="Pending", Reason="", readiness=false. Elapsed: 2.472456373s
May  9 18:08:42.290: INFO: Pod "pod-subpath-test-inlinevolume-brf9": Phase="Pending", Reason="", readiness=false. Elapsed: 4.713689094s
May  9 18:08:44.528: INFO: Pod "pod-subpath-test-inlinevolume-brf9": Phase="Succeeded", Reason="", readiness=false. Elapsed: 6.950976425s
STEP: Saw pod success
May  9 18:08:44.528: INFO: Pod "pod-subpath-test-inlinevolume-brf9" satisfied condition "Succeeded or Failed"
May  9 18:08:44.769: INFO: Trying to get logs from node ip-172-20-33-8.ap-south-1.compute.internal pod pod-subpath-test-inlinevolume-brf9 container test-container-subpath-inlinevolume-brf9: <nil>
STEP: delete the pod
May  9 18:08:45.253: INFO: Waiting for pod pod-subpath-test-inlinevolume-brf9 to disappear
May  9 18:08:45.488: INFO: Pod pod-subpath-test-inlinevolume-brf9 no longer exists
STEP: Deleting pod pod-subpath-test-inlinevolume-brf9
May  9 18:08:45.488: INFO: Deleting pod "pod-subpath-test-inlinevolume-brf9" in namespace "provisioning-8503"
... skipping 12 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Inline-volume (default fs)] subPath
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should support readOnly file specified in the volumeMount [LinuxOnly]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:379
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]","total":-1,"completed":3,"skipped":7,"failed":0}

SS
------------------------------
{"msg":"PASSED [sig-node] Variable Expansion should allow substituting values in a container's command [NodeConformance] [Conformance]","total":-1,"completed":2,"skipped":13,"failed":0}
[BeforeEach] [sig-storage] PersistentVolumes-local 
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:08:21.186: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename persistent-local-volumes-test
STEP: Waiting for a default service account to be provisioned in namespace
... skipping 62 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/persistent_volumes-local.go:192
    One pod requesting one prebound PVC
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/persistent_volumes-local.go:209
      should be able to mount volume and write from pod1
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/persistent_volumes-local.go:238
------------------------------
{"msg":"PASSED [sig-storage] PersistentVolumes-local  [Volume type: block] One pod requesting one prebound PVC should be able to mount volume and write from pod1","total":-1,"completed":3,"skipped":13,"failed":0}

S
------------------------------
[BeforeEach] [sig-apps] DisruptionController
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 23 lines ...
• [SLOW TEST:23.689 seconds]
[sig-apps] DisruptionController
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apps/framework.go:23
  evictions: maxUnavailable allow single eviction, percentage => should allow an eviction
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apps/disruption.go:267
------------------------------
{"msg":"PASSED [sig-apps] DisruptionController evictions: maxUnavailable allow single eviction, percentage =\u003e should allow an eviction","total":-1,"completed":2,"skipped":16,"failed":0}
[BeforeEach] [Testpattern: Dynamic PV (block volmode)] provisioning
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:08:48.770: INFO: Driver local doesn't support DynamicPV -- skipping
[AfterEach] [Testpattern: Dynamic PV (block volmode)] provisioning
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 81 lines ...
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:205

      Only supported for providers [azure] (not aws)

      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/drivers/in_tree.go:1566
------------------------------
{"msg":"PASSED [sig-api-machinery] Servers with support for Table transformation should return chunks of table results for list calls","total":-1,"completed":4,"skipped":9,"failed":0}
[BeforeEach] [Testpattern: Inline-volume (ext4)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:08:49.780: INFO: Driver nfs doesn't support ext4 -- skipping
[AfterEach] [Testpattern: Inline-volume (ext4)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 128 lines ...
May  9 18:08:20.019: INFO: PersistentVolumeClaim pvc-v9rk5 found but phase is Pending instead of Bound.
May  9 18:08:22.273: INFO: PersistentVolumeClaim pvc-v9rk5 found and phase=Bound (13.738806772s)
May  9 18:08:22.273: INFO: Waiting up to 3m0s for PersistentVolume local-xv9hz to have phase Bound
May  9 18:08:22.517: INFO: PersistentVolume local-xv9hz found and phase=Bound (243.414308ms)
STEP: Creating pod pod-subpath-test-preprovisionedpv-67lh
STEP: Creating a pod to test atomic-volume-subpath
May  9 18:08:23.250: INFO: Waiting up to 5m0s for pod "pod-subpath-test-preprovisionedpv-67lh" in namespace "provisioning-5899" to be "Succeeded or Failed"
May  9 18:08:23.494: INFO: Pod "pod-subpath-test-preprovisionedpv-67lh": Phase="Pending", Reason="", readiness=false. Elapsed: 243.932428ms
May  9 18:08:25.738: INFO: Pod "pod-subpath-test-preprovisionedpv-67lh": Phase="Pending", Reason="", readiness=false. Elapsed: 2.487963898s
May  9 18:08:27.983: INFO: Pod "pod-subpath-test-preprovisionedpv-67lh": Phase="Running", Reason="", readiness=true. Elapsed: 4.732600614s
May  9 18:08:30.228: INFO: Pod "pod-subpath-test-preprovisionedpv-67lh": Phase="Running", Reason="", readiness=true. Elapsed: 6.977592416s
May  9 18:08:32.472: INFO: Pod "pod-subpath-test-preprovisionedpv-67lh": Phase="Running", Reason="", readiness=true. Elapsed: 9.221701462s
May  9 18:08:34.716: INFO: Pod "pod-subpath-test-preprovisionedpv-67lh": Phase="Running", Reason="", readiness=true. Elapsed: 11.466083934s
May  9 18:08:36.962: INFO: Pod "pod-subpath-test-preprovisionedpv-67lh": Phase="Running", Reason="", readiness=true. Elapsed: 13.711335944s
May  9 18:08:39.207: INFO: Pod "pod-subpath-test-preprovisionedpv-67lh": Phase="Running", Reason="", readiness=true. Elapsed: 15.956623593s
May  9 18:08:41.451: INFO: Pod "pod-subpath-test-preprovisionedpv-67lh": Phase="Running", Reason="", readiness=true. Elapsed: 18.200455932s
May  9 18:08:43.695: INFO: Pod "pod-subpath-test-preprovisionedpv-67lh": Phase="Running", Reason="", readiness=true. Elapsed: 20.444667746s
May  9 18:08:45.940: INFO: Pod "pod-subpath-test-preprovisionedpv-67lh": Phase="Succeeded", Reason="", readiness=false. Elapsed: 22.689919441s
STEP: Saw pod success
May  9 18:08:45.940: INFO: Pod "pod-subpath-test-preprovisionedpv-67lh" satisfied condition "Succeeded or Failed"
May  9 18:08:46.184: INFO: Trying to get logs from node ip-172-20-61-172.ap-south-1.compute.internal pod pod-subpath-test-preprovisionedpv-67lh container test-container-subpath-preprovisionedpv-67lh: <nil>
STEP: delete the pod
May  9 18:08:46.683: INFO: Waiting for pod pod-subpath-test-preprovisionedpv-67lh to disappear
May  9 18:08:46.927: INFO: Pod pod-subpath-test-preprovisionedpv-67lh no longer exists
STEP: Deleting pod pod-subpath-test-preprovisionedpv-67lh
May  9 18:08:46.927: INFO: Deleting pod "pod-subpath-test-preprovisionedpv-67lh" in namespace "provisioning-5899"
... skipping 19 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Pre-provisioned PV (default fs)] subPath
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should support file as subpath [LinuxOnly]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:230
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]","total":-1,"completed":2,"skipped":9,"failed":0}

S
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:08:50.196: INFO: Driver local doesn't support DynamicPV -- skipping
... skipping 122 lines ...
• [SLOW TEST:21.567 seconds]
[sig-apps] ReplicationController
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apps/framework.go:23
  should test the lifecycle of a ReplicationController [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-apps] ReplicationController should test the lifecycle of a ReplicationController [Conformance]","total":-1,"completed":3,"skipped":21,"failed":0}

SSSSSSSSSS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
[BeforeEach] [Testpattern: Dynamic PV (default fs)] subPath
... skipping 9 lines ...
May  9 18:08:07.891: INFO: Using claimSize:1Gi, test suite supported size:{ 1Mi}, driver(aws) supported size:{ 1Mi} 
STEP: creating a StorageClass provisioning-8156skcn
STEP: creating a claim
May  9 18:08:08.128: INFO: Warning: Making PVC: VolumeMode specified as invalid empty string, treating as nil
STEP: Creating pod pod-subpath-test-dynamicpv-5hkz
STEP: Creating a pod to test subpath
May  9 18:08:08.841: INFO: Waiting up to 5m0s for pod "pod-subpath-test-dynamicpv-5hkz" in namespace "provisioning-815" to be "Succeeded or Failed"
May  9 18:08:09.079: INFO: Pod "pod-subpath-test-dynamicpv-5hkz": Phase="Pending", Reason="", readiness=false. Elapsed: 238.359754ms
May  9 18:08:11.319: INFO: Pod "pod-subpath-test-dynamicpv-5hkz": Phase="Pending", Reason="", readiness=false. Elapsed: 2.47787083s
May  9 18:08:13.558: INFO: Pod "pod-subpath-test-dynamicpv-5hkz": Phase="Pending", Reason="", readiness=false. Elapsed: 4.716679051s
May  9 18:08:15.794: INFO: Pod "pod-subpath-test-dynamicpv-5hkz": Phase="Pending", Reason="", readiness=false. Elapsed: 6.95329336s
May  9 18:08:18.034: INFO: Pod "pod-subpath-test-dynamicpv-5hkz": Phase="Pending", Reason="", readiness=false. Elapsed: 9.192619485s
May  9 18:08:20.271: INFO: Pod "pod-subpath-test-dynamicpv-5hkz": Phase="Pending", Reason="", readiness=false. Elapsed: 11.430221389s
May  9 18:08:22.508: INFO: Pod "pod-subpath-test-dynamicpv-5hkz": Phase="Pending", Reason="", readiness=false. Elapsed: 13.666921082s
May  9 18:08:24.746: INFO: Pod "pod-subpath-test-dynamicpv-5hkz": Phase="Pending", Reason="", readiness=false. Elapsed: 15.904445357s
May  9 18:08:26.982: INFO: Pod "pod-subpath-test-dynamicpv-5hkz": Phase="Pending", Reason="", readiness=false. Elapsed: 18.141191745s
May  9 18:08:29.220: INFO: Pod "pod-subpath-test-dynamicpv-5hkz": Phase="Pending", Reason="", readiness=false. Elapsed: 20.379286848s
May  9 18:08:31.460: INFO: Pod "pod-subpath-test-dynamicpv-5hkz": Phase="Pending", Reason="", readiness=false. Elapsed: 22.618771011s
May  9 18:08:33.701: INFO: Pod "pod-subpath-test-dynamicpv-5hkz": Phase="Succeeded", Reason="", readiness=false. Elapsed: 24.859859601s
STEP: Saw pod success
May  9 18:08:33.701: INFO: Pod "pod-subpath-test-dynamicpv-5hkz" satisfied condition "Succeeded or Failed"
May  9 18:08:33.938: INFO: Trying to get logs from node ip-172-20-33-176.ap-south-1.compute.internal pod pod-subpath-test-dynamicpv-5hkz container test-container-subpath-dynamicpv-5hkz: <nil>
STEP: delete the pod
May  9 18:08:34.424: INFO: Waiting for pod pod-subpath-test-dynamicpv-5hkz to disappear
May  9 18:08:34.660: INFO: Pod pod-subpath-test-dynamicpv-5hkz no longer exists
STEP: Deleting pod pod-subpath-test-dynamicpv-5hkz
May  9 18:08:34.660: INFO: Deleting pod "pod-subpath-test-dynamicpv-5hkz" in namespace "provisioning-815"
... skipping 20 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Dynamic PV (default fs)] subPath
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should support readOnly file specified in the volumeMount [LinuxOnly]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:379
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]","total":-1,"completed":3,"skipped":18,"failed":0}

S
------------------------------
[BeforeEach] [Testpattern: Pre-provisioned PV (block volmode)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:08:52.529: INFO: Driver hostPathSymlink doesn't support PreprovisionedPV -- skipping
... skipping 86 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/persistent_volumes-local.go:192
    Two pods mounting a local volume at the same time
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/persistent_volumes-local.go:248
      should be able to write from pod1 and read from pod2
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/persistent_volumes-local.go:249
------------------------------
{"msg":"PASSED [sig-storage] PersistentVolumes-local  [Volume type: dir] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2","total":-1,"completed":2,"skipped":12,"failed":0}

S
------------------------------
[BeforeEach] [Testpattern: Inline-volume (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:08:53.254: INFO: Driver supports dynamic provisioning, skipping InlineVolume pattern
... skipping 44 lines ...
May  9 18:08:34.882: INFO: PersistentVolumeClaim pvc-jfg6v found but phase is Pending instead of Bound.
May  9 18:08:37.124: INFO: PersistentVolumeClaim pvc-jfg6v found and phase=Bound (4.72265532s)
May  9 18:08:37.124: INFO: Waiting up to 3m0s for PersistentVolume local-f8g2z to have phase Bound
May  9 18:08:37.364: INFO: PersistentVolume local-f8g2z found and phase=Bound (240.369337ms)
STEP: Creating pod pod-subpath-test-preprovisionedpv-f5z5
STEP: Creating a pod to test subpath
May  9 18:08:38.087: INFO: Waiting up to 5m0s for pod "pod-subpath-test-preprovisionedpv-f5z5" in namespace "provisioning-6921" to be "Succeeded or Failed"
May  9 18:08:38.327: INFO: Pod "pod-subpath-test-preprovisionedpv-f5z5": Phase="Pending", Reason="", readiness=false. Elapsed: 239.960874ms
May  9 18:08:40.568: INFO: Pod "pod-subpath-test-preprovisionedpv-f5z5": Phase="Pending", Reason="", readiness=false. Elapsed: 2.481206528s
May  9 18:08:42.810: INFO: Pod "pod-subpath-test-preprovisionedpv-f5z5": Phase="Pending", Reason="", readiness=false. Elapsed: 4.722864514s
May  9 18:08:45.051: INFO: Pod "pod-subpath-test-preprovisionedpv-f5z5": Phase="Succeeded", Reason="", readiness=false. Elapsed: 6.963782347s
STEP: Saw pod success
May  9 18:08:45.051: INFO: Pod "pod-subpath-test-preprovisionedpv-f5z5" satisfied condition "Succeeded or Failed"
May  9 18:08:45.291: INFO: Trying to get logs from node ip-172-20-33-176.ap-south-1.compute.internal pod pod-subpath-test-preprovisionedpv-f5z5 container test-container-subpath-preprovisionedpv-f5z5: <nil>
STEP: delete the pod
May  9 18:08:45.790: INFO: Waiting for pod pod-subpath-test-preprovisionedpv-f5z5 to disappear
May  9 18:08:46.031: INFO: Pod pod-subpath-test-preprovisionedpv-f5z5 no longer exists
STEP: Deleting pod pod-subpath-test-preprovisionedpv-f5z5
May  9 18:08:46.031: INFO: Deleting pod "pod-subpath-test-preprovisionedpv-f5z5" in namespace "provisioning-6921"
... skipping 26 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Pre-provisioned PV (default fs)] subPath
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should support existing single file [LinuxOnly]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:219
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]","total":-1,"completed":3,"skipped":4,"failed":0}

SS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:08:54.038: INFO: Driver local doesn't support DynamicPV -- skipping
... skipping 110 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/persistent_volumes-local.go:192
    Two pods mounting a local volume one after the other
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/persistent_volumes-local.go:254
      should be able to write from pod1 and read from pod2
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/persistent_volumes-local.go:255
------------------------------
{"msg":"PASSED [sig-storage] PersistentVolumes-local  [Volume type: block] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2","total":-1,"completed":2,"skipped":1,"failed":0}

SSS
------------------------------
[BeforeEach] [sig-apps] DisruptionController
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 42 lines ...
• [SLOW TEST:53.220 seconds]
[sig-apps] Job
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apps/framework.go:23
  should remove pods when job is deleted
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apps/job.go:189
------------------------------
{"msg":"PASSED [sig-apps] Job should remove pods when job is deleted","total":-1,"completed":3,"skipped":74,"failed":0}

SSSSSSSSSS
------------------------------
[BeforeEach] [sig-network] Networking
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 51 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/network/framework.go:23
  Granular Checks: Pods
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/network/networking.go:30
    should function for node-pod communication: http [LinuxOnly] [NodeConformance] [Conformance]
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-network] Networking Granular Checks: Pods should function for node-pod communication: http [LinuxOnly] [NodeConformance] [Conformance]","total":-1,"completed":2,"skipped":8,"failed":0}

SSSSSS
------------------------------
[BeforeEach] [sig-apps] ReplicaSet
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 21 lines ...
• [SLOW TEST:29.252 seconds]
[sig-apps] ReplicaSet
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apps/framework.go:23
  Replace and Patch tests [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-apps] ReplicaSet Replace and Patch tests [Conformance]","total":-1,"completed":4,"skipped":27,"failed":0}
[BeforeEach] [Testpattern: Dynamic PV (default fs)] volume-expand
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:04.604: INFO: Driver local doesn't support DynamicPV -- skipping
[AfterEach] [Testpattern: Dynamic PV (default fs)] volume-expand
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 135 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Pre-provisioned PV (default fs)] volumes
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should store data
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volumes.go:159
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data","total":-1,"completed":1,"skipped":10,"failed":0}

SSSSSSS
------------------------------
{"msg":"PASSED [sig-apps] DisruptionController evictions: too few pods, absolute =\u003e should not allow an eviction","total":-1,"completed":3,"skipped":23,"failed":0}
[BeforeEach] [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:09:01.706: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename custom-resource-definition
STEP: Waiting for a default service account to be provisioned in namespace
... skipping 9 lines ...
• [SLOW TEST:6.294 seconds]
[sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin]
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apimachinery/framework.go:23
  custom resource defaulting for requests and from storage works  [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] custom resource defaulting for requests and from storage works  [Conformance]","total":-1,"completed":4,"skipped":23,"failed":0}
[BeforeEach] [Testpattern: Dynamic PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:08.008: INFO: Only supported for providers [gce gke] (not aws)
[AfterEach] [Testpattern: Dynamic PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 271 lines ...
• [SLOW TEST:5.750 seconds]
[sig-network] IngressClass API
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/network/common/framework.go:23
   should support creating IngressClass API operations [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-network] IngressClass API  should support creating IngressClass API operations [Conformance]","total":-1,"completed":5,"skipped":36,"failed":0}
[BeforeEach] [Testpattern: Dynamic PV (block volmode)] volumeMode
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:10.403: INFO: Driver emptydir doesn't support DynamicPV -- skipping
[AfterEach] [Testpattern: Dynamic PV (block volmode)] volumeMode
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 41 lines ...
STEP: Waiting for a default service account to be provisioned in namespace
[It] should project all components that make up the projection API [Projection][NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating configMap with name configmap-projected-all-test-volume-757834f9-2732-455a-a5a6-60342e9f7d2b
STEP: Creating secret with name secret-projected-all-test-volume-fc28b241-f044-4d4f-956e-c40f90b1706e
STEP: Creating a pod to test Check all projections for projected volume plugin
May  9 18:09:06.260: INFO: Waiting up to 5m0s for pod "projected-volume-94b2f137-2498-4426-870b-e2a85ed919ee" in namespace "projected-7853" to be "Succeeded or Failed"
May  9 18:09:06.501: INFO: Pod "projected-volume-94b2f137-2498-4426-870b-e2a85ed919ee": Phase="Pending", Reason="", readiness=false. Elapsed: 240.925764ms
May  9 18:09:08.742: INFO: Pod "projected-volume-94b2f137-2498-4426-870b-e2a85ed919ee": Phase="Pending", Reason="", readiness=false. Elapsed: 2.482174205s
May  9 18:09:10.983: INFO: Pod "projected-volume-94b2f137-2498-4426-870b-e2a85ed919ee": Phase="Succeeded", Reason="", readiness=false. Elapsed: 4.723702466s
STEP: Saw pod success
May  9 18:09:10.983: INFO: Pod "projected-volume-94b2f137-2498-4426-870b-e2a85ed919ee" satisfied condition "Succeeded or Failed"
May  9 18:09:11.225: INFO: Trying to get logs from node ip-172-20-57-119.ap-south-1.compute.internal pod projected-volume-94b2f137-2498-4426-870b-e2a85ed919ee container projected-all-volume-test: <nil>
STEP: delete the pod
May  9 18:09:11.757: INFO: Waiting for pod projected-volume-94b2f137-2498-4426-870b-e2a85ed919ee to disappear
May  9 18:09:12.005: INFO: Pod projected-volume-94b2f137-2498-4426-870b-e2a85ed919ee no longer exists
[AfterEach] [sig-storage] Projected combined
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 4 lines ...
• [SLOW TEST:8.170 seconds]
[sig-storage] Projected combined
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/framework.go:23
  should project all components that make up the projection API [Projection][NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-storage] Projected combined should project all components that make up the projection API [Projection][NodeConformance] [Conformance]","total":-1,"completed":3,"skipped":14,"failed":0}

SSSS
------------------------------
[BeforeEach] [sig-storage] Dynamic Provisioning
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 34 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/framework.go:23
  GlusterDynamicProvisioner
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/volume_provisioning.go:793
    should create and delete persistent volumes [fast]
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/volume_provisioning.go:794
------------------------------
{"msg":"PASSED [sig-storage] Dynamic Provisioning GlusterDynamicProvisioner should create and delete persistent volumes [fast]","total":-1,"completed":5,"skipped":31,"failed":0}

SSSS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:12.907: INFO: Driver local doesn't support DynamicPV -- skipping
... skipping 83 lines ...
• [SLOW TEST:30.889 seconds]
[sig-network] HostPort
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/network/common/framework.go:23
  validates that there is no conflict between pods with same hostPort but different hostIP and protocol [LinuxOnly] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-network] HostPort validates that there is no conflict between pods with same hostPort but different hostIP and protocol [LinuxOnly] [Conformance]","total":-1,"completed":3,"skipped":17,"failed":0}
[BeforeEach] [Testpattern: Dynamic PV (default fs)] provisioning
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:19.676: INFO: Driver local doesn't support DynamicPV -- skipping
[AfterEach] [Testpattern: Dynamic PV (default fs)] provisioning
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 48 lines ...
• [SLOW TEST:32.004 seconds]
[sig-api-machinery] Aggregator
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apimachinery/framework.go:23
  Should be able to support the 1.17 Sample API Server using the current Aggregator [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-api-machinery] Aggregator Should be able to support the 1.17 Sample API Server using the current Aggregator [Conformance]","total":-1,"completed":4,"skipped":29,"failed":0}
[BeforeEach] [Testpattern: Dynamic PV (block volmode)] provisioning
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:21.849: INFO: Driver local doesn't support DynamicPV -- skipping
[AfterEach] [Testpattern: Dynamic PV (block volmode)] provisioning
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 67 lines ...
May  9 18:08:23.504: INFO: Waiting up to timeout=5m0s for PersistentVolumeClaims [pvc-s2wn5] to have phase Bound
May  9 18:08:23.744: INFO: PersistentVolumeClaim pvc-s2wn5 found and phase=Bound (239.726518ms)
STEP: Deleting the previously created pod
May  9 18:08:32.947: INFO: Deleting pod "pvc-volume-tester-qf8kp" in namespace "csi-mock-volumes-9700"
May  9 18:08:33.188: INFO: Wait up to 5m0s for pod "pvc-volume-tester-qf8kp" to be fully deleted
STEP: Checking CSI driver logs
May  9 18:08:37.949: INFO: Found NodeUnpublishVolume: {json: {"Method":"/csi.v1.Node/NodeUnpublishVolume","Request":{"volume_id":"4","target_path":"/var/lib/kubelet/pods/7a96e9a5-97ed-40fe-8ccb-007f008f9c1d/volumes/kubernetes.io~csi/pvc-6550558d-d961-4130-afce-3e3a4bf919a9/mount"},"Response":{},"Error":"","FullError":null} Method:NodeUnpublishVolume Request:{VolumeContext:map[]} FullError:{Code:OK Message:} Error:}
STEP: Deleting pod pvc-volume-tester-qf8kp
May  9 18:08:37.949: INFO: Deleting pod "pvc-volume-tester-qf8kp" in namespace "csi-mock-volumes-9700"
STEP: Deleting claim pvc-s2wn5
May  9 18:08:38.685: INFO: Waiting up to 2m0s for PersistentVolume pvc-6550558d-d961-4130-afce-3e3a4bf919a9 to get deleted
May  9 18:08:38.925: INFO: PersistentVolume pvc-6550558d-d961-4130-afce-3e3a4bf919a9 was removed
STEP: Deleting storageclass csi-mock-volumes-9700-sc9w6kr
... skipping 44 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/framework.go:23
  CSIServiceAccountToken
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/csi_mock_volume.go:1374
    token should not be plumbed down when csiServiceAccountTokenEnabled=false
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/csi_mock_volume.go:1402
------------------------------
{"msg":"PASSED [sig-storage] CSI mock volume CSIServiceAccountToken token should not be plumbed down when csiServiceAccountTokenEnabled=false","total":-1,"completed":2,"skipped":5,"failed":0}
[BeforeEach] [Testpattern: Dynamic PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:22.183: INFO: Only supported for providers [gce gke] (not aws)
[AfterEach] [Testpattern: Dynamic PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 168 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/csi_volumes.go:40
    [Testpattern: Dynamic PV (default fs)] subPath
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should be able to unmount after the subpath directory is deleted [LinuxOnly]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:444
------------------------------
{"msg":"PASSED [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]","total":-1,"completed":1,"skipped":5,"failed":0}

SSS
------------------------------
[BeforeEach] [Testpattern: Pre-provisioned PV (ext3)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:23.006: INFO: Only supported for providers [openstack] (not aws)
... skipping 37 lines ...
      Only supported for providers [gce gke] (not aws)

      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/drivers/in_tree.go:1301
------------------------------
S
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount","total":-1,"completed":1,"skipped":5,"failed":0}
[BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
[BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:08:40.496: INFO: >>> kubeConfig: /root/.kube/config
... skipping 20 lines ...
May  9 18:09:05.691: INFO: PersistentVolumeClaim pvc-wkjpw found but phase is Pending instead of Bound.
May  9 18:09:07.954: INFO: PersistentVolumeClaim pvc-wkjpw found and phase=Bound (13.672328919s)
May  9 18:09:07.954: INFO: Waiting up to 3m0s for PersistentVolume local-zxtqp to have phase Bound
May  9 18:09:08.189: INFO: PersistentVolume local-zxtqp found and phase=Bound (234.799969ms)
STEP: Creating pod pod-subpath-test-preprovisionedpv-ghrn
STEP: Creating a pod to test subpath
May  9 18:09:08.895: INFO: Waiting up to 5m0s for pod "pod-subpath-test-preprovisionedpv-ghrn" in namespace "provisioning-1597" to be "Succeeded or Failed"
May  9 18:09:09.129: INFO: Pod "pod-subpath-test-preprovisionedpv-ghrn": Phase="Pending", Reason="", readiness=false. Elapsed: 234.182611ms
May  9 18:09:11.364: INFO: Pod "pod-subpath-test-preprovisionedpv-ghrn": Phase="Pending", Reason="", readiness=false. Elapsed: 2.4692842s
May  9 18:09:13.651: INFO: Pod "pod-subpath-test-preprovisionedpv-ghrn": Phase="Pending", Reason="", readiness=false. Elapsed: 4.755990251s
May  9 18:09:15.892: INFO: Pod "pod-subpath-test-preprovisionedpv-ghrn": Phase="Succeeded", Reason="", readiness=false. Elapsed: 6.997082986s
STEP: Saw pod success
May  9 18:09:15.892: INFO: Pod "pod-subpath-test-preprovisionedpv-ghrn" satisfied condition "Succeeded or Failed"
May  9 18:09:16.128: INFO: Trying to get logs from node ip-172-20-33-176.ap-south-1.compute.internal pod pod-subpath-test-preprovisionedpv-ghrn container test-container-subpath-preprovisionedpv-ghrn: <nil>
STEP: delete the pod
May  9 18:09:16.616: INFO: Waiting for pod pod-subpath-test-preprovisionedpv-ghrn to disappear
May  9 18:09:16.850: INFO: Pod pod-subpath-test-preprovisionedpv-ghrn no longer exists
STEP: Deleting pod pod-subpath-test-preprovisionedpv-ghrn
May  9 18:09:16.851: INFO: Deleting pod "pod-subpath-test-preprovisionedpv-ghrn" in namespace "provisioning-1597"
... skipping 51 lines ...
• [SLOW TEST:12.842 seconds]
[sig-auth] ServiceAccounts
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/framework.go:23
  should mount an API token into pods  [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]","total":-1,"completed":2,"skipped":5,"failed":0}

S
------------------------------
[BeforeEach] [sig-cli] Kubectl client
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 182 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:09:25.156: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
STEP: Destroying namespace "custom-resource-definition-8083" for this suite.

•
------------------------------
{"msg":"PASSED [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] should include custom resource definition resources in discovery documents [Conformance]","total":-1,"completed":3,"skipped":6,"failed":0}

SSSS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:25.649: INFO: Only supported for providers [azure] (not aws)
... skipping 81 lines ...
• [SLOW TEST:5.059 seconds]
[sig-api-machinery] API priority and fairness
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apimachinery/framework.go:23
  should ensure that requests can be classified by adding FlowSchema and PriorityLevelConfiguration
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apimachinery/flowcontrol.go:56
------------------------------
{"msg":"PASSED [sig-api-machinery] API priority and fairness should ensure that requests can be classified by adding FlowSchema and PriorityLevelConfiguration","total":-1,"completed":5,"skipped":32,"failed":0}

SSS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)] provisioning
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:26.940: INFO: Driver emptydir doesn't support DynamicPV -- skipping
... skipping 80 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Dynamic PV (default fs)] subPath
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should be able to unmount after the subpath directory is deleted [LinuxOnly]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:444
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]","total":-1,"completed":3,"skipped":20,"failed":0}

SS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (delayed binding)] topology
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:27.035: INFO: Driver local doesn't support DynamicPV -- skipping
... skipping 5 lines ...
[sig-storage] In-tree Volumes
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/framework.go:23
  [Driver: local][LocalVolumeType: dir-bindmounted]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Dynamic PV (delayed binding)] topology
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should fail to schedule a pod which has topologies that conflict with AllowedTopologies [BeforeEach]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:192

      Driver local doesn't support DynamicPV -- skipping

      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:116
------------------------------
... skipping 33 lines ...
• [SLOW TEST:14.919 seconds]
[sig-api-machinery] Watchers
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apimachinery/framework.go:23
  should observe an object deletion if it stops meeting the requirements of the selector [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-api-machinery] Watchers should observe an object deletion if it stops meeting the requirements of the selector [Conformance]","total":-1,"completed":6,"skipped":41,"failed":0}

SSS
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies","total":-1,"completed":2,"skipped":10,"failed":0}
[BeforeEach] [Testpattern: Dynamic PV (immediate binding)] topology
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
[BeforeEach] [Testpattern: Dynamic PV (immediate binding)] topology
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:09:25.956: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename topology
STEP: Waiting for a default service account to be provisioned in namespace
[It] should fail to schedule a pod which has topologies that conflict with AllowedTopologies
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:192
May  9 18:09:27.397: INFO: found topology map[topology.kubernetes.io/zone:ap-south-1a]
May  9 18:09:27.397: INFO: In-tree plugin kubernetes.io/aws-ebs is not migrated, not validating any metrics
May  9 18:09:27.397: INFO: Not enough topologies in cluster -- skipping
STEP: Deleting pvc
STEP: Deleting sc
... skipping 7 lines ...
[sig-storage] In-tree Volumes
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/framework.go:23
  [Driver: aws]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Dynamic PV (immediate binding)] topology
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should fail to schedule a pod which has topologies that conflict with AllowedTopologies [It]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:192

      Not enough topologies in cluster -- skipping

      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:199
------------------------------
... skipping 333 lines ...
• [SLOW TEST:12.036 seconds]
[sig-apps] DisruptionController
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apps/framework.go:23
  evictions: enough pods, absolute => should allow an eviction
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apps/disruption.go:267
------------------------------
{"msg":"PASSED [sig-apps] DisruptionController evictions: enough pods, absolute =\u003e should allow an eviction","total":-1,"completed":2,"skipped":15,"failed":0}

SSSS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (block volmode)] volumeMode
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:35.096: INFO: Only supported for providers [gce gke] (not aws)
... skipping 14 lines ...
      Only supported for providers [gce gke] (not aws)

      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/drivers/in_tree.go:1301
------------------------------
S
------------------------------
{"msg":"PASSED [sig-auth] ServiceAccounts should mount an API token into pods  [Conformance]","total":-1,"completed":6,"skipped":38,"failed":0}
[BeforeEach] [sig-auth] ServiceAccounts
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:09:23.271: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename svcaccounts
STEP: Waiting for a default service account to be provisioned in namespace
[It] should mount projected service account token [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating a pod to test service account token: 
May  9 18:09:24.706: INFO: Waiting up to 5m0s for pod "test-pod-c12cdfe6-1a3d-41da-b2d0-4beb1a7e8eb3" in namespace "svcaccounts-5575" to be "Succeeded or Failed"
May  9 18:09:24.945: INFO: Pod "test-pod-c12cdfe6-1a3d-41da-b2d0-4beb1a7e8eb3": Phase="Pending", Reason="", readiness=false. Elapsed: 239.656549ms
May  9 18:09:27.183: INFO: Pod "test-pod-c12cdfe6-1a3d-41da-b2d0-4beb1a7e8eb3": Phase="Pending", Reason="", readiness=false. Elapsed: 2.477907352s
May  9 18:09:29.422: INFO: Pod "test-pod-c12cdfe6-1a3d-41da-b2d0-4beb1a7e8eb3": Phase="Pending", Reason="", readiness=false. Elapsed: 4.716042114s
May  9 18:09:31.661: INFO: Pod "test-pod-c12cdfe6-1a3d-41da-b2d0-4beb1a7e8eb3": Phase="Pending", Reason="", readiness=false. Elapsed: 6.95531553s
May  9 18:09:33.900: INFO: Pod "test-pod-c12cdfe6-1a3d-41da-b2d0-4beb1a7e8eb3": Phase="Pending", Reason="", readiness=false. Elapsed: 9.194346735s
May  9 18:09:36.139: INFO: Pod "test-pod-c12cdfe6-1a3d-41da-b2d0-4beb1a7e8eb3": Phase="Succeeded", Reason="", readiness=false. Elapsed: 11.433638804s
STEP: Saw pod success
May  9 18:09:36.139: INFO: Pod "test-pod-c12cdfe6-1a3d-41da-b2d0-4beb1a7e8eb3" satisfied condition "Succeeded or Failed"
May  9 18:09:36.377: INFO: Trying to get logs from node ip-172-20-61-172.ap-south-1.compute.internal pod test-pod-c12cdfe6-1a3d-41da-b2d0-4beb1a7e8eb3 container agnhost-container: <nil>
STEP: delete the pod
May  9 18:09:36.872: INFO: Waiting for pod test-pod-c12cdfe6-1a3d-41da-b2d0-4beb1a7e8eb3 to disappear
May  9 18:09:37.110: INFO: Pod test-pod-c12cdfe6-1a3d-41da-b2d0-4beb1a7e8eb3 no longer exists
[AfterEach] [sig-auth] ServiceAccounts
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 4 lines ...
• [SLOW TEST:14.319 seconds]
[sig-auth] ServiceAccounts
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/framework.go:23
  should mount projected service account token [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-auth] ServiceAccounts should mount projected service account token [Conformance]","total":-1,"completed":7,"skipped":38,"failed":0}

S
------------------------------
[BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:37.604: INFO: Only supported for providers [openstack] (not aws)
... skipping 85 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/persistent_volumes-local.go:192
    Two pods mounting a local volume one after the other
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/persistent_volumes-local.go:254
      should be able to write from pod1 and read from pod2
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/persistent_volumes-local.go:255
------------------------------
{"msg":"PASSED [sig-storage] PersistentVolumes-local  [Volume type: tmpfs] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2","total":-1,"completed":2,"skipped":17,"failed":0}
[BeforeEach] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:38.563: INFO: Driver local doesn't support DynamicPV -- skipping
[AfterEach] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 141 lines ...
[sig-storage] In-tree Volumes
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/framework.go:23
  [Driver: local][LocalVolumeType: tmpfs]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Dynamic PV (immediate binding)] topology
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should fail to schedule a pod which has topologies that conflict with AllowedTopologies [BeforeEach]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:192

      Driver local doesn't support DynamicPV -- skipping

      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:116
------------------------------
... skipping 79 lines ...
May  9 18:09:31.688: INFO: Waiting for pod aws-client to disappear
May  9 18:09:31.923: INFO: Pod aws-client no longer exists
STEP: cleaning the environment after aws
STEP: Deleting pv and pvc
May  9 18:09:31.923: INFO: Deleting PersistentVolumeClaim "pvc-fzrdh"
May  9 18:09:32.162: INFO: Deleting PersistentVolume "aws-xdmx7"
May  9 18:09:33.529: INFO: Couldn't delete PD "aws://ap-south-1a/vol-0d6718dc0a2ead148", sleeping 5s: error deleting EBS volumes: VolumeInUse: Volume vol-0d6718dc0a2ead148 is currently attached to i-04ba9d58b3f67a658
	status code: 400, request id: 6275cdd0-bfde-45e9-a0f2-4cffa0e39dbd
May  9 18:09:39.644: INFO: Successfully deleted PD "aws://ap-south-1a/vol-0d6718dc0a2ead148".
[AfterEach] [Testpattern: Pre-provisioned PV (ext4)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:09:39.644: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
STEP: Destroying namespace "volume-7122" for this suite.
... skipping 6 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Pre-provisioned PV (ext4)] volumes
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should store data
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volumes.go:159
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data","total":-1,"completed":1,"skipped":31,"failed":0}

SSS
------------------------------
[BeforeEach] [sig-apps] StatefulSet
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 10 lines ...
STEP: Looking for a node to schedule stateful set and pod
STEP: Creating pod with conflicting port in namespace statefulset-8460
STEP: Creating statefulset with conflicting port in namespace statefulset-8460
STEP: Waiting until pod test-pod will start running in namespace statefulset-8460
STEP: Waiting until stateful pod ss-0 will be recreated and deleted at least once in namespace statefulset-8460
May  9 18:09:06.652: INFO: Observed stateful pod in namespace: statefulset-8460, name: ss-0, uid: 88af2fdc-e4e0-4944-8657-0a25b77fff0b, status phase: Pending. Waiting for statefulset controller to delete.
May  9 18:09:10.702: INFO: Observed stateful pod in namespace: statefulset-8460, name: ss-0, uid: 88af2fdc-e4e0-4944-8657-0a25b77fff0b, status phase: Failed. Waiting for statefulset controller to delete.
May  9 18:09:10.708: INFO: Observed stateful pod in namespace: statefulset-8460, name: ss-0, uid: 88af2fdc-e4e0-4944-8657-0a25b77fff0b, status phase: Failed. Waiting for statefulset controller to delete.
May  9 18:09:10.710: INFO: Observed delete event for stateful pod ss-0 in namespace statefulset-8460
STEP: Removing pod with conflicting port in namespace statefulset-8460
STEP: Waiting when stateful pod ss-0 will be recreated in namespace statefulset-8460 and will be in running state
[AfterEach] Basic StatefulSet functionality [StatefulSetBasic]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apps/statefulset.go:116
May  9 18:09:17.926: INFO: Deleting all statefulset in ns statefulset-8460
... skipping 11 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apps/framework.go:23
  Basic StatefulSet functionality [StatefulSetBasic]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apps/statefulset.go:95
    Should recreate evicted statefulset [Conformance]
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] Should recreate evicted statefulset [Conformance]","total":-1,"completed":5,"skipped":10,"failed":0}

SS
------------------------------
[BeforeEach] [sig-apps] DisruptionController
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 20 lines ...
• [SLOW TEST:13.654 seconds]
[sig-apps] DisruptionController
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apps/framework.go:23
  evictions: enough pods, replicaSet, percentage => should allow an eviction
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apps/disruption.go:267
------------------------------
{"msg":"PASSED [sig-apps] DisruptionController evictions: enough pods, replicaSet, percentage =\u003e should allow an eviction","total":-1,"completed":6,"skipped":37,"failed":0}
[BeforeEach] [Testpattern: Dynamic PV (default fs)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:40.615: INFO: Driver local doesn't support DynamicPV -- skipping
[AfterEach] [Testpattern: Dynamic PV (default fs)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 262 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/framework.go:23
  Guestbook application
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/kubectl.go:336
    should create and stop a working application  [Conformance]
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-cli] Kubectl client Guestbook application should create and stop a working application  [Conformance]","total":-1,"completed":4,"skipped":18,"failed":0}
[BeforeEach] [Testpattern: Inline-volume (ext3)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:41.290: INFO: Driver hostPathSymlink doesn't support ext3 -- skipping
[AfterEach] [Testpattern: Inline-volume (ext3)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 11 lines ...
      Driver hostPathSymlink doesn't support ext3 -- skipping

      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:121
------------------------------
SS
------------------------------
{"msg":"PASSED [sig-storage] PersistentVolumes-local  [Volume type: tmpfs] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2","total":-1,"completed":3,"skipped":17,"failed":0}
[BeforeEach] [Testpattern: Inline-volume (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
[BeforeEach] [Testpattern: Inline-volume (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:09:29.600: INFO: >>> kubeConfig: /root/.kube/config
... skipping 2 lines ...
[It] should support readOnly directory specified in the volumeMount
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:364
May  9 18:09:30.795: INFO: In-tree plugin kubernetes.io/host-path is not migrated, not validating any metrics
May  9 18:09:31.035: INFO: Creating resource for inline volume
STEP: Creating pod pod-subpath-test-inlinevolume-mzjc
STEP: Creating a pod to test subpath
May  9 18:09:31.277: INFO: Waiting up to 5m0s for pod "pod-subpath-test-inlinevolume-mzjc" in namespace "provisioning-9071" to be "Succeeded or Failed"
May  9 18:09:31.515: INFO: Pod "pod-subpath-test-inlinevolume-mzjc": Phase="Pending", Reason="", readiness=false. Elapsed: 238.231598ms
May  9 18:09:33.754: INFO: Pod "pod-subpath-test-inlinevolume-mzjc": Phase="Pending", Reason="", readiness=false. Elapsed: 2.477097546s
May  9 18:09:35.998: INFO: Pod "pod-subpath-test-inlinevolume-mzjc": Phase="Pending", Reason="", readiness=false. Elapsed: 4.721078723s
May  9 18:09:38.237: INFO: Pod "pod-subpath-test-inlinevolume-mzjc": Phase="Pending", Reason="", readiness=false. Elapsed: 6.960131248s
May  9 18:09:40.477: INFO: Pod "pod-subpath-test-inlinevolume-mzjc": Phase="Succeeded", Reason="", readiness=false. Elapsed: 9.200216017s
STEP: Saw pod success
May  9 18:09:40.477: INFO: Pod "pod-subpath-test-inlinevolume-mzjc" satisfied condition "Succeeded or Failed"
May  9 18:09:40.715: INFO: Trying to get logs from node ip-172-20-33-8.ap-south-1.compute.internal pod pod-subpath-test-inlinevolume-mzjc container test-container-subpath-inlinevolume-mzjc: <nil>
STEP: delete the pod
May  9 18:09:41.212: INFO: Waiting for pod pod-subpath-test-inlinevolume-mzjc to disappear
May  9 18:09:41.450: INFO: Pod pod-subpath-test-inlinevolume-mzjc no longer exists
STEP: Deleting pod pod-subpath-test-inlinevolume-mzjc
May  9 18:09:41.450: INFO: Deleting pod "pod-subpath-test-inlinevolume-mzjc" in namespace "provisioning-9071"
... skipping 12 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Inline-volume (default fs)] subPath
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should support readOnly directory specified in the volumeMount
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:364
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount","total":-1,"completed":4,"skipped":17,"failed":0}

SSSS
------------------------------
[BeforeEach] [sig-instrumentation] MetricsGrabber
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 11 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:09:42.231: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
STEP: Destroying namespace "metrics-grabber-9829" for this suite.

•
------------------------------
{"msg":"PASSED [sig-instrumentation] MetricsGrabber should grab all metrics from a ControllerManager.","total":-1,"completed":6,"skipped":12,"failed":0}

S
------------------------------
[BeforeEach] [sig-node] Security Context
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:09:35.106: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename security-context-test
STEP: Waiting for a default service account to be provisioned in namespace
[BeforeEach] [sig-node] Security Context
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/security_context.go:46
[It] should run the container with readonly rootfs when readOnlyRootFilesystem=true [LinuxOnly] [NodeConformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/security_context.go:217
May  9 18:09:36.529: INFO: Waiting up to 5m0s for pod "busybox-readonly-true-c2ce8b60-b03d-4b5c-92d7-6ab5dc0c45f7" in namespace "security-context-test-6699" to be "Succeeded or Failed"
May  9 18:09:36.764: INFO: Pod "busybox-readonly-true-c2ce8b60-b03d-4b5c-92d7-6ab5dc0c45f7": Phase="Pending", Reason="", readiness=false. Elapsed: 235.035464ms
May  9 18:09:39.000: INFO: Pod "busybox-readonly-true-c2ce8b60-b03d-4b5c-92d7-6ab5dc0c45f7": Phase="Pending", Reason="", readiness=false. Elapsed: 2.47077209s
May  9 18:09:41.235: INFO: Pod "busybox-readonly-true-c2ce8b60-b03d-4b5c-92d7-6ab5dc0c45f7": Phase="Pending", Reason="", readiness=false. Elapsed: 4.705852692s
May  9 18:09:43.470: INFO: Pod "busybox-readonly-true-c2ce8b60-b03d-4b5c-92d7-6ab5dc0c45f7": Phase="Failed", Reason="", readiness=false. Elapsed: 6.940947544s
May  9 18:09:43.470: INFO: Pod "busybox-readonly-true-c2ce8b60-b03d-4b5c-92d7-6ab5dc0c45f7" satisfied condition "Succeeded or Failed"
[AfterEach] [sig-node] Security Context
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:09:43.470: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
STEP: Destroying namespace "security-context-test-6699" for this suite.


... skipping 2 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/framework.go:23
  When creating a pod with readOnlyRootFilesystem
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/security_context.go:171
    should run the container with readonly rootfs when readOnlyRootFilesystem=true [LinuxOnly] [NodeConformance]
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/security_context.go:217
------------------------------
{"msg":"PASSED [sig-node] Security Context When creating a pod with readOnlyRootFilesystem should run the container with readonly rootfs when readOnlyRootFilesystem=true [LinuxOnly] [NodeConformance]","total":-1,"completed":3,"skipped":21,"failed":0}

S
------------------------------
[BeforeEach] [sig-node] Pods Extended
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 23 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/node/framework.go:23
  Delete Grace Period
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/node/pods.go:51
    should be submitted and removed
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/node/pods.go:62
------------------------------
{"msg":"PASSED [sig-node] Pods Extended Delete Grace Period should be submitted and removed","total":-1,"completed":3,"skipped":14,"failed":0}

SS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:44.216: INFO: Driver local doesn't support DynamicPV -- skipping
... skipping 71 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/framework.go:23
  Kubectl diff
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/kubectl.go:872
    should check if kubectl diff finds a difference for Deployments [Conformance]
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-cli] Kubectl client Kubectl diff should check if kubectl diff finds a difference for Deployments [Conformance]","total":-1,"completed":8,"skipped":62,"failed":0}
[BeforeEach] [Testpattern: Inline-volume (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:44.620: INFO: Driver supports dynamic provisioning, skipping InlineVolume pattern
[AfterEach] [Testpattern: Inline-volume (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 42 lines ...
• [SLOW TEST:20.619 seconds]
[sig-network] DNS
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/network/common/framework.go:23
  should resolve DNS of partial qualified names for the cluster [LinuxOnly]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/network/dns.go:90
------------------------------
{"msg":"PASSED [sig-network] DNS should resolve DNS of partial qualified names for the cluster [LinuxOnly]","total":-1,"completed":4,"skipped":12,"failed":0}

S
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:46.292: INFO: Only supported for providers [azure] (not aws)
... skipping 177 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/framework.go:23
  When pod refers to non-existent ephemeral storage
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/ephemeral_volume.go:53
    should allow deletion of pod with invalid volume : projected
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/ephemeral_volume.go:55
------------------------------
{"msg":"PASSED [sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : projected","total":-1,"completed":4,"skipped":84,"failed":0}
[BeforeEach] [Testpattern: Dynamic PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:47.937: INFO: Only supported for providers [vsphere] (not aws)
[AfterEach] [Testpattern: Dynamic PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 88 lines ...
• [SLOW TEST:18.822 seconds]
[sig-network] DNS
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/network/common/framework.go:23
  should provide /etc/hosts entries for the cluster [LinuxOnly] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-network] DNS should provide /etc/hosts entries for the cluster [LinuxOnly] [Conformance]","total":-1,"completed":3,"skipped":25,"failed":0}

SSSSS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:48.709: INFO: Driver local doesn't support DynamicPV -- skipping
... skipping 34 lines ...
STEP: Destroying namespace "apply-6342" for this suite.
[AfterEach] [sig-api-machinery] ServerSideApply
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apimachinery/apply.go:56

•
------------------------------
{"msg":"PASSED [sig-api-machinery] ServerSideApply should give up ownership of a field if forced applied by a controller","total":-1,"completed":5,"skipped":28,"failed":0}
[BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:49.894: INFO: Driver hostPath doesn't support PreprovisionedPV -- skipping
[AfterEach] [Testpattern: Pre-provisioned PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 19 lines ...
STEP: Building a namespace api object, basename projected
STEP: Waiting for a default service account to be provisioned in namespace
[It] should be consumable in multiple volumes in a pod [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating secret with name projected-secret-test-e232a319-b024-4883-a883-a2fbc1d1ab9f
STEP: Creating a pod to test consume secrets
May  9 18:09:40.270: INFO: Waiting up to 5m0s for pod "pod-projected-secrets-cba9b141-975a-4e75-87e2-ad75ca27c056" in namespace "projected-1488" to be "Succeeded or Failed"
May  9 18:09:40.513: INFO: Pod "pod-projected-secrets-cba9b141-975a-4e75-87e2-ad75ca27c056": Phase="Pending", Reason="", readiness=false. Elapsed: 243.000489ms
May  9 18:09:42.758: INFO: Pod "pod-projected-secrets-cba9b141-975a-4e75-87e2-ad75ca27c056": Phase="Pending", Reason="", readiness=false. Elapsed: 2.488080457s
May  9 18:09:44.999: INFO: Pod "pod-projected-secrets-cba9b141-975a-4e75-87e2-ad75ca27c056": Phase="Pending", Reason="", readiness=false. Elapsed: 4.728608873s
May  9 18:09:47.239: INFO: Pod "pod-projected-secrets-cba9b141-975a-4e75-87e2-ad75ca27c056": Phase="Pending", Reason="", readiness=false. Elapsed: 6.968761411s
May  9 18:09:49.480: INFO: Pod "pod-projected-secrets-cba9b141-975a-4e75-87e2-ad75ca27c056": Phase="Succeeded", Reason="", readiness=false. Elapsed: 9.209506232s
STEP: Saw pod success
May  9 18:09:49.480: INFO: Pod "pod-projected-secrets-cba9b141-975a-4e75-87e2-ad75ca27c056" satisfied condition "Succeeded or Failed"
May  9 18:09:49.722: INFO: Trying to get logs from node ip-172-20-57-119.ap-south-1.compute.internal pod pod-projected-secrets-cba9b141-975a-4e75-87e2-ad75ca27c056 container secret-volume-test: <nil>
STEP: delete the pod
May  9 18:09:50.215: INFO: Waiting for pod pod-projected-secrets-cba9b141-975a-4e75-87e2-ad75ca27c056 to disappear
May  9 18:09:50.455: INFO: Pod pod-projected-secrets-cba9b141-975a-4e75-87e2-ad75ca27c056 no longer exists
[AfterEach] [sig-storage] Projected secret
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 4 lines ...
• [SLOW TEST:12.357 seconds]
[sig-storage] Projected secret
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/framework.go:23
  should be consumable in multiple volumes in a pod [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-storage] Projected secret should be consumable in multiple volumes in a pod [NodeConformance] [Conformance]","total":-1,"completed":3,"skipped":20,"failed":0}

S
------------------------------
{"msg":"PASSED [sig-storage] PersistentVolumes-local  [Volume type: dir-bindmounted] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2","total":-1,"completed":4,"skipped":17,"failed":0}
[BeforeEach] [sig-cli] Kubectl Port forwarding
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:09:29.732: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename port-forwarding
STEP: Waiting for a default service account to be provisioned in namespace
... skipping 33 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/portforward.go:474
    that expects a client request
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/portforward.go:475
      should support a client that connects, sends NO DATA, and disconnects
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/portforward.go:476
------------------------------
{"msg":"PASSED [sig-cli] Kubectl Port forwarding With a server listening on localhost that expects a client request should support a client that connects, sends NO DATA, and disconnects","total":-1,"completed":5,"skipped":17,"failed":0}

SSSSSSSS
------------------------------
[BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:51.195: INFO: Only supported for providers [gce gke] (not aws)
... skipping 56 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:09:52.027: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
STEP: Destroying namespace "discovery-5312" for this suite.

•
------------------------------
{"msg":"PASSED [sig-api-machinery] Discovery Custom resource should have storage version hash","total":-1,"completed":4,"skipped":32,"failed":0}

S
------------------------------
[BeforeEach] [sig-storage] PV Protection
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 22 lines ...
May  9 18:09:53.025: INFO: AfterEach: Cleaning up test resources.
May  9 18:09:53.025: INFO: pvc is nil
May  9 18:09:53.025: INFO: Deleting PersistentVolume "hostpath-5gqhf"

•
------------------------------
{"msg":"PASSED [sig-storage] PV Protection Verify \"immediate\" deletion of a PV that is not bound to a PVC","total":-1,"completed":6,"skipped":29,"failed":0}
[BeforeEach] [Testpattern: Inline-volume (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:53.267: INFO: Only supported for providers [azure] (not aws)
[AfterEach] [Testpattern: Inline-volume (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 217 lines ...
May  9 18:09:43.963: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename var-expansion
STEP: Waiting for a default service account to be provisioned in namespace
[It] should allow substituting values in a volume subpath [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating a pod to test substitution in volume subpath
May  9 18:09:45.383: INFO: Waiting up to 5m0s for pod "var-expansion-8c9c46f1-a7c2-4de2-81dd-968adf3eb999" in namespace "var-expansion-6444" to be "Succeeded or Failed"
May  9 18:09:45.626: INFO: Pod "var-expansion-8c9c46f1-a7c2-4de2-81dd-968adf3eb999": Phase="Pending", Reason="", readiness=false. Elapsed: 243.454518ms
May  9 18:09:47.863: INFO: Pod "var-expansion-8c9c46f1-a7c2-4de2-81dd-968adf3eb999": Phase="Pending", Reason="", readiness=false. Elapsed: 2.479756198s
May  9 18:09:50.098: INFO: Pod "var-expansion-8c9c46f1-a7c2-4de2-81dd-968adf3eb999": Phase="Pending", Reason="", readiness=false. Elapsed: 4.714817738s
May  9 18:09:52.333: INFO: Pod "var-expansion-8c9c46f1-a7c2-4de2-81dd-968adf3eb999": Phase="Succeeded", Reason="", readiness=false. Elapsed: 6.950592748s
STEP: Saw pod success
May  9 18:09:52.333: INFO: Pod "var-expansion-8c9c46f1-a7c2-4de2-81dd-968adf3eb999" satisfied condition "Succeeded or Failed"
May  9 18:09:52.569: INFO: Trying to get logs from node ip-172-20-33-176.ap-south-1.compute.internal pod var-expansion-8c9c46f1-a7c2-4de2-81dd-968adf3eb999 container dapi-container: <nil>
STEP: delete the pod
May  9 18:09:53.048: INFO: Waiting for pod var-expansion-8c9c46f1-a7c2-4de2-81dd-968adf3eb999 to disappear
May  9 18:09:53.284: INFO: Pod var-expansion-8c9c46f1-a7c2-4de2-81dd-968adf3eb999 no longer exists
[AfterEach] [sig-node] Variable Expansion
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 53 lines ...
STEP: verifying service-disabled is not up
May  9 18:09:04.786: INFO: Creating new host exec pod
May  9 18:09:05.276: INFO: The status of Pod verify-service-down-host-exec-pod is Pending, waiting for it to be Running (with Ready = true)
May  9 18:09:07.520: INFO: The status of Pod verify-service-down-host-exec-pod is Pending, waiting for it to be Running (with Ready = true)
May  9 18:09:09.520: INFO: The status of Pod verify-service-down-host-exec-pod is Pending, waiting for it to be Running (with Ready = true)
May  9 18:09:11.521: INFO: The status of Pod verify-service-down-host-exec-pod is Running (Ready = true)
May  9 18:09:11.521: INFO: Running '/tmp/kubectl3539518766/kubectl --server=https://api.e2e-394a1565f9-8b358.test-cncf-aws.k8s.io --kubeconfig=/root/.kube/config --namespace=services-5526 exec verify-service-down-host-exec-pod -- /bin/sh -x -c curl -g -s --connect-timeout 2 http://100.69.104.133:80 && echo service-down-failed'
May  9 18:09:15.901: INFO: rc: 28
May  9 18:09:15.901: INFO: error while kubectl execing "curl -g -s --connect-timeout 2 http://100.69.104.133:80 && echo service-down-failed" in pod services-5526/verify-service-down-host-exec-pod: error running /tmp/kubectl3539518766/kubectl --server=https://api.e2e-394a1565f9-8b358.test-cncf-aws.k8s.io --kubeconfig=/root/.kube/config --namespace=services-5526 exec verify-service-down-host-exec-pod -- /bin/sh -x -c curl -g -s --connect-timeout 2 http://100.69.104.133:80 && echo service-down-failed:
Command stdout:

stderr:
+ curl -g -s --connect-timeout 2 http://100.69.104.133:80
command terminated with exit code 28

error:
exit status 28
Output: 
STEP: Deleting pod verify-service-down-host-exec-pod in namespace services-5526
STEP: adding service-proxy-name label
STEP: verifying service is not up
May  9 18:09:16.646: INFO: Creating new host exec pod
May  9 18:09:17.134: INFO: The status of Pod verify-service-down-host-exec-pod is Pending, waiting for it to be Running (with Ready = true)
May  9 18:09:19.378: INFO: The status of Pod verify-service-down-host-exec-pod is Running (Ready = true)
May  9 18:09:19.378: INFO: Running '/tmp/kubectl3539518766/kubectl --server=https://api.e2e-394a1565f9-8b358.test-cncf-aws.k8s.io --kubeconfig=/root/.kube/config --namespace=services-5526 exec verify-service-down-host-exec-pod -- /bin/sh -x -c curl -g -s --connect-timeout 2 http://100.65.139.127:80 && echo service-down-failed'
May  9 18:09:23.698: INFO: rc: 28
May  9 18:09:23.698: INFO: error while kubectl execing "curl -g -s --connect-timeout 2 http://100.65.139.127:80 && echo service-down-failed" in pod services-5526/verify-service-down-host-exec-pod: error running /tmp/kubectl3539518766/kubectl --server=https://api.e2e-394a1565f9-8b358.test-cncf-aws.k8s.io --kubeconfig=/root/.kube/config --namespace=services-5526 exec verify-service-down-host-exec-pod -- /bin/sh -x -c curl -g -s --connect-timeout 2 http://100.65.139.127:80 && echo service-down-failed:
Command stdout:

stderr:
+ curl -g -s --connect-timeout 2 http://100.65.139.127:80
command terminated with exit code 28

error:
exit status 28
Output: 
STEP: Deleting pod verify-service-down-host-exec-pod in namespace services-5526
STEP: removing service-proxy-name annotation
STEP: verifying service is up
May  9 18:09:24.436: INFO: Creating new host exec pod
... skipping 15 lines ...
May  9 18:09:42.031: INFO: Creating new host exec pod
May  9 18:09:42.520: INFO: The status of Pod verify-service-down-host-exec-pod is Pending, waiting for it to be Running (with Ready = true)
May  9 18:09:44.764: INFO: The status of Pod verify-service-down-host-exec-pod is Pending, waiting for it to be Running (with Ready = true)
May  9 18:09:46.764: INFO: The status of Pod verify-service-down-host-exec-pod is Pending, waiting for it to be Running (with Ready = true)
May  9 18:09:48.764: INFO: The status of Pod verify-service-down-host-exec-pod is Pending, waiting for it to be Running (with Ready = true)
May  9 18:09:50.763: INFO: The status of Pod verify-service-down-host-exec-pod is Running (Ready = true)
May  9 18:09:50.764: INFO: Running '/tmp/kubectl3539518766/kubectl --server=https://api.e2e-394a1565f9-8b358.test-cncf-aws.k8s.io --kubeconfig=/root/.kube/config --namespace=services-5526 exec verify-service-down-host-exec-pod -- /bin/sh -x -c curl -g -s --connect-timeout 2 http://100.69.104.133:80 && echo service-down-failed'
May  9 18:09:55.084: INFO: rc: 28
May  9 18:09:55.084: INFO: error while kubectl execing "curl -g -s --connect-timeout 2 http://100.69.104.133:80 && echo service-down-failed" in pod services-5526/verify-service-down-host-exec-pod: error running /tmp/kubectl3539518766/kubectl --server=https://api.e2e-394a1565f9-8b358.test-cncf-aws.k8s.io --kubeconfig=/root/.kube/config --namespace=services-5526 exec verify-service-down-host-exec-pod -- /bin/sh -x -c curl -g -s --connect-timeout 2 http://100.69.104.133:80 && echo service-down-failed:
Command stdout:

stderr:
+ curl -g -s --connect-timeout 2 http://100.69.104.133:80
command terminated with exit code 28

error:
exit status 28
Output: 
STEP: Deleting pod verify-service-down-host-exec-pod in namespace services-5526
[AfterEach] [sig-network] Services
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:09:55.334: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
... skipping 29 lines ...
• [SLOW TEST:14.118 seconds]
[sig-node] InitContainer [NodeConformance]
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/framework.go:23
  should invoke init containers on a RestartNever pod [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-node] InitContainer [NodeConformance] should invoke init containers on a RestartNever pod [Conformance]","total":-1,"completed":7,"skipped":13,"failed":0}
[BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:56.845: INFO: Only supported for providers [gce gke] (not aws)
[AfterEach] [Testpattern: Pre-provisioned PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 40 lines ...
STEP: Destroying namespace "services-4481" for this suite.
[AfterEach] [sig-network] Services
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/network/service.go:750

•
------------------------------
{"msg":"PASSED [sig-network] Services should test the lifecycle of an Endpoint [Conformance]","total":-1,"completed":5,"skipped":33,"failed":0}

SS
------------------------------
[BeforeEach] [Testpattern: Inline-volume (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:57.420: INFO: Driver local doesn't support InlineVolume -- skipping
... skipping 117 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Pre-provisioned PV (default fs)] volumes
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should store data
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volumes.go:159
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data","total":-1,"completed":3,"skipped":7,"failed":0}

S
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:09:57.452: INFO: Driver emptydir doesn't support DynamicPV -- skipping
... skipping 12 lines ...
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:219

      Driver emptydir doesn't support DynamicPV -- skipping

      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:116
------------------------------
{"msg":"PASSED [sig-network] Services should prevent NodePort collisions","total":-1,"completed":7,"skipped":44,"failed":0}
[BeforeEach] [sig-storage] PersistentVolumes-local 
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:09:30.890: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename persistent-local-volumes-test
STEP: Waiting for a default service account to be provisioned in namespace
... skipping 54 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/persistent_volumes-local.go:192
    One pod requesting one prebound PVC
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/persistent_volumes-local.go:209
      should be able to mount volume and write from pod1
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/persistent_volumes-local.go:238
------------------------------
{"msg":"PASSED [sig-network] Services should implement service.kubernetes.io/service-proxy-name","total":-1,"completed":3,"skipped":12,"failed":0}
[BeforeEach] [sig-api-machinery] ServerSideApply
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:09:55.833: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename apply
STEP: Waiting for a default service account to be provisioned in namespace
... skipping 118 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/framework.go:23
  CSI Volume expansion
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/csi_mock_volume.go:561
    should expand volume without restarting pod if nodeExpansion=off
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/csi_mock_volume.go:590
------------------------------
{"msg":"PASSED [sig-storage] CSI mock volume CSI Volume expansion should expand volume without restarting pod if nodeExpansion=off","total":-1,"completed":4,"skipped":20,"failed":0}

SS
------------------------------
[BeforeEach] [sig-api-machinery] ResourceQuota
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 25 lines ...
• [SLOW TEST:21.098 seconds]
[sig-api-machinery] ResourceQuota
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apimachinery/framework.go:23
  should verify ResourceQuota with best effort scope. [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-api-machinery] ResourceQuota should verify ResourceQuota with best effort scope. [Conformance]","total":-1,"completed":5,"skipped":21,"failed":0}

SS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:10:03.557: INFO: Only supported for providers [gce gke] (not aws)
... skipping 28 lines ...
[sig-storage] In-tree Volumes
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/framework.go:23
  [Driver: local][LocalVolumeType: blockfs]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Dynamic PV (immediate binding)] topology
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should fail to schedule a pod which has topologies that conflict with AllowedTopologies [BeforeEach]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:192

      Driver local doesn't support DynamicPV -- skipping

      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:116
------------------------------
... skipping 38 lines ...
      Only supported for providers [vsphere] (not aws)

      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/drivers/in_tree.go:1437
------------------------------
SSSSS
------------------------------
{"msg":"PASSED [sig-storage] PersistentVolumes-local  [Volume type: dir-bindmounted] One pod requesting one prebound PVC should be able to mount volume and write from pod1","total":-1,"completed":8,"skipped":44,"failed":0}
[BeforeEach] [sig-cli] Kubectl client
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:09:59.341: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename kubectl
STEP: Waiting for a default service account to be provisioned in namespace
... skipping 21 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/framework.go:23
  Kubectl apply
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/kubectl.go:793
    should apply a new configuration to an existing RC
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/kubectl.go:794
------------------------------
{"msg":"PASSED [sig-cli] Kubectl client Kubectl apply should apply a new configuration to an existing RC","total":-1,"completed":9,"skipped":44,"failed":0}

SSSS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:10:04.893: INFO: Only supported for providers [openstack] (not aws)
... skipping 116 lines ...
STEP: Building a namespace api object, basename configmap
STEP: Waiting for a default service account to be provisioned in namespace
[It] should be consumable via the environment [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating configMap configmap-8398/configmap-test-9adebc7d-dd66-48a5-b938-c45f47445d66
STEP: Creating a pod to test consume configMaps
May  9 18:09:58.540: INFO: Waiting up to 5m0s for pod "pod-configmaps-3082c776-37d1-4378-8c18-9718c7058d81" in namespace "configmap-8398" to be "Succeeded or Failed"
May  9 18:09:58.777: INFO: Pod "pod-configmaps-3082c776-37d1-4378-8c18-9718c7058d81": Phase="Pending", Reason="", readiness=false. Elapsed: 236.602408ms
May  9 18:10:01.021: INFO: Pod "pod-configmaps-3082c776-37d1-4378-8c18-9718c7058d81": Phase="Pending", Reason="", readiness=false. Elapsed: 2.480403325s
May  9 18:10:03.258: INFO: Pod "pod-configmaps-3082c776-37d1-4378-8c18-9718c7058d81": Phase="Pending", Reason="", readiness=false. Elapsed: 4.717653158s
May  9 18:10:05.497: INFO: Pod "pod-configmaps-3082c776-37d1-4378-8c18-9718c7058d81": Phase="Succeeded", Reason="", readiness=false. Elapsed: 6.956816482s
STEP: Saw pod success
May  9 18:10:05.497: INFO: Pod "pod-configmaps-3082c776-37d1-4378-8c18-9718c7058d81" satisfied condition "Succeeded or Failed"
May  9 18:10:05.733: INFO: Trying to get logs from node ip-172-20-57-119.ap-south-1.compute.internal pod pod-configmaps-3082c776-37d1-4378-8c18-9718c7058d81 container env-test: <nil>
STEP: delete the pod
May  9 18:10:06.214: INFO: Waiting for pod pod-configmaps-3082c776-37d1-4378-8c18-9718c7058d81 to disappear
May  9 18:10:06.449: INFO: Pod pod-configmaps-3082c776-37d1-4378-8c18-9718c7058d81 no longer exists
[AfterEach] [sig-node] ConfigMap
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 4 lines ...
• [SLOW TEST:10.053 seconds]
[sig-node] ConfigMap
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/framework.go:23
  should be consumable via the environment [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-node] ConfigMap should be consumable via the environment [NodeConformance] [Conformance]","total":-1,"completed":8,"skipped":20,"failed":0}

SS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:10:06.941: INFO: Only supported for providers [gce gke] (not aws)
... skipping 88 lines ...
• [SLOW TEST:73.778 seconds]
[sig-node] Probing container
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/framework.go:23
  should be restarted startup probe fails
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/container_probe.go:293
------------------------------
{"msg":"PASSED [sig-node] Probing container should be restarted startup probe fails","total":-1,"completed":3,"skipped":4,"failed":0}

SSSSS
------------------------------
{"msg":"PASSED [sig-api-machinery] ServerSideApply should ignore conflict errors if force apply is used","total":-1,"completed":4,"skipped":12,"failed":0}
[BeforeEach] [sig-node] Security Context
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:09:59.521: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename security-context-test
STEP: Waiting for a default service account to be provisioned in namespace
[BeforeEach] [sig-node] Security Context
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/security_context.go:46
[It] should run the container with uid 65534 [LinuxOnly] [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
May  9 18:10:00.991: INFO: Waiting up to 5m0s for pod "busybox-user-65534-947250d8-1cb1-497e-a747-51e5e95b52af" in namespace "security-context-test-2404" to be "Succeeded or Failed"
May  9 18:10:01.235: INFO: Pod "busybox-user-65534-947250d8-1cb1-497e-a747-51e5e95b52af": Phase="Pending", Reason="", readiness=false. Elapsed: 243.816078ms
May  9 18:10:03.480: INFO: Pod "busybox-user-65534-947250d8-1cb1-497e-a747-51e5e95b52af": Phase="Pending", Reason="", readiness=false. Elapsed: 2.488587808s
May  9 18:10:05.723: INFO: Pod "busybox-user-65534-947250d8-1cb1-497e-a747-51e5e95b52af": Phase="Pending", Reason="", readiness=false. Elapsed: 4.732436011s
May  9 18:10:07.968: INFO: Pod "busybox-user-65534-947250d8-1cb1-497e-a747-51e5e95b52af": Phase="Succeeded", Reason="", readiness=false. Elapsed: 6.977450345s
May  9 18:10:07.969: INFO: Pod "busybox-user-65534-947250d8-1cb1-497e-a747-51e5e95b52af" satisfied condition "Succeeded or Failed"
[AfterEach] [sig-node] Security Context
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:10:07.969: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
STEP: Destroying namespace "security-context-test-2404" for this suite.


... skipping 2 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/framework.go:23
  When creating a container with runAsUser
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/security_context.go:50
    should run the container with uid 65534 [LinuxOnly] [NodeConformance] [Conformance]
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-node] Security Context When creating a container with runAsUser should run the container with uid 65534 [LinuxOnly] [NodeConformance] [Conformance]","total":-1,"completed":5,"skipped":12,"failed":0}

SS
------------------------------
[BeforeEach] [Testpattern: Inline-volume (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:10:08.479: INFO: Driver supports dynamic provisioning, skipping InlineVolume pattern
... skipping 101 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apps/framework.go:23
  Listing PodDisruptionBudgets for all namespaces
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apps/disruption.go:75
    should list and delete a collection of PodDisruptionBudgets [Conformance]
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-apps] DisruptionController Listing PodDisruptionBudgets for all namespaces should list and delete a collection of PodDisruptionBudgets [Conformance]","total":-1,"completed":6,"skipped":37,"failed":0}

S
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
[BeforeEach] [Testpattern: Dynamic PV (default fs)] volumes
... skipping 14 lines ...
STEP: creating a claim
May  9 18:09:54.492: INFO: Warning: Making PVC: VolumeMode specified as invalid empty string, treating as nil
May  9 18:09:54.728: INFO: Waiting up to timeout=5m0s for PersistentVolumeClaims [nfsdqkbx] to have phase Bound
May  9 18:09:54.962: INFO: PersistentVolumeClaim nfsdqkbx found and phase=Bound (234.639232ms)
STEP: Creating pod exec-volume-test-dynamicpv-qqhf
STEP: Creating a pod to test exec-volume-test
May  9 18:09:55.669: INFO: Waiting up to 5m0s for pod "exec-volume-test-dynamicpv-qqhf" in namespace "volume-1387" to be "Succeeded or Failed"
May  9 18:09:55.905: INFO: Pod "exec-volume-test-dynamicpv-qqhf": Phase="Pending", Reason="", readiness=false. Elapsed: 235.842821ms
May  9 18:09:58.142: INFO: Pod "exec-volume-test-dynamicpv-qqhf": Phase="Pending", Reason="", readiness=false. Elapsed: 2.47247356s
May  9 18:10:00.379: INFO: Pod "exec-volume-test-dynamicpv-qqhf": Phase="Pending", Reason="", readiness=false. Elapsed: 4.709438994s
May  9 18:10:02.617: INFO: Pod "exec-volume-test-dynamicpv-qqhf": Phase="Succeeded", Reason="", readiness=false. Elapsed: 6.947469718s
STEP: Saw pod success
May  9 18:10:02.617: INFO: Pod "exec-volume-test-dynamicpv-qqhf" satisfied condition "Succeeded or Failed"
May  9 18:10:02.853: INFO: Trying to get logs from node ip-172-20-61-172.ap-south-1.compute.internal pod exec-volume-test-dynamicpv-qqhf container exec-container-dynamicpv-qqhf: <nil>
STEP: delete the pod
May  9 18:10:03.333: INFO: Waiting for pod exec-volume-test-dynamicpv-qqhf to disappear
May  9 18:10:03.568: INFO: Pod exec-volume-test-dynamicpv-qqhf no longer exists
STEP: Deleting pod exec-volume-test-dynamicpv-qqhf
May  9 18:10:03.568: INFO: Deleting pod "exec-volume-test-dynamicpv-qqhf" in namespace "volume-1387"
... skipping 17 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Dynamic PV (default fs)] volumes
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should allow exec of files on the volume
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volumes.go:196
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume","total":-1,"completed":4,"skipped":26,"failed":0}

SSSSSSSSSSSSSSSSSSS
------------------------------
[BeforeEach] version v1
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 354 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/network/common/framework.go:23
  version v1
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/network/proxy.go:74
    should proxy through a service and a pod  [Conformance]
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-network] Proxy version v1 should proxy through a service and a pod  [Conformance]","total":-1,"completed":7,"skipped":42,"failed":0}
[BeforeEach] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:10:12.353: INFO: Driver hostPath doesn't support DynamicPV -- skipping
[AfterEach] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 11 lines ...
      Driver hostPath doesn't support DynamicPV -- skipping

      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:116
------------------------------
SS
------------------------------
{"msg":"PASSED [sig-node] Variable Expansion should allow substituting values in a volume subpath [Conformance]","total":-1,"completed":4,"skipped":22,"failed":0}
[BeforeEach] [sig-node] Pods
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:09:53.780: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename pods
STEP: Waiting for a default service account to be provisioned in namespace
... skipping 2 lines ...
[It] should contain environment variables for services [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
May  9 18:09:55.445: INFO: The status of Pod server-envvars-37367032-6a4f-45f2-8d92-d75e2007cbdb is Pending, waiting for it to be Running (with Ready = true)
May  9 18:09:57.682: INFO: The status of Pod server-envvars-37367032-6a4f-45f2-8d92-d75e2007cbdb is Pending, waiting for it to be Running (with Ready = true)
May  9 18:09:59.690: INFO: The status of Pod server-envvars-37367032-6a4f-45f2-8d92-d75e2007cbdb is Pending, waiting for it to be Running (with Ready = true)
May  9 18:10:01.686: INFO: The status of Pod server-envvars-37367032-6a4f-45f2-8d92-d75e2007cbdb is Running (Ready = true)
May  9 18:10:02.398: INFO: Waiting up to 5m0s for pod "client-envvars-4c941e33-b17b-4924-9719-a09aa5d792be" in namespace "pods-536" to be "Succeeded or Failed"
May  9 18:10:02.634: INFO: Pod "client-envvars-4c941e33-b17b-4924-9719-a09aa5d792be": Phase="Pending", Reason="", readiness=false. Elapsed: 235.324134ms
May  9 18:10:04.869: INFO: Pod "client-envvars-4c941e33-b17b-4924-9719-a09aa5d792be": Phase="Pending", Reason="", readiness=false. Elapsed: 2.470562635s
May  9 18:10:07.105: INFO: Pod "client-envvars-4c941e33-b17b-4924-9719-a09aa5d792be": Phase="Pending", Reason="", readiness=false. Elapsed: 4.706939263s
May  9 18:10:09.340: INFO: Pod "client-envvars-4c941e33-b17b-4924-9719-a09aa5d792be": Phase="Pending", Reason="", readiness=false. Elapsed: 6.942177513s
May  9 18:10:11.576: INFO: Pod "client-envvars-4c941e33-b17b-4924-9719-a09aa5d792be": Phase="Pending", Reason="", readiness=false. Elapsed: 9.178129827s
May  9 18:10:13.814: INFO: Pod "client-envvars-4c941e33-b17b-4924-9719-a09aa5d792be": Phase="Succeeded", Reason="", readiness=false. Elapsed: 11.415465891s
STEP: Saw pod success
May  9 18:10:13.814: INFO: Pod "client-envvars-4c941e33-b17b-4924-9719-a09aa5d792be" satisfied condition "Succeeded or Failed"
May  9 18:10:14.050: INFO: Trying to get logs from node ip-172-20-61-172.ap-south-1.compute.internal pod client-envvars-4c941e33-b17b-4924-9719-a09aa5d792be container env3cont: <nil>
STEP: delete the pod
May  9 18:10:14.530: INFO: Waiting for pod client-envvars-4c941e33-b17b-4924-9719-a09aa5d792be to disappear
May  9 18:10:14.766: INFO: Pod client-envvars-4c941e33-b17b-4924-9719-a09aa5d792be no longer exists
[AfterEach] [sig-node] Pods
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 32 lines ...
• [SLOW TEST:65.826 seconds]
[sig-node] Probing container
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/framework.go:23
  should be restarted by liveness probe after startup probe enables it
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/container_probe.go:351
------------------------------
{"msg":"PASSED [sig-node] Probing container should be restarted by liveness probe after startup probe enables it","total":-1,"completed":5,"skipped":51,"failed":0}

S
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (block volmode)] volumeMode
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:10:15.708: INFO: Only supported for providers [vsphere] (not aws)
... skipping 68 lines ...
STEP: Building a namespace api object, basename configmap
STEP: Waiting for a default service account to be provisioned in namespace
[It] should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating configMap with name configmap-test-volume-87c111e1-3179-4f54-8912-065244b61d94
STEP: Creating a pod to test consume configMaps
May  9 18:10:14.048: INFO: Waiting up to 5m0s for pod "pod-configmaps-214c396d-70c3-4ff9-b583-754316515a4d" in namespace "configmap-9537" to be "Succeeded or Failed"
May  9 18:10:14.289: INFO: Pod "pod-configmaps-214c396d-70c3-4ff9-b583-754316515a4d": Phase="Pending", Reason="", readiness=false. Elapsed: 240.906619ms
May  9 18:10:16.530: INFO: Pod "pod-configmaps-214c396d-70c3-4ff9-b583-754316515a4d": Phase="Succeeded", Reason="", readiness=false. Elapsed: 2.481633308s
STEP: Saw pod success
May  9 18:10:16.530: INFO: Pod "pod-configmaps-214c396d-70c3-4ff9-b583-754316515a4d" satisfied condition "Succeeded or Failed"
May  9 18:10:16.772: INFO: Trying to get logs from node ip-172-20-57-119.ap-south-1.compute.internal pod pod-configmaps-214c396d-70c3-4ff9-b583-754316515a4d container configmap-volume-test: <nil>
STEP: delete the pod
May  9 18:10:17.268: INFO: Waiting for pod pod-configmaps-214c396d-70c3-4ff9-b583-754316515a4d to disappear
May  9 18:10:17.508: INFO: Pod pod-configmaps-214c396d-70c3-4ff9-b583-754316515a4d no longer exists
[AfterEach] [sig-storage] ConfigMap
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 15 lines ...
May  9 18:09:51.216: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename provisioning
STEP: Waiting for a default service account to be provisioned in namespace
[It] should support readOnly file specified in the volumeMount [LinuxOnly]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:379
May  9 18:09:52.440: INFO: In-tree plugin kubernetes.io/host-path is not migrated, not validating any metrics
May  9 18:09:52.927: INFO: Waiting up to 5m0s for pod "hostpath-symlink-prep-provisioning-2763" in namespace "provisioning-2763" to be "Succeeded or Failed"
May  9 18:09:53.167: INFO: Pod "hostpath-symlink-prep-provisioning-2763": Phase="Pending", Reason="", readiness=false. Elapsed: 240.003311ms
May  9 18:09:55.409: INFO: Pod "hostpath-symlink-prep-provisioning-2763": Phase="Pending", Reason="", readiness=false. Elapsed: 2.481451993s
May  9 18:09:57.656: INFO: Pod "hostpath-symlink-prep-provisioning-2763": Phase="Pending", Reason="", readiness=false. Elapsed: 4.728564628s
May  9 18:09:59.897: INFO: Pod "hostpath-symlink-prep-provisioning-2763": Phase="Pending", Reason="", readiness=false. Elapsed: 6.969492082s
May  9 18:10:02.137: INFO: Pod "hostpath-symlink-prep-provisioning-2763": Phase="Succeeded", Reason="", readiness=false. Elapsed: 9.209810207s
STEP: Saw pod success
May  9 18:10:02.137: INFO: Pod "hostpath-symlink-prep-provisioning-2763" satisfied condition "Succeeded or Failed"
May  9 18:10:02.137: INFO: Deleting pod "hostpath-symlink-prep-provisioning-2763" in namespace "provisioning-2763"
May  9 18:10:02.381: INFO: Wait up to 5m0s for pod "hostpath-symlink-prep-provisioning-2763" to be fully deleted
May  9 18:10:02.623: INFO: Creating resource for inline volume
STEP: Creating pod pod-subpath-test-inlinevolume-lqzp
STEP: Creating a pod to test subpath
May  9 18:10:02.871: INFO: Waiting up to 5m0s for pod "pod-subpath-test-inlinevolume-lqzp" in namespace "provisioning-2763" to be "Succeeded or Failed"
May  9 18:10:03.113: INFO: Pod "pod-subpath-test-inlinevolume-lqzp": Phase="Pending", Reason="", readiness=false. Elapsed: 241.730973ms
May  9 18:10:05.357: INFO: Pod "pod-subpath-test-inlinevolume-lqzp": Phase="Pending", Reason="", readiness=false. Elapsed: 2.485816222s
May  9 18:10:07.600: INFO: Pod "pod-subpath-test-inlinevolume-lqzp": Phase="Pending", Reason="", readiness=false. Elapsed: 4.729456911s
May  9 18:10:09.841: INFO: Pod "pod-subpath-test-inlinevolume-lqzp": Phase="Succeeded", Reason="", readiness=false. Elapsed: 6.969860678s
STEP: Saw pod success
May  9 18:10:09.841: INFO: Pod "pod-subpath-test-inlinevolume-lqzp" satisfied condition "Succeeded or Failed"
May  9 18:10:10.081: INFO: Trying to get logs from node ip-172-20-33-8.ap-south-1.compute.internal pod pod-subpath-test-inlinevolume-lqzp container test-container-subpath-inlinevolume-lqzp: <nil>
STEP: delete the pod
May  9 18:10:10.576: INFO: Waiting for pod pod-subpath-test-inlinevolume-lqzp to disappear
May  9 18:10:10.816: INFO: Pod pod-subpath-test-inlinevolume-lqzp no longer exists
STEP: Deleting pod pod-subpath-test-inlinevolume-lqzp
May  9 18:10:10.816: INFO: Deleting pod "pod-subpath-test-inlinevolume-lqzp" in namespace "provisioning-2763"
STEP: Deleting pod
May  9 18:10:11.056: INFO: Deleting pod "pod-subpath-test-inlinevolume-lqzp" in namespace "provisioning-2763"
May  9 18:10:11.536: INFO: Waiting up to 5m0s for pod "hostpath-symlink-prep-provisioning-2763" in namespace "provisioning-2763" to be "Succeeded or Failed"
May  9 18:10:11.796: INFO: Pod "hostpath-symlink-prep-provisioning-2763": Phase="Pending", Reason="", readiness=false. Elapsed: 259.789016ms
May  9 18:10:14.037: INFO: Pod "hostpath-symlink-prep-provisioning-2763": Phase="Pending", Reason="", readiness=false. Elapsed: 2.500433762s
May  9 18:10:16.277: INFO: Pod "hostpath-symlink-prep-provisioning-2763": Phase="Pending", Reason="", readiness=false. Elapsed: 4.740779954s
May  9 18:10:18.517: INFO: Pod "hostpath-symlink-prep-provisioning-2763": Phase="Succeeded", Reason="", readiness=false. Elapsed: 6.981113667s
STEP: Saw pod success
May  9 18:10:18.518: INFO: Pod "hostpath-symlink-prep-provisioning-2763" satisfied condition "Succeeded or Failed"
May  9 18:10:18.518: INFO: Deleting pod "hostpath-symlink-prep-provisioning-2763" in namespace "provisioning-2763"
May  9 18:10:18.763: INFO: Wait up to 5m0s for pod "hostpath-symlink-prep-provisioning-2763" to be fully deleted
[AfterEach] [Testpattern: Inline-volume (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:10:19.004: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
STEP: Destroying namespace "provisioning-2763" for this suite.
... skipping 6 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Inline-volume (default fs)] subPath
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should support readOnly file specified in the volumeMount [LinuxOnly]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:379
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]","total":-1,"completed":6,"skipped":29,"failed":0}

SSSSSSS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:10:19.518: INFO: Only supported for providers [gce gke] (not aws)
... skipping 35 lines ...
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/provisioning.go:179

      Only supported for providers [gce gke] (not aws)

      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/drivers/in_tree.go:1301
------------------------------
{"msg":"PASSED [sig-node] Pods should contain environment variables for services [NodeConformance] [Conformance]","total":-1,"completed":5,"skipped":22,"failed":0}
[BeforeEach] [sig-apps] DisruptionController
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:10:15.247: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename disruption
STEP: Waiting for a default service account to be provisioned in namespace
... skipping 7 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:10:19.615: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
STEP: Destroying namespace "disruption-3857" for this suite.

•
------------------------------
{"msg":"PASSED [sig-apps] DisruptionController evictions: no PDB =\u003e should allow an eviction","total":-1,"completed":6,"skipped":22,"failed":0}

SSS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (ext3)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:10:20.106: INFO: Only supported for node OS distro [gci ubuntu custom] (not debian)
... skipping 64 lines ...
May  9 18:10:05.751: INFO: PersistentVolumeClaim pvc-hwl7k found but phase is Pending instead of Bound.
May  9 18:10:07.990: INFO: PersistentVolumeClaim pvc-hwl7k found and phase=Bound (9.196532086s)
May  9 18:10:07.990: INFO: Waiting up to 3m0s for PersistentVolume local-zpzrx to have phase Bound
May  9 18:10:08.228: INFO: PersistentVolume local-zpzrx found and phase=Bound (237.908592ms)
STEP: Creating pod pod-subpath-test-preprovisionedpv-mz2c
STEP: Creating a pod to test subpath
May  9 18:10:09.017: INFO: Waiting up to 5m0s for pod "pod-subpath-test-preprovisionedpv-mz2c" in namespace "provisioning-4263" to be "Succeeded or Failed"
May  9 18:10:09.258: INFO: Pod "pod-subpath-test-preprovisionedpv-mz2c": Phase="Pending", Reason="", readiness=false. Elapsed: 241.069073ms
May  9 18:10:11.500: INFO: Pod "pod-subpath-test-preprovisionedpv-mz2c": Phase="Pending", Reason="", readiness=false. Elapsed: 2.482699653s
May  9 18:10:13.739: INFO: Pod "pod-subpath-test-preprovisionedpv-mz2c": Phase="Pending", Reason="", readiness=false. Elapsed: 4.721442512s
May  9 18:10:15.977: INFO: Pod "pod-subpath-test-preprovisionedpv-mz2c": Phase="Succeeded", Reason="", readiness=false. Elapsed: 6.960276514s
STEP: Saw pod success
May  9 18:10:15.977: INFO: Pod "pod-subpath-test-preprovisionedpv-mz2c" satisfied condition "Succeeded or Failed"
May  9 18:10:16.216: INFO: Trying to get logs from node ip-172-20-33-8.ap-south-1.compute.internal pod pod-subpath-test-preprovisionedpv-mz2c container test-container-subpath-preprovisionedpv-mz2c: <nil>
STEP: delete the pod
May  9 18:10:16.709: INFO: Waiting for pod pod-subpath-test-preprovisionedpv-mz2c to disappear
May  9 18:10:16.947: INFO: Pod pod-subpath-test-preprovisionedpv-mz2c no longer exists
STEP: Deleting pod pod-subpath-test-preprovisionedpv-mz2c
May  9 18:10:16.947: INFO: Deleting pod "pod-subpath-test-preprovisionedpv-mz2c" in namespace "provisioning-4263"
... skipping 19 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Pre-provisioned PV (default fs)] subPath
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should support readOnly file specified in the volumeMount [LinuxOnly]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:379
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]","total":-1,"completed":9,"skipped":65,"failed":0}

SS
------------------------------
[BeforeEach] [sig-node] PreStop
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 19 lines ...
• [SLOW TEST:33.362 seconds]
[sig-node] PreStop
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/node/framework.go:23
  graceful pod terminated should wait until preStop hook completes the process
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/node/pre_stop.go:170
------------------------------
{"msg":"PASSED [sig-node] PreStop graceful pod terminated should wait until preStop hook completes the process","total":-1,"completed":5,"skipped":91,"failed":0}
[BeforeEach] [Testpattern: Dynamic PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:10:21.338: INFO: Driver local doesn't support DynamicPV -- skipping
[AfterEach] [Testpattern: Dynamic PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 38 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/runtime.go:41
    when running a container with a new image
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/runtime.go:266
      should not be able to pull image from invalid registry [NodeConformance]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/runtime.go:377
------------------------------
{"msg":"PASSED [sig-node] Container Runtime blackbox test when running a container with a new image should not be able to pull image from invalid registry [NodeConformance]","total":-1,"completed":5,"skipped":22,"failed":0}
[BeforeEach] [Testpattern: Pre-provisioned PV (ext3)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:10:22.603: INFO: Driver local doesn't support ext3 -- skipping
[AfterEach] [Testpattern: Pre-provisioned PV (ext3)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 191 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/csi_volumes.go:40
    [Testpattern: Dynamic PV (default fs)] provisioning
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should provision storage with pvc data source
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/provisioning.go:238
------------------------------
{"msg":"PASSED [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source","total":-1,"completed":1,"skipped":2,"failed":0}

S
------------------------------
[BeforeEach] [sig-node] Security Context
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:10:15.748: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename security-context
STEP: Waiting for a default service account to be provisioned in namespace
[It] should support seccomp default which is unconfined [LinuxOnly]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/node/security_context.go:183
STEP: Creating a pod to test seccomp.security.alpha.kubernetes.io/pod
May  9 18:10:17.218: INFO: Waiting up to 5m0s for pod "security-context-c80a2481-3015-4e41-915e-d71e7faa58c8" in namespace "security-context-8280" to be "Succeeded or Failed"
May  9 18:10:17.462: INFO: Pod "security-context-c80a2481-3015-4e41-915e-d71e7faa58c8": Phase="Pending", Reason="", readiness=false. Elapsed: 243.554981ms
May  9 18:10:19.706: INFO: Pod "security-context-c80a2481-3015-4e41-915e-d71e7faa58c8": Phase="Pending", Reason="", readiness=false. Elapsed: 2.48762186s
May  9 18:10:21.951: INFO: Pod "security-context-c80a2481-3015-4e41-915e-d71e7faa58c8": Phase="Pending", Reason="", readiness=false. Elapsed: 4.732277035s
May  9 18:10:24.196: INFO: Pod "security-context-c80a2481-3015-4e41-915e-d71e7faa58c8": Phase="Succeeded", Reason="", readiness=false. Elapsed: 6.977662295s
STEP: Saw pod success
May  9 18:10:24.196: INFO: Pod "security-context-c80a2481-3015-4e41-915e-d71e7faa58c8" satisfied condition "Succeeded or Failed"
May  9 18:10:24.440: INFO: Trying to get logs from node ip-172-20-57-119.ap-south-1.compute.internal pod security-context-c80a2481-3015-4e41-915e-d71e7faa58c8 container test-container: <nil>
STEP: delete the pod
May  9 18:10:24.952: INFO: Waiting for pod security-context-c80a2481-3015-4e41-915e-d71e7faa58c8 to disappear
May  9 18:10:25.196: INFO: Pod security-context-c80a2481-3015-4e41-915e-d71e7faa58c8 no longer exists
[AfterEach] [sig-node] Security Context
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 4 lines ...
• [SLOW TEST:9.937 seconds]
[sig-node] Security Context
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/node/framework.go:23
  should support seccomp default which is unconfined [LinuxOnly]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/node/security_context.go:183
------------------------------
{"msg":"PASSED [sig-node] Security Context should support seccomp default which is unconfined [LinuxOnly]","total":-1,"completed":6,"skipped":61,"failed":0}

SSS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (ext4)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:10:25.704: INFO: Driver local doesn't support DynamicPV -- skipping
... skipping 68 lines ...
STEP: Building a namespace api object, basename secrets
STEP: Waiting for a default service account to be provisioned in namespace
[It] should be consumable from pods in volume [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating secret with name secret-test-a125676e-55f8-4e6f-99ce-dcc23b9da83a
STEP: Creating a pod to test consume secrets
May  9 18:10:23.029: INFO: Waiting up to 5m0s for pod "pod-secrets-7bef853c-1d9c-46ee-b112-022c8cf29543" in namespace "secrets-6361" to be "Succeeded or Failed"
May  9 18:10:23.267: INFO: Pod "pod-secrets-7bef853c-1d9c-46ee-b112-022c8cf29543": Phase="Pending", Reason="", readiness=false. Elapsed: 237.84971ms
May  9 18:10:25.504: INFO: Pod "pod-secrets-7bef853c-1d9c-46ee-b112-022c8cf29543": Phase="Succeeded", Reason="", readiness=false. Elapsed: 2.475402085s
STEP: Saw pod success
May  9 18:10:25.504: INFO: Pod "pod-secrets-7bef853c-1d9c-46ee-b112-022c8cf29543" satisfied condition "Succeeded or Failed"
May  9 18:10:25.741: INFO: Trying to get logs from node ip-172-20-33-176.ap-south-1.compute.internal pod pod-secrets-7bef853c-1d9c-46ee-b112-022c8cf29543 container secret-volume-test: <nil>
STEP: delete the pod
May  9 18:10:26.228: INFO: Waiting for pod pod-secrets-7bef853c-1d9c-46ee-b112-022c8cf29543 to disappear
May  9 18:10:26.465: INFO: Pod pod-secrets-7bef853c-1d9c-46ee-b112-022c8cf29543 no longer exists
[AfterEach] [sig-storage] Secrets
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 4 lines ...
• [SLOW TEST:5.590 seconds]
[sig-storage] Secrets
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/framework.go:23
  should be consumable from pods in volume [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-storage] Secrets should be consumable from pods in volume [NodeConformance] [Conformance]","total":-1,"completed":6,"skipped":94,"failed":0}

SS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:10:26.958: INFO: Only supported for providers [gce gke] (not aws)
... skipping 152 lines ...
May  9 18:09:28.024: INFO: >>> kubeConfig: /root/.kube/config
May  9 18:09:29.670: INFO: Exec stderr: ""
May  9 18:09:36.408: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c mkdir "/var/lib/kubelet/mount-propagation-3021"/host; mount -t tmpfs e2e-mount-propagation-host "/var/lib/kubelet/mount-propagation-3021"/host; echo host > "/var/lib/kubelet/mount-propagation-3021"/host/file] Namespace:mount-propagation-3021 PodName:hostexec-ip-172-20-33-176.ap-south-1.compute.internal-zbrwq ContainerName:agnhost-container Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true Quiet:false}
May  9 18:09:36.408: INFO: >>> kubeConfig: /root/.kube/config
May  9 18:09:38.160: INFO: ExecWithOptions {Command:[/bin/sh -c cat /mnt/test/master/file] Namespace:mount-propagation-3021 PodName:slave ContainerName:cntr Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:false Quiet:false}
May  9 18:09:38.160: INFO: >>> kubeConfig: /root/.kube/config
May  9 18:09:39.651: INFO: pod slave mount master: stdout: "master", stderr: "" error: <nil>
May  9 18:09:39.894: INFO: ExecWithOptions {Command:[/bin/sh -c cat /mnt/test/slave/file] Namespace:mount-propagation-3021 PodName:slave ContainerName:cntr Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:false Quiet:false}
May  9 18:09:39.894: INFO: >>> kubeConfig: /root/.kube/config
May  9 18:09:41.439: INFO: pod slave mount slave: stdout: "slave", stderr: "" error: <nil>
May  9 18:09:41.679: INFO: ExecWithOptions {Command:[/bin/sh -c cat /mnt/test/private/file] Namespace:mount-propagation-3021 PodName:slave ContainerName:cntr Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:false Quiet:false}
May  9 18:09:41.679: INFO: >>> kubeConfig: /root/.kube/config
May  9 18:09:43.243: INFO: pod slave mount private: stdout: "", stderr: "cat: can't open '/mnt/test/private/file': No such file or directory" error: command terminated with exit code 1
May  9 18:09:43.484: INFO: ExecWithOptions {Command:[/bin/sh -c cat /mnt/test/default/file] Namespace:mount-propagation-3021 PodName:slave ContainerName:cntr Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:false Quiet:false}
May  9 18:09:43.484: INFO: >>> kubeConfig: /root/.kube/config
May  9 18:09:45.038: INFO: pod slave mount default: stdout: "", stderr: "cat: can't open '/mnt/test/default/file': No such file or directory" error: command terminated with exit code 1
May  9 18:09:45.278: INFO: ExecWithOptions {Command:[/bin/sh -c cat /mnt/test/host/file] Namespace:mount-propagation-3021 PodName:slave ContainerName:cntr Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:false Quiet:false}
May  9 18:09:45.278: INFO: >>> kubeConfig: /root/.kube/config
May  9 18:09:46.827: INFO: pod slave mount host: stdout: "host", stderr: "" error: <nil>
May  9 18:09:47.068: INFO: ExecWithOptions {Command:[/bin/sh -c cat /mnt/test/master/file] Namespace:mount-propagation-3021 PodName:private ContainerName:cntr Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:false Quiet:false}
May  9 18:09:47.068: INFO: >>> kubeConfig: /root/.kube/config
May  9 18:09:48.612: INFO: pod private mount master: stdout: "", stderr: "cat: can't open '/mnt/test/master/file': No such file or directory" error: command terminated with exit code 1
May  9 18:09:48.854: INFO: ExecWithOptions {Command:[/bin/sh -c cat /mnt/test/slave/file] Namespace:mount-propagation-3021 PodName:private ContainerName:cntr Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:false Quiet:false}
May  9 18:09:48.854: INFO: >>> kubeConfig: /root/.kube/config
May  9 18:09:50.361: INFO: pod private mount slave: stdout: "", stderr: "cat: can't open '/mnt/test/slave/file': No such file or directory" error: command terminated with exit code 1
May  9 18:09:50.602: INFO: ExecWithOptions {Command:[/bin/sh -c cat /mnt/test/private/file] Namespace:mount-propagation-3021 PodName:private ContainerName:cntr Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:false Quiet:false}
May  9 18:09:50.602: INFO: >>> kubeConfig: /root/.kube/config
May  9 18:09:52.146: INFO: pod private mount private: stdout: "private", stderr: "" error: <nil>
May  9 18:09:52.388: INFO: ExecWithOptions {Command:[/bin/sh -c cat /mnt/test/default/file] Namespace:mount-propagation-3021 PodName:private ContainerName:cntr Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:false Quiet:false}
May  9 18:09:52.388: INFO: >>> kubeConfig: /root/.kube/config
May  9 18:09:53.908: INFO: pod private mount default: stdout: "", stderr: "cat: can't open '/mnt/test/default/file': No such file or directory" error: command terminated with exit code 1
May  9 18:09:54.156: INFO: ExecWithOptions {Command:[/bin/sh -c cat /mnt/test/host/file] Namespace:mount-propagation-3021 PodName:private ContainerName:cntr Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:false Quiet:false}
May  9 18:09:54.156: INFO: >>> kubeConfig: /root/.kube/config
May  9 18:09:55.665: INFO: pod private mount host: stdout: "", stderr: "cat: can't open '/mnt/test/host/file': No such file or directory" error: command terminated with exit code 1
May  9 18:09:55.906: INFO: ExecWithOptions {Command:[/bin/sh -c cat /mnt/test/master/file] Namespace:mount-propagation-3021 PodName:default ContainerName:cntr Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:false Quiet:false}
May  9 18:09:55.906: INFO: >>> kubeConfig: /root/.kube/config
May  9 18:09:57.425: INFO: pod default mount master: stdout: "", stderr: "cat: can't open '/mnt/test/master/file': No such file or directory" error: command terminated with exit code 1
May  9 18:09:57.665: INFO: ExecWithOptions {Command:[/bin/sh -c cat /mnt/test/slave/file] Namespace:mount-propagation-3021 PodName:default ContainerName:cntr Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:false Quiet:false}
May  9 18:09:57.665: INFO: >>> kubeConfig: /root/.kube/config
May  9 18:09:59.222: INFO: pod default mount slave: stdout: "", stderr: "cat: can't open '/mnt/test/slave/file': No such file or directory" error: command terminated with exit code 1
May  9 18:09:59.476: INFO: ExecWithOptions {Command:[/bin/sh -c cat /mnt/test/private/file] Namespace:mount-propagation-3021 PodName:default ContainerName:cntr Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:false Quiet:false}
May  9 18:09:59.476: INFO: >>> kubeConfig: /root/.kube/config
May  9 18:10:01.040: INFO: pod default mount private: stdout: "", stderr: "cat: can't open '/mnt/test/private/file': No such file or directory" error: command terminated with exit code 1
May  9 18:10:01.280: INFO: ExecWithOptions {Command:[/bin/sh -c cat /mnt/test/default/file] Namespace:mount-propagation-3021 PodName:default ContainerName:cntr Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:false Quiet:false}
May  9 18:10:01.280: INFO: >>> kubeConfig: /root/.kube/config
May  9 18:10:03.035: INFO: pod default mount default: stdout: "default", stderr: "" error: <nil>
May  9 18:10:03.276: INFO: ExecWithOptions {Command:[/bin/sh -c cat /mnt/test/host/file] Namespace:mount-propagation-3021 PodName:default ContainerName:cntr Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:false Quiet:false}
May  9 18:10:03.276: INFO: >>> kubeConfig: /root/.kube/config
May  9 18:10:04.788: INFO: pod default mount host: stdout: "", stderr: "cat: can't open '/mnt/test/host/file': No such file or directory" error: command terminated with exit code 1
May  9 18:10:05.029: INFO: ExecWithOptions {Command:[/bin/sh -c cat /mnt/test/master/file] Namespace:mount-propagation-3021 PodName:master ContainerName:cntr Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:false Quiet:false}
May  9 18:10:05.029: INFO: >>> kubeConfig: /root/.kube/config
May  9 18:10:06.554: INFO: pod master mount master: stdout: "master", stderr: "" error: <nil>
May  9 18:10:06.795: INFO: ExecWithOptions {Command:[/bin/sh -c cat /mnt/test/slave/file] Namespace:mount-propagation-3021 PodName:master ContainerName:cntr Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:false Quiet:false}
May  9 18:10:06.795: INFO: >>> kubeConfig: /root/.kube/config
May  9 18:10:08.340: INFO: pod master mount slave: stdout: "", stderr: "cat: can't open '/mnt/test/slave/file': No such file or directory" error: command terminated with exit code 1
May  9 18:10:08.581: INFO: ExecWithOptions {Command:[/bin/sh -c cat /mnt/test/private/file] Namespace:mount-propagation-3021 PodName:master ContainerName:cntr Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:false Quiet:false}
May  9 18:10:08.581: INFO: >>> kubeConfig: /root/.kube/config
May  9 18:10:10.142: INFO: pod master mount private: stdout: "", stderr: "cat: can't open '/mnt/test/private/file': No such file or directory" error: command terminated with exit code 1
May  9 18:10:10.383: INFO: ExecWithOptions {Command:[/bin/sh -c cat /mnt/test/default/file] Namespace:mount-propagation-3021 PodName:master ContainerName:cntr Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:false Quiet:false}
May  9 18:10:10.383: INFO: >>> kubeConfig: /root/.kube/config
May  9 18:10:11.952: INFO: pod master mount default: stdout: "", stderr: "cat: can't open '/mnt/test/default/file': No such file or directory" error: command terminated with exit code 1
May  9 18:10:12.192: INFO: ExecWithOptions {Command:[/bin/sh -c cat /mnt/test/host/file] Namespace:mount-propagation-3021 PodName:master ContainerName:cntr Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:false Quiet:false}
May  9 18:10:12.192: INFO: >>> kubeConfig: /root/.kube/config
May  9 18:10:13.696: INFO: pod master mount host: stdout: "host", stderr: "" error: <nil>
May  9 18:10:13.696: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c test `cat "/var/lib/kubelet/mount-propagation-3021"/master/file` = master] Namespace:mount-propagation-3021 PodName:hostexec-ip-172-20-33-176.ap-south-1.compute.internal-zbrwq ContainerName:agnhost-container Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true Quiet:false}
May  9 18:10:13.696: INFO: >>> kubeConfig: /root/.kube/config
May  9 18:10:15.197: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c test ! -e "/var/lib/kubelet/mount-propagation-3021"/slave/file] Namespace:mount-propagation-3021 PodName:hostexec-ip-172-20-33-176.ap-south-1.compute.internal-zbrwq ContainerName:agnhost-container Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true Quiet:false}
May  9 18:10:15.197: INFO: >>> kubeConfig: /root/.kube/config
May  9 18:10:16.693: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c umount "/var/lib/kubelet/mount-propagation-3021"/host] Namespace:mount-propagation-3021 PodName:hostexec-ip-172-20-33-176.ap-south-1.compute.internal-zbrwq ContainerName:agnhost-container Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true Quiet:false}
May  9 18:10:16.693: INFO: >>> kubeConfig: /root/.kube/config
... skipping 21 lines ...
• [SLOW TEST:135.462 seconds]
[sig-node] Mount propagation
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/node/framework.go:23
  should propagate mounts to the host
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/node/mount_propagation.go:82
------------------------------
{"msg":"PASSED [sig-node] Mount propagation should propagate mounts to the host","total":-1,"completed":2,"skipped":19,"failed":0}

SSSS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (ext4)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:10:27.624: INFO: Driver local doesn't support DynamicPV -- skipping
... skipping 137 lines ...
May  9 18:09:45.454: INFO: In-tree plugin kubernetes.io/aws-ebs is not migrated, not validating any metrics
STEP: creating a test aws volume
May  9 18:09:46.710: INFO: Successfully created a new PD: "aws://ap-south-1a/vol-0bf3a20d11a7344a1".
May  9 18:09:46.710: INFO: Creating resource for inline volume
STEP: Creating pod exec-volume-test-inlinevolume-lt6b
STEP: Creating a pod to test exec-volume-test
May  9 18:09:46.957: INFO: Waiting up to 5m0s for pod "exec-volume-test-inlinevolume-lt6b" in namespace "volume-2502" to be "Succeeded or Failed"
May  9 18:09:47.197: INFO: Pod "exec-volume-test-inlinevolume-lt6b": Phase="Pending", Reason="", readiness=false. Elapsed: 239.673599ms
May  9 18:09:49.438: INFO: Pod "exec-volume-test-inlinevolume-lt6b": Phase="Pending", Reason="", readiness=false. Elapsed: 2.480549393s
May  9 18:09:51.678: INFO: Pod "exec-volume-test-inlinevolume-lt6b": Phase="Pending", Reason="", readiness=false. Elapsed: 4.720967421s
May  9 18:09:53.920: INFO: Pod "exec-volume-test-inlinevolume-lt6b": Phase="Pending", Reason="", readiness=false. Elapsed: 6.962590589s
May  9 18:09:56.165: INFO: Pod "exec-volume-test-inlinevolume-lt6b": Phase="Pending", Reason="", readiness=false. Elapsed: 9.207909158s
May  9 18:09:58.406: INFO: Pod "exec-volume-test-inlinevolume-lt6b": Phase="Pending", Reason="", readiness=false. Elapsed: 11.449238711s
... skipping 5 lines ...
May  9 18:10:11.867: INFO: Pod "exec-volume-test-inlinevolume-lt6b": Phase="Pending", Reason="", readiness=false. Elapsed: 24.909631078s
May  9 18:10:14.108: INFO: Pod "exec-volume-test-inlinevolume-lt6b": Phase="Pending", Reason="", readiness=false. Elapsed: 27.15054436s
May  9 18:10:16.348: INFO: Pod "exec-volume-test-inlinevolume-lt6b": Phase="Pending", Reason="", readiness=false. Elapsed: 29.391371857s
May  9 18:10:18.590: INFO: Pod "exec-volume-test-inlinevolume-lt6b": Phase="Pending", Reason="", readiness=false. Elapsed: 31.632556835s
May  9 18:10:20.836: INFO: Pod "exec-volume-test-inlinevolume-lt6b": Phase="Succeeded", Reason="", readiness=false. Elapsed: 33.878803856s
STEP: Saw pod success
May  9 18:10:20.836: INFO: Pod "exec-volume-test-inlinevolume-lt6b" satisfied condition "Succeeded or Failed"
May  9 18:10:21.076: INFO: Trying to get logs from node ip-172-20-61-172.ap-south-1.compute.internal pod exec-volume-test-inlinevolume-lt6b container exec-container-inlinevolume-lt6b: <nil>
STEP: delete the pod
May  9 18:10:21.564: INFO: Waiting for pod exec-volume-test-inlinevolume-lt6b to disappear
May  9 18:10:21.804: INFO: Pod exec-volume-test-inlinevolume-lt6b no longer exists
STEP: Deleting pod exec-volume-test-inlinevolume-lt6b
May  9 18:10:21.804: INFO: Deleting pod "exec-volume-test-inlinevolume-lt6b" in namespace "volume-2502"
May  9 18:10:22.432: INFO: Couldn't delete PD "aws://ap-south-1a/vol-0bf3a20d11a7344a1", sleeping 5s: error deleting EBS volumes: VolumeInUse: Volume vol-0bf3a20d11a7344a1 is currently attached to i-0a9e1374c3bae1e94
	status code: 400, request id: a7eb2ee8-5b82-4027-850c-2014e145a339
May  9 18:10:28.544: INFO: Successfully deleted PD "aws://ap-south-1a/vol-0bf3a20d11a7344a1".
[AfterEach] [Testpattern: Inline-volume (ext4)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:10:28.544: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
STEP: Destroying namespace "volume-2502" for this suite.
... skipping 6 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Inline-volume (ext4)] volumes
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should allow exec of files on the volume
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volumes.go:196
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume","total":-1,"completed":4,"skipped":24,"failed":0}
[BeforeEach] [Testpattern: Inline-volume (ext3)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:10:29.036: INFO: Driver local doesn't support InlineVolume -- skipping
[AfterEach] [Testpattern: Inline-volume (ext3)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 11 lines ...
      Driver local doesn't support InlineVolume -- skipping

      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:116
------------------------------
S
------------------------------
{"msg":"PASSED [sig-storage] ConfigMap should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance]","total":-1,"completed":8,"skipped":45,"failed":0}
[BeforeEach] [sig-storage] EmptyDir volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:10:18.000: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename emptydir
STEP: Waiting for a default service account to be provisioned in namespace
[It] should support (root,0777,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating a pod to test emptydir 0777 on tmpfs
May  9 18:10:19.440: INFO: Waiting up to 5m0s for pod "pod-51ec46cd-c4a1-4344-9e5a-d423a38b3bce" in namespace "emptydir-7355" to be "Succeeded or Failed"
May  9 18:10:19.680: INFO: Pod "pod-51ec46cd-c4a1-4344-9e5a-d423a38b3bce": Phase="Pending", Reason="", readiness=false. Elapsed: 239.83666ms
May  9 18:10:21.920: INFO: Pod "pod-51ec46cd-c4a1-4344-9e5a-d423a38b3bce": Phase="Pending", Reason="", readiness=false. Elapsed: 2.479444778s
May  9 18:10:24.162: INFO: Pod "pod-51ec46cd-c4a1-4344-9e5a-d423a38b3bce": Phase="Pending", Reason="", readiness=false. Elapsed: 4.721298201s
May  9 18:10:26.404: INFO: Pod "pod-51ec46cd-c4a1-4344-9e5a-d423a38b3bce": Phase="Pending", Reason="", readiness=false. Elapsed: 6.963878263s
May  9 18:10:28.645: INFO: Pod "pod-51ec46cd-c4a1-4344-9e5a-d423a38b3bce": Phase="Succeeded", Reason="", readiness=false. Elapsed: 9.204623799s
STEP: Saw pod success
May  9 18:10:28.645: INFO: Pod "pod-51ec46cd-c4a1-4344-9e5a-d423a38b3bce" satisfied condition "Succeeded or Failed"
May  9 18:10:28.885: INFO: Trying to get logs from node ip-172-20-57-119.ap-south-1.compute.internal pod pod-51ec46cd-c4a1-4344-9e5a-d423a38b3bce container test-container: <nil>
STEP: delete the pod
May  9 18:10:29.393: INFO: Waiting for pod pod-51ec46cd-c4a1-4344-9e5a-d423a38b3bce to disappear
May  9 18:10:29.633: INFO: Pod pod-51ec46cd-c4a1-4344-9e5a-d423a38b3bce no longer exists
[AfterEach] [sig-storage] EmptyDir volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 25 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:10:31.716: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
STEP: Destroying namespace "configmap-6150" for this suite.

•
------------------------------
{"msg":"PASSED [sig-node] ConfigMap should run through a ConfigMap lifecycle [Conformance]","total":-1,"completed":5,"skipped":26,"failed":0}

S
------------------------------
{"msg":"PASSED [sig-storage] EmptyDir volumes should support (root,0777,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]","total":-1,"completed":9,"skipped":45,"failed":0}
[BeforeEach] [sig-network] EndpointSlice
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:10:30.123: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename endpointslice
STEP: Waiting for a default service account to be provisioned in namespace
... skipping 5 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:10:31.813: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
STEP: Destroying namespace "endpointslice-2780" for this suite.

•
------------------------------
{"msg":"PASSED [sig-network] EndpointSlice should have Endpoints and EndpointSlices pointing to API Server [Conformance]","total":-1,"completed":10,"skipped":45,"failed":0}
[BeforeEach] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:10:32.325: INFO: Only supported for node OS distro [gci ubuntu custom] (not debian)
[AfterEach] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 180 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/network/common/framework.go:23
  version v1
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/network/proxy.go:74
    should proxy logs on node with explicit kubelet port using proxy subresource 
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/network/proxy.go:85
------------------------------
{"msg":"PASSED [sig-network] Proxy version v1 should proxy logs on node with explicit kubelet port using proxy subresource ","total":-1,"completed":7,"skipped":102,"failed":0}

SS
------------------------------
[BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:10:33.821: INFO: Driver emptydir doesn't support PreprovisionedPV -- skipping
... skipping 58 lines ...
May  9 18:10:28.572: INFO: Running '/tmp/kubectl3539518766/kubectl --server=https://api.e2e-394a1565f9-8b358.test-cncf-aws.k8s.io --kubeconfig=/root/.kube/config --namespace=crd-publish-openapi-2404 explain e2e-test-crd-publish-openapi-8677-crds.spec'
May  9 18:10:29.487: INFO: stderr: ""
May  9 18:10:29.487: INFO: stdout: "KIND:     E2e-test-crd-publish-openapi-8677-crd\nVERSION:  crd-publish-openapi-test-foo.example.com/v1\n\nRESOURCE: spec <Object>\n\nDESCRIPTION:\n     Specification of Foo\n\nFIELDS:\n   bars\t<[]Object>\n     List of Bars and their specs.\n\n"
May  9 18:10:29.487: INFO: Running '/tmp/kubectl3539518766/kubectl --server=https://api.e2e-394a1565f9-8b358.test-cncf-aws.k8s.io --kubeconfig=/root/.kube/config --namespace=crd-publish-openapi-2404 explain e2e-test-crd-publish-openapi-8677-crds.spec.bars'
May  9 18:10:30.384: INFO: stderr: ""
May  9 18:10:30.384: INFO: stdout: "KIND:     E2e-test-crd-publish-openapi-8677-crd\nVERSION:  crd-publish-openapi-test-foo.example.com/v1\n\nRESOURCE: bars <[]Object>\n\nDESCRIPTION:\n     List of Bars and their specs.\n\nFIELDS:\n   age\t<string>\n     Age of Bar.\n\n   bazs\t<[]string>\n     List of Bazs.\n\n   name\t<string> -required-\n     Name of Bar.\n\n"
STEP: kubectl explain works to return error when explain is called on property that doesn't exist
May  9 18:10:30.384: INFO: Running '/tmp/kubectl3539518766/kubectl --server=https://api.e2e-394a1565f9-8b358.test-cncf-aws.k8s.io --kubeconfig=/root/.kube/config --namespace=crd-publish-openapi-2404 explain e2e-test-crd-publish-openapi-8677-crds.spec.bars2'
May  9 18:10:31.288: INFO: rc: 1
[AfterEach] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:10:39.894: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
STEP: Destroying namespace "crd-publish-openapi-2404" for this suite.
... skipping 2 lines ...
• [SLOW TEST:33.594 seconds]
[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin]
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apimachinery/framework.go:23
  works for CRD with validation schema [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD with validation schema [Conformance]","total":-1,"completed":9,"skipped":42,"failed":0}

SS
------------------------------
[BeforeEach] [Testpattern: Inline-volume (ext4)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:10:40.628: INFO: Only supported for providers [gce gke] (not aws)
... skipping 121 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/persistent_volumes-local.go:192
    One pod requesting one prebound PVC
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/persistent_volumes-local.go:209
      should be able to mount volume and read from pod1
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/persistent_volumes-local.go:232
------------------------------
{"msg":"PASSED [sig-storage] PersistentVolumes-local  [Volume type: dir-bindmounted] One pod requesting one prebound PVC should be able to mount volume and read from pod1","total":-1,"completed":6,"skipped":27,"failed":0}

SSS
------------------------------
[BeforeEach] [Testpattern: Pre-provisioned PV (ext3)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:10:41.190: INFO: Only supported for providers [azure] (not aws)
... skipping 47 lines ...
STEP: Building a namespace api object, basename security-context-test
STEP: Waiting for a default service account to be provisioned in namespace
[BeforeEach] [sig-node] Security Context
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/security_context.go:46
[It] should run with an explicit non-root user ID [LinuxOnly]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/security_context.go:129
May  9 18:10:29.136: INFO: Waiting up to 5m0s for pod "explicit-nonroot-uid" in namespace "security-context-test-3910" to be "Succeeded or Failed"
May  9 18:10:29.378: INFO: Pod "explicit-nonroot-uid": Phase="Pending", Reason="", readiness=false. Elapsed: 242.006352ms
May  9 18:10:31.619: INFO: Pod "explicit-nonroot-uid": Phase="Pending", Reason="", readiness=false. Elapsed: 2.483272028s
May  9 18:10:33.860: INFO: Pod "explicit-nonroot-uid": Phase="Pending", Reason="", readiness=false. Elapsed: 4.72463032s
May  9 18:10:36.101: INFO: Pod "explicit-nonroot-uid": Phase="Pending", Reason="", readiness=false. Elapsed: 6.965649545s
May  9 18:10:38.347: INFO: Pod "explicit-nonroot-uid": Phase="Pending", Reason="", readiness=false. Elapsed: 9.211234315s
May  9 18:10:40.589: INFO: Pod "explicit-nonroot-uid": Phase="Succeeded", Reason="", readiness=false. Elapsed: 11.452787229s
May  9 18:10:40.589: INFO: Pod "explicit-nonroot-uid" satisfied condition "Succeeded or Failed"
[AfterEach] [sig-node] Security Context
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:10:40.833: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
STEP: Destroying namespace "security-context-test-3910" for this suite.


... skipping 2 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/framework.go:23
  When creating a container with runAsNonRoot
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/security_context.go:104
    should run with an explicit non-root user ID [LinuxOnly]
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/security_context.go:129
------------------------------
{"msg":"PASSED [sig-node] Security Context When creating a container with runAsNonRoot should run with an explicit non-root user ID [LinuxOnly]","total":-1,"completed":3,"skipped":33,"failed":0}
[BeforeEach] [Testpattern: Dynamic PV (block volmode)] volumeMode
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:10:41.324: INFO: Driver hostPathSymlink doesn't support DynamicPV -- skipping
[AfterEach] [Testpattern: Dynamic PV (block volmode)] volumeMode
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 370 lines ...
May  9 18:10:34.737: INFO: PersistentVolumeClaim pvc-w2rn6 found but phase is Pending instead of Bound.
May  9 18:10:36.974: INFO: PersistentVolumeClaim pvc-w2rn6 found and phase=Bound (4.710812962s)
May  9 18:10:36.974: INFO: Waiting up to 3m0s for PersistentVolume local-bmpz2 to have phase Bound
May  9 18:10:37.218: INFO: PersistentVolume local-bmpz2 found and phase=Bound (243.736504ms)
STEP: Creating pod pod-subpath-test-preprovisionedpv-lgzp
STEP: Creating a pod to test subpath
May  9 18:10:37.925: INFO: Waiting up to 5m0s for pod "pod-subpath-test-preprovisionedpv-lgzp" in namespace "provisioning-7442" to be "Succeeded or Failed"
May  9 18:10:38.160: INFO: Pod "pod-subpath-test-preprovisionedpv-lgzp": Phase="Pending", Reason="", readiness=false. Elapsed: 234.983487ms
May  9 18:10:40.396: INFO: Pod "pod-subpath-test-preprovisionedpv-lgzp": Phase="Pending", Reason="", readiness=false. Elapsed: 2.470436637s
May  9 18:10:42.632: INFO: Pod "pod-subpath-test-preprovisionedpv-lgzp": Phase="Succeeded", Reason="", readiness=false. Elapsed: 4.706408802s
STEP: Saw pod success
May  9 18:10:42.632: INFO: Pod "pod-subpath-test-preprovisionedpv-lgzp" satisfied condition "Succeeded or Failed"
May  9 18:10:42.870: INFO: Trying to get logs from node ip-172-20-57-119.ap-south-1.compute.internal pod pod-subpath-test-preprovisionedpv-lgzp container test-container-volume-preprovisionedpv-lgzp: <nil>
STEP: delete the pod
May  9 18:10:43.413: INFO: Waiting for pod pod-subpath-test-preprovisionedpv-lgzp to disappear
May  9 18:10:43.648: INFO: Pod pod-subpath-test-preprovisionedpv-lgzp no longer exists
STEP: Deleting pod pod-subpath-test-preprovisionedpv-lgzp
May  9 18:10:43.648: INFO: Deleting pod "pod-subpath-test-preprovisionedpv-lgzp" in namespace "provisioning-7442"
... skipping 19 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Pre-provisioned PV (default fs)] subPath
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should support existing directory
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:205
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory","total":-1,"completed":7,"skipped":29,"failed":0}

SS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:10:46.885: INFO: Only supported for providers [openstack] (not aws)
... skipping 168 lines ...
May  9 18:10:20.776: INFO: PersistentVolumeClaim pvc-g4hf2 found but phase is Pending instead of Bound.
May  9 18:10:23.020: INFO: PersistentVolumeClaim pvc-g4hf2 found and phase=Bound (2.484547678s)
May  9 18:10:23.020: INFO: Waiting up to 3m0s for PersistentVolume local-pjwjp to have phase Bound
May  9 18:10:23.262: INFO: PersistentVolume local-pjwjp found and phase=Bound (242.242073ms)
STEP: Creating pod pod-subpath-test-preprovisionedpv-5xmv
STEP: Creating a pod to test atomic-volume-subpath
May  9 18:10:23.988: INFO: Waiting up to 5m0s for pod "pod-subpath-test-preprovisionedpv-5xmv" in namespace "provisioning-259" to be "Succeeded or Failed"
May  9 18:10:24.229: INFO: Pod "pod-subpath-test-preprovisionedpv-5xmv": Phase="Pending", Reason="", readiness=false. Elapsed: 241.296893ms
May  9 18:10:26.471: INFO: Pod "pod-subpath-test-preprovisionedpv-5xmv": Phase="Pending", Reason="", readiness=false. Elapsed: 2.483159584s
May  9 18:10:28.714: INFO: Pod "pod-subpath-test-preprovisionedpv-5xmv": Phase="Running", Reason="", readiness=true. Elapsed: 4.725903725s
May  9 18:10:30.955: INFO: Pod "pod-subpath-test-preprovisionedpv-5xmv": Phase="Running", Reason="", readiness=true. Elapsed: 6.967026955s
May  9 18:10:33.196: INFO: Pod "pod-subpath-test-preprovisionedpv-5xmv": Phase="Running", Reason="", readiness=true. Elapsed: 9.208255599s
May  9 18:10:35.438: INFO: Pod "pod-subpath-test-preprovisionedpv-5xmv": Phase="Running", Reason="", readiness=true. Elapsed: 11.450313545s
May  9 18:10:37.680: INFO: Pod "pod-subpath-test-preprovisionedpv-5xmv": Phase="Running", Reason="", readiness=true. Elapsed: 13.691842969s
May  9 18:10:39.921: INFO: Pod "pod-subpath-test-preprovisionedpv-5xmv": Phase="Running", Reason="", readiness=true. Elapsed: 15.933349899s
May  9 18:10:42.162: INFO: Pod "pod-subpath-test-preprovisionedpv-5xmv": Phase="Running", Reason="", readiness=true. Elapsed: 18.174744948s
May  9 18:10:44.404: INFO: Pod "pod-subpath-test-preprovisionedpv-5xmv": Phase="Running", Reason="", readiness=true. Elapsed: 20.416367858s
May  9 18:10:46.647: INFO: Pod "pod-subpath-test-preprovisionedpv-5xmv": Phase="Running", Reason="", readiness=true. Elapsed: 22.659435385s
May  9 18:10:48.890: INFO: Pod "pod-subpath-test-preprovisionedpv-5xmv": Phase="Succeeded", Reason="", readiness=false. Elapsed: 24.902311154s
STEP: Saw pod success
May  9 18:10:48.890: INFO: Pod "pod-subpath-test-preprovisionedpv-5xmv" satisfied condition "Succeeded or Failed"
May  9 18:10:49.132: INFO: Trying to get logs from node ip-172-20-61-172.ap-south-1.compute.internal pod pod-subpath-test-preprovisionedpv-5xmv container test-container-subpath-preprovisionedpv-5xmv: <nil>
STEP: delete the pod
May  9 18:10:49.651: INFO: Waiting for pod pod-subpath-test-preprovisionedpv-5xmv to disappear
May  9 18:10:49.898: INFO: Pod pod-subpath-test-preprovisionedpv-5xmv no longer exists
STEP: Deleting pod pod-subpath-test-preprovisionedpv-5xmv
May  9 18:10:49.898: INFO: Deleting pod "pod-subpath-test-preprovisionedpv-5xmv" in namespace "provisioning-259"
... skipping 19 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Pre-provisioned PV (default fs)] subPath
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should support file as subpath [LinuxOnly]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:230
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]","total":-1,"completed":4,"skipped":9,"failed":0}

S
------------------------------
[BeforeEach] [Testpattern: Inline-volume (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:10:53.151: INFO: Driver local doesn't support InlineVolume -- skipping
... skipping 14 lines ...
      Driver local doesn't support InlineVolume -- skipping

      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:116
------------------------------
SSSS
------------------------------
{"msg":"PASSED [sig-node] Probing container should be restarted with a exec \"cat /tmp/health\" liveness probe [NodeConformance] [Conformance]","total":-1,"completed":4,"skipped":21,"failed":0}
[BeforeEach] [sig-storage] Projected configMap
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:10:46.769: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename projected
STEP: Waiting for a default service account to be provisioned in namespace
[It] should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating configMap with name projected-configmap-test-volume-3d299658-3fbe-4e42-af96-3022aba02e71
STEP: Creating a pod to test consume configMaps
May  9 18:10:48.472: INFO: Waiting up to 5m0s for pod "pod-projected-configmaps-6c92a4d2-55be-4838-ae1f-2b03e0f732e5" in namespace "projected-9301" to be "Succeeded or Failed"
May  9 18:10:48.722: INFO: Pod "pod-projected-configmaps-6c92a4d2-55be-4838-ae1f-2b03e0f732e5": Phase="Pending", Reason="", readiness=false. Elapsed: 250.126613ms
May  9 18:10:50.963: INFO: Pod "pod-projected-configmaps-6c92a4d2-55be-4838-ae1f-2b03e0f732e5": Phase="Pending", Reason="", readiness=false. Elapsed: 2.49118111s
May  9 18:10:53.211: INFO: Pod "pod-projected-configmaps-6c92a4d2-55be-4838-ae1f-2b03e0f732e5": Phase="Pending", Reason="", readiness=false. Elapsed: 4.738774372s
May  9 18:10:55.451: INFO: Pod "pod-projected-configmaps-6c92a4d2-55be-4838-ae1f-2b03e0f732e5": Phase="Succeeded", Reason="", readiness=false. Elapsed: 6.979536378s
STEP: Saw pod success
May  9 18:10:55.451: INFO: Pod "pod-projected-configmaps-6c92a4d2-55be-4838-ae1f-2b03e0f732e5" satisfied condition "Succeeded or Failed"
May  9 18:10:55.692: INFO: Trying to get logs from node ip-172-20-33-176.ap-south-1.compute.internal pod pod-projected-configmaps-6c92a4d2-55be-4838-ae1f-2b03e0f732e5 container agnhost-container: <nil>
STEP: delete the pod
May  9 18:10:56.195: INFO: Waiting for pod pod-projected-configmaps-6c92a4d2-55be-4838-ae1f-2b03e0f732e5 to disappear
May  9 18:10:56.435: INFO: Pod pod-projected-configmaps-6c92a4d2-55be-4838-ae1f-2b03e0f732e5 no longer exists
[AfterEach] [sig-storage] Projected configMap
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 4 lines ...
• [SLOW TEST:10.193 seconds]
[sig-storage] Projected configMap
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/framework.go:23
  should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-storage] Projected configMap should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]","total":-1,"completed":5,"skipped":21,"failed":0}

SSS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
[BeforeEach] [Testpattern: Dynamic PV (default fs)] subPath
... skipping 15 lines ...
May  9 18:10:22.906: INFO: Warning: Making PVC: VolumeMode specified as invalid empty string, treating as nil
May  9 18:10:23.144: INFO: Waiting up to timeout=5m0s for PersistentVolumeClaims [nfsxfgzz] to have phase Bound
May  9 18:10:23.382: INFO: PersistentVolumeClaim nfsxfgzz found but phase is Pending instead of Bound.
May  9 18:10:25.621: INFO: PersistentVolumeClaim nfsxfgzz found and phase=Bound (2.476646808s)
STEP: Creating pod pod-subpath-test-dynamicpv-vdrh
STEP: Creating a pod to test subpath
May  9 18:10:26.343: INFO: Waiting up to 5m0s for pod "pod-subpath-test-dynamicpv-vdrh" in namespace "provisioning-8723" to be "Succeeded or Failed"
May  9 18:10:26.581: INFO: Pod "pod-subpath-test-dynamicpv-vdrh": Phase="Pending", Reason="", readiness=false. Elapsed: 237.649507ms
May  9 18:10:28.820: INFO: Pod "pod-subpath-test-dynamicpv-vdrh": Phase="Pending", Reason="", readiness=false. Elapsed: 2.476304038s
May  9 18:10:31.059: INFO: Pod "pod-subpath-test-dynamicpv-vdrh": Phase="Pending", Reason="", readiness=false. Elapsed: 4.715657552s
May  9 18:10:33.298: INFO: Pod "pod-subpath-test-dynamicpv-vdrh": Phase="Pending", Reason="", readiness=false. Elapsed: 6.954564624s
May  9 18:10:35.536: INFO: Pod "pod-subpath-test-dynamicpv-vdrh": Phase="Succeeded", Reason="", readiness=false. Elapsed: 9.192915758s
STEP: Saw pod success
May  9 18:10:35.536: INFO: Pod "pod-subpath-test-dynamicpv-vdrh" satisfied condition "Succeeded or Failed"
May  9 18:10:35.776: INFO: Trying to get logs from node ip-172-20-33-176.ap-south-1.compute.internal pod pod-subpath-test-dynamicpv-vdrh container test-container-subpath-dynamicpv-vdrh: <nil>
STEP: delete the pod
May  9 18:10:36.272: INFO: Waiting for pod pod-subpath-test-dynamicpv-vdrh to disappear
May  9 18:10:36.513: INFO: Pod pod-subpath-test-dynamicpv-vdrh no longer exists
STEP: Deleting pod pod-subpath-test-dynamicpv-vdrh
May  9 18:10:36.513: INFO: Deleting pod "pod-subpath-test-dynamicpv-vdrh" in namespace "provisioning-8723"
STEP: Creating pod pod-subpath-test-dynamicpv-vdrh
STEP: Creating a pod to test subpath
May  9 18:10:37.008: INFO: Waiting up to 5m0s for pod "pod-subpath-test-dynamicpv-vdrh" in namespace "provisioning-8723" to be "Succeeded or Failed"
May  9 18:10:37.246: INFO: Pod "pod-subpath-test-dynamicpv-vdrh": Phase="Pending", Reason="", readiness=false. Elapsed: 238.004402ms
May  9 18:10:39.487: INFO: Pod "pod-subpath-test-dynamicpv-vdrh": Phase="Succeeded", Reason="", readiness=false. Elapsed: 2.478856588s
STEP: Saw pod success
May  9 18:10:39.487: INFO: Pod "pod-subpath-test-dynamicpv-vdrh" satisfied condition "Succeeded or Failed"
May  9 18:10:39.725: INFO: Trying to get logs from node ip-172-20-57-119.ap-south-1.compute.internal pod pod-subpath-test-dynamicpv-vdrh container test-container-subpath-dynamicpv-vdrh: <nil>
STEP: delete the pod
May  9 18:10:40.217: INFO: Waiting for pod pod-subpath-test-dynamicpv-vdrh to disappear
May  9 18:10:40.455: INFO: Pod pod-subpath-test-dynamicpv-vdrh no longer exists
STEP: Deleting pod pod-subpath-test-dynamicpv-vdrh
May  9 18:10:40.455: INFO: Deleting pod "pod-subpath-test-dynamicpv-vdrh" in namespace "provisioning-8723"
... skipping 19 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Dynamic PV (default fs)] subPath
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should support existing directories when readOnly specified in the volumeSource
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:394
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource","total":-1,"completed":4,"skipped":9,"failed":0}

SSSSS
------------------------------
[BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
[BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] volumes
... skipping 82 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Pre-provisioned PV (default fs)] volumes
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should store data
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volumes.go:159
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data","total":-1,"completed":7,"skipped":56,"failed":0}

SS
------------------------------
[BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
[BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath
... skipping 94 lines ...
• [SLOW TEST:35.486 seconds]
[sig-network] Services
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/network/common/framework.go:23
  should be possible to connect to a service via ExternalIP when the external IP is not assigned to a node
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/network/service.go:1177
------------------------------
{"msg":"PASSED [sig-network] Services should be possible to connect to a service via ExternalIP when the external IP is not assigned to a node","total":-1,"completed":6,"skipped":27,"failed":0}

S
------------------------------
[BeforeEach] [sig-storage] PersistentVolumes-local 
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 71 lines ...
[BeforeEach] [sig-node] Secrets
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:11:07.753: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename secrets
STEP: Waiting for a default service account to be provisioned in namespace
[It] should fail to create secret due to empty secret key [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating projection with secret that has name secret-emptykey-test-f94738ab-5eac-42fd-9826-c2c0e61ad556
[AfterEach] [sig-node] Secrets
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:11:09.195: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
STEP: Destroying namespace "secrets-2677" for this suite.

•
------------------------------
{"msg":"PASSED [sig-node] Secrets should fail to create secret due to empty secret key [Conformance]","total":-1,"completed":7,"skipped":28,"failed":0}

S
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (immediate binding)] topology
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:11:09.692: INFO: Only supported for providers [gce gke] (not aws)
... skipping 196 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/framework.go:23
  CSIStorageCapacity
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/csi_mock_volume.go:1134
    CSIStorageCapacity used, no capacity
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/csi_mock_volume.go:1177
------------------------------
{"msg":"PASSED [sig-storage] CSI mock volume CSIStorageCapacity CSIStorageCapacity used, no capacity","total":-1,"completed":5,"skipped":45,"failed":0}

SSSSSSSSS
------------------------------
[BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:11:16.850: INFO: Only supported for providers [vsphere] (not aws)
... skipping 47 lines ...
STEP: Building a namespace api object, basename configmap
STEP: Waiting for a default service account to be provisioned in namespace
[It] should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/configmap_volume.go:75
STEP: Creating configMap with name configmap-test-volume-7607ab14-cd78-4d48-b400-ab463b59849d
STEP: Creating a pod to test consume configMaps
May  9 18:11:13.727: INFO: Waiting up to 5m0s for pod "pod-configmaps-8863f0df-9741-4a50-ac46-43b78d2ad567" in namespace "configmap-9319" to be "Succeeded or Failed"
May  9 18:11:13.968: INFO: Pod "pod-configmaps-8863f0df-9741-4a50-ac46-43b78d2ad567": Phase="Pending", Reason="", readiness=false. Elapsed: 240.795113ms
May  9 18:11:16.210: INFO: Pod "pod-configmaps-8863f0df-9741-4a50-ac46-43b78d2ad567": Phase="Succeeded", Reason="", readiness=false. Elapsed: 2.483101169s
STEP: Saw pod success
May  9 18:11:16.210: INFO: Pod "pod-configmaps-8863f0df-9741-4a50-ac46-43b78d2ad567" satisfied condition "Succeeded or Failed"
May  9 18:11:16.450: INFO: Trying to get logs from node ip-172-20-57-119.ap-south-1.compute.internal pod pod-configmaps-8863f0df-9741-4a50-ac46-43b78d2ad567 container agnhost-container: <nil>
STEP: delete the pod
May  9 18:11:16.941: INFO: Waiting for pod pod-configmaps-8863f0df-9741-4a50-ac46-43b78d2ad567 to disappear
May  9 18:11:17.201: INFO: Pod pod-configmaps-8863f0df-9741-4a50-ac46-43b78d2ad567 no longer exists
[AfterEach] [sig-storage] ConfigMap
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 4 lines ...
• [SLOW TEST:5.653 seconds]
[sig-storage] ConfigMap
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/framework.go:23
  should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/configmap_volume.go:75
------------------------------
{"msg":"PASSED [sig-storage] PersistentVolumes-local  [Volume type: dir-bindmounted] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2","total":-1,"completed":8,"skipped":105,"failed":0}
[BeforeEach] [sig-node] Downward API
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:11:08.533: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename downward-api
STEP: Waiting for a default service account to be provisioned in namespace
[It] should provide container's limits.cpu/memory and requests.cpu/memory as env vars [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating a pod to test downward api env vars
May  9 18:11:09.960: INFO: Waiting up to 5m0s for pod "downward-api-3cba7bee-e6c2-4460-9d1f-092d7869ca3c" in namespace "downward-api-7487" to be "Succeeded or Failed"
May  9 18:11:10.197: INFO: Pod "downward-api-3cba7bee-e6c2-4460-9d1f-092d7869ca3c": Phase="Pending", Reason="", readiness=false. Elapsed: 237.133981ms
May  9 18:11:12.437: INFO: Pod "downward-api-3cba7bee-e6c2-4460-9d1f-092d7869ca3c": Phase="Pending", Reason="", readiness=false. Elapsed: 2.477048541s
May  9 18:11:14.675: INFO: Pod "downward-api-3cba7bee-e6c2-4460-9d1f-092d7869ca3c": Phase="Pending", Reason="", readiness=false. Elapsed: 4.714688707s
May  9 18:11:16.913: INFO: Pod "downward-api-3cba7bee-e6c2-4460-9d1f-092d7869ca3c": Phase="Succeeded", Reason="", readiness=false. Elapsed: 6.953151442s
STEP: Saw pod success
May  9 18:11:16.913: INFO: Pod "downward-api-3cba7bee-e6c2-4460-9d1f-092d7869ca3c" satisfied condition "Succeeded or Failed"
May  9 18:11:17.166: INFO: Trying to get logs from node ip-172-20-61-172.ap-south-1.compute.internal pod downward-api-3cba7bee-e6c2-4460-9d1f-092d7869ca3c container dapi-container: <nil>
STEP: delete the pod
May  9 18:11:17.651: INFO: Waiting for pod downward-api-3cba7bee-e6c2-4460-9d1f-092d7869ca3c to disappear
May  9 18:11:17.891: INFO: Pod downward-api-3cba7bee-e6c2-4460-9d1f-092d7869ca3c no longer exists
[AfterEach] [sig-node] Downward API
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 4 lines ...
• [SLOW TEST:9.836 seconds]
[sig-node] Downward API
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/framework.go:23
  should provide container's limits.cpu/memory and requests.cpu/memory as env vars [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-node] Downward API should provide container's limits.cpu/memory and requests.cpu/memory as env vars [NodeConformance] [Conformance]","total":-1,"completed":9,"skipped":105,"failed":0}

S
------------------------------
[BeforeEach] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
[BeforeEach] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode
... skipping 49 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Pre-provisioned PV (block volmode)] volumeMode
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should not mount / map unused volumes in a pod [LinuxOnly]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volumemode.go:351
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]","total":-1,"completed":8,"skipped":33,"failed":0}

SSSSS
------------------------------
{"msg":"PASSED [sig-storage] ConfigMap should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]","total":-1,"completed":4,"skipped":65,"failed":0}
[BeforeEach] [sig-node] NodeLease
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:11:17.700: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename node-lease-test
STEP: Waiting for a default service account to be provisioned in namespace
... skipping 27 lines ...
STEP: Destroying namespace "services-3910" for this suite.
[AfterEach] [sig-network] Services
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/network/service.go:750

•
------------------------------
{"msg":"PASSED [sig-network] Services should find a service from listing all namespaces [Conformance]","total":-1,"completed":10,"skipped":106,"failed":0}

SSSSSS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:11:20.319: INFO: Driver local doesn't support DynamicPV -- skipping
... skipping 73 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/framework.go:23
  Simple pod
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/kubectl.go:376
    should support exec through an HTTP proxy
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/kubectl.go:436
------------------------------
{"msg":"PASSED [sig-cli] Kubectl client Simple pod should support exec through an HTTP proxy","total":-1,"completed":8,"skipped":58,"failed":0}

S
------------------------------
{"msg":"PASSED [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a replica set. [Conformance]","total":-1,"completed":11,"skipped":54,"failed":0}
[BeforeEach] [sig-api-machinery] Servers with support for API chunking
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:10:46.767: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename chunking
STEP: Waiting for a default service account to be provisioned in namespace
... skipping 73 lines ...
• [SLOW TEST:34.185 seconds]
[sig-api-machinery] Servers with support for API chunking
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apimachinery/framework.go:23
  should return chunks of results for list calls
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apimachinery/chunking.go:77
------------------------------
{"msg":"PASSED [sig-api-machinery] Servers with support for API chunking should return chunks of results for list calls","total":-1,"completed":12,"skipped":54,"failed":0}
[BeforeEach] [Testpattern: Dynamic PV (delayed binding)] topology
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:11:20.961: INFO: Only supported for providers [gce gke] (not aws)
[AfterEach] [Testpattern: Dynamic PV (delayed binding)] topology
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 2 lines ...
[sig-storage] In-tree Volumes
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/framework.go:23
  [Driver: windows-gcepd]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Dynamic PV (delayed binding)] topology
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should fail to schedule a pod which has topologies that conflict with AllowedTopologies [BeforeEach]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:192

      Only supported for providers [gce gke] (not aws)

      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/drivers/in_tree.go:1301
------------------------------
... skipping 21 lines ...
May  9 18:10:49.942: INFO: PersistentVolumeClaim pvc-h68p9 found but phase is Pending instead of Bound.
May  9 18:10:52.180: INFO: PersistentVolumeClaim pvc-h68p9 found and phase=Bound (4.711705957s)
May  9 18:10:52.180: INFO: Waiting up to 3m0s for PersistentVolume local-bbslc to have phase Bound
May  9 18:10:52.417: INFO: PersistentVolume local-bbslc found and phase=Bound (236.118523ms)
STEP: Creating pod pod-subpath-test-preprovisionedpv-d6jj
STEP: Creating a pod to test atomic-volume-subpath
May  9 18:10:53.131: INFO: Waiting up to 5m0s for pod "pod-subpath-test-preprovisionedpv-d6jj" in namespace "provisioning-9629" to be "Succeeded or Failed"
May  9 18:10:53.367: INFO: Pod "pod-subpath-test-preprovisionedpv-d6jj": Phase="Pending", Reason="", readiness=false. Elapsed: 236.426165ms
May  9 18:10:55.605: INFO: Pod "pod-subpath-test-preprovisionedpv-d6jj": Phase="Pending", Reason="", readiness=false. Elapsed: 2.473904461s
May  9 18:10:57.842: INFO: Pod "pod-subpath-test-preprovisionedpv-d6jj": Phase="Pending", Reason="", readiness=false. Elapsed: 4.710896879s
May  9 18:11:00.079: INFO: Pod "pod-subpath-test-preprovisionedpv-d6jj": Phase="Pending", Reason="", readiness=false. Elapsed: 6.948153827s
May  9 18:11:02.316: INFO: Pod "pod-subpath-test-preprovisionedpv-d6jj": Phase="Running", Reason="", readiness=true. Elapsed: 9.185446147s
May  9 18:11:04.559: INFO: Pod "pod-subpath-test-preprovisionedpv-d6jj": Phase="Running", Reason="", readiness=true. Elapsed: 11.428399314s
May  9 18:11:06.805: INFO: Pod "pod-subpath-test-preprovisionedpv-d6jj": Phase="Running", Reason="", readiness=true. Elapsed: 13.674126918s
May  9 18:11:09.042: INFO: Pod "pod-subpath-test-preprovisionedpv-d6jj": Phase="Running", Reason="", readiness=true. Elapsed: 15.911753481s
May  9 18:11:11.280: INFO: Pod "pod-subpath-test-preprovisionedpv-d6jj": Phase="Running", Reason="", readiness=true. Elapsed: 18.148843847s
May  9 18:11:13.516: INFO: Pod "pod-subpath-test-preprovisionedpv-d6jj": Phase="Running", Reason="", readiness=true. Elapsed: 20.385642002s
May  9 18:11:15.753: INFO: Pod "pod-subpath-test-preprovisionedpv-d6jj": Phase="Running", Reason="", readiness=true. Elapsed: 22.622559286s
May  9 18:11:17.990: INFO: Pod "pod-subpath-test-preprovisionedpv-d6jj": Phase="Succeeded", Reason="", readiness=false. Elapsed: 24.859572676s
STEP: Saw pod success
May  9 18:11:17.990: INFO: Pod "pod-subpath-test-preprovisionedpv-d6jj" satisfied condition "Succeeded or Failed"
May  9 18:11:18.227: INFO: Trying to get logs from node ip-172-20-57-119.ap-south-1.compute.internal pod pod-subpath-test-preprovisionedpv-d6jj container test-container-subpath-preprovisionedpv-d6jj: <nil>
STEP: delete the pod
May  9 18:11:18.711: INFO: Waiting for pod pod-subpath-test-preprovisionedpv-d6jj to disappear
May  9 18:11:18.948: INFO: Pod pod-subpath-test-preprovisionedpv-d6jj no longer exists
STEP: Deleting pod pod-subpath-test-preprovisionedpv-d6jj
May  9 18:11:18.948: INFO: Deleting pod "pod-subpath-test-preprovisionedpv-d6jj" in namespace "provisioning-9629"
... skipping 19 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Pre-provisioned PV (default fs)] subPath
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should support file as subpath [LinuxOnly]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:230
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]","total":-1,"completed":7,"skipped":35,"failed":0}
[BeforeEach] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:11:22.204: INFO: Only supported for node OS distro [gci ubuntu custom] (not debian)
[AfterEach] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 280 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/csi_volumes.go:40
    [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should create read/write inline ephemeral volume
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/ephemeral.go:161
------------------------------
{"msg":"PASSED [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume","total":-1,"completed":6,"skipped":38,"failed":0}

SSS
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]","total":-1,"completed":10,"skipped":67,"failed":0}
[BeforeEach] [sig-node] Probing container
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:10:59.305: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename container-probe
STEP: Waiting for a default service account to be provisioned in namespace
... skipping 12 lines ...
• [SLOW TEST:29.107 seconds]
[sig-node] Probing container
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/framework.go:23
  should be ready immediately after startupProbe succeeds
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/container_probe.go:380
------------------------------
{"msg":"PASSED [sig-node] Probing container should be ready immediately after startupProbe succeeds","total":-1,"completed":11,"skipped":67,"failed":0}
[BeforeEach] [Testpattern: Inline-volume (default fs)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:11:28.422: INFO: Only supported for node OS distro [gci ubuntu custom] (not debian)
[AfterEach] [Testpattern: Inline-volume (default fs)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 11 lines ...
      Only supported for node OS distro [gci ubuntu custom] (not debian)

      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/drivers/in_tree.go:263
------------------------------
SSS
------------------------------
{"msg":"PASSED [sig-node] NodeLease when the NodeLease feature is enabled the kubelet should create and update a lease in the kube-node-lease namespace","total":-1,"completed":5,"skipped":65,"failed":0}
[BeforeEach] [Testpattern: Inline-volume (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
[BeforeEach] [Testpattern: Inline-volume (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:11:19.878: INFO: >>> kubeConfig: /root/.kube/config
... skipping 43 lines ...
May  9 18:10:58.189: INFO: Using claimSize:1Gi, test suite supported size:{ 1Mi}, driver(aws) supported size:{ 1Mi} 
STEP: creating a StorageClass provisioning-91239v68r
STEP: creating a claim
May  9 18:10:58.432: INFO: Warning: Making PVC: VolumeMode specified as invalid empty string, treating as nil
STEP: Creating pod pod-subpath-test-dynamicpv-r4qg
STEP: Creating a pod to test subpath
May  9 18:10:59.174: INFO: Waiting up to 5m0s for pod "pod-subpath-test-dynamicpv-r4qg" in namespace "provisioning-9123" to be "Succeeded or Failed"
May  9 18:10:59.414: INFO: Pod "pod-subpath-test-dynamicpv-r4qg": Phase="Pending", Reason="", readiness=false. Elapsed: 240.179486ms
May  9 18:11:01.655: INFO: Pod "pod-subpath-test-dynamicpv-r4qg": Phase="Pending", Reason="", readiness=false. Elapsed: 2.480937918s
May  9 18:11:03.896: INFO: Pod "pod-subpath-test-dynamicpv-r4qg": Phase="Pending", Reason="", readiness=false. Elapsed: 4.722343262s
May  9 18:11:06.143: INFO: Pod "pod-subpath-test-dynamicpv-r4qg": Phase="Pending", Reason="", readiness=false. Elapsed: 6.969610109s
May  9 18:11:08.385: INFO: Pod "pod-subpath-test-dynamicpv-r4qg": Phase="Pending", Reason="", readiness=false. Elapsed: 9.211537279s
May  9 18:11:10.627: INFO: Pod "pod-subpath-test-dynamicpv-r4qg": Phase="Pending", Reason="", readiness=false. Elapsed: 11.452922717s
May  9 18:11:12.880: INFO: Pod "pod-subpath-test-dynamicpv-r4qg": Phase="Pending", Reason="", readiness=false. Elapsed: 13.706624987s
May  9 18:11:15.122: INFO: Pod "pod-subpath-test-dynamicpv-r4qg": Phase="Pending", Reason="", readiness=false. Elapsed: 15.948194152s
May  9 18:11:17.363: INFO: Pod "pod-subpath-test-dynamicpv-r4qg": Phase="Pending", Reason="", readiness=false. Elapsed: 18.189666411s
May  9 18:11:19.604: INFO: Pod "pod-subpath-test-dynamicpv-r4qg": Phase="Succeeded", Reason="", readiness=false. Elapsed: 20.430256859s
STEP: Saw pod success
May  9 18:11:19.604: INFO: Pod "pod-subpath-test-dynamicpv-r4qg" satisfied condition "Succeeded or Failed"
May  9 18:11:19.844: INFO: Trying to get logs from node ip-172-20-61-172.ap-south-1.compute.internal pod pod-subpath-test-dynamicpv-r4qg container test-container-subpath-dynamicpv-r4qg: <nil>
STEP: delete the pod
May  9 18:11:20.335: INFO: Waiting for pod pod-subpath-test-dynamicpv-r4qg to disappear
May  9 18:11:20.577: INFO: Pod pod-subpath-test-dynamicpv-r4qg no longer exists
STEP: Deleting pod pod-subpath-test-dynamicpv-r4qg
May  9 18:11:20.578: INFO: Deleting pod "pod-subpath-test-dynamicpv-r4qg" in namespace "provisioning-9123"
... skipping 20 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Dynamic PV (default fs)] subPath
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should support readOnly directory specified in the volumeMount
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:364
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount","total":-1,"completed":6,"skipped":24,"failed":0}

SS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (ext3)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:11:38.504: INFO: Only supported for node OS distro [gci ubuntu custom] (not debian)
... skipping 24 lines ...
STEP: Building a namespace api object, basename projected
STEP: Waiting for a default service account to be provisioned in namespace
[It] should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating projection with secret that has name projected-secret-test-0d6d02c6-9ea7-4428-b176-1d0de3b91367
STEP: Creating a pod to test consume secrets
May  9 18:11:30.109: INFO: Waiting up to 5m0s for pod "pod-projected-secrets-2d6db410-21f4-42ab-8e63-99ba74a8fc39" in namespace "projected-7156" to be "Succeeded or Failed"
May  9 18:11:30.347: INFO: Pod "pod-projected-secrets-2d6db410-21f4-42ab-8e63-99ba74a8fc39": Phase="Pending", Reason="", readiness=false. Elapsed: 238.003729ms
May  9 18:11:32.590: INFO: Pod "pod-projected-secrets-2d6db410-21f4-42ab-8e63-99ba74a8fc39": Phase="Pending", Reason="", readiness=false. Elapsed: 2.481271584s
May  9 18:11:34.830: INFO: Pod "pod-projected-secrets-2d6db410-21f4-42ab-8e63-99ba74a8fc39": Phase="Pending", Reason="", readiness=false. Elapsed: 4.720509582s
May  9 18:11:37.069: INFO: Pod "pod-projected-secrets-2d6db410-21f4-42ab-8e63-99ba74a8fc39": Phase="Succeeded", Reason="", readiness=false. Elapsed: 6.960250447s
STEP: Saw pod success
May  9 18:11:37.069: INFO: Pod "pod-projected-secrets-2d6db410-21f4-42ab-8e63-99ba74a8fc39" satisfied condition "Succeeded or Failed"
May  9 18:11:37.308: INFO: Trying to get logs from node ip-172-20-61-172.ap-south-1.compute.internal pod pod-projected-secrets-2d6db410-21f4-42ab-8e63-99ba74a8fc39 container projected-secret-volume-test: <nil>
STEP: delete the pod
May  9 18:11:37.798: INFO: Waiting for pod pod-projected-secrets-2d6db410-21f4-42ab-8e63-99ba74a8fc39 to disappear
May  9 18:11:38.036: INFO: Pod pod-projected-secrets-2d6db410-21f4-42ab-8e63-99ba74a8fc39 no longer exists
[AfterEach] [sig-storage] Projected secret
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 4 lines ...
• [SLOW TEST:10.079 seconds]
[sig-storage] Projected secret
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/framework.go:23
  should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-storage] Projected secret should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]","total":-1,"completed":12,"skipped":71,"failed":0}

S
------------------------------
[BeforeEach] [Testpattern: Inline-volume (ext4)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:11:38.526: INFO: Driver local doesn't support InlineVolume -- skipping
... skipping 29 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:11:39.736: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
STEP: Destroying namespace "emptydir-9599" for this suite.

•
------------------------------
{"msg":"PASSED [sig-storage] EmptyDir volumes pod should support memory backed volumes of specified size","total":-1,"completed":7,"skipped":29,"failed":0}

SSSSS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:11:40.245: INFO: Driver hostPathSymlink doesn't support DynamicPV -- skipping
... skipping 74 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should not mount / map unused volumes in a pod [LinuxOnly]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volumemode.go:351
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]","total":-1,"completed":5,"skipped":15,"failed":0}

SSSSS
------------------------------
[BeforeEach] [Testpattern: Inline-volume (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:11:41.023: INFO: Driver local doesn't support InlineVolume -- skipping
... skipping 292 lines ...
• [SLOW TEST:75.402 seconds]
[sig-apps] Deployment
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apps/framework.go:23
  iterative rollouts should eventually progress
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apps/deployment.go:130
------------------------------
{"msg":"PASSED [sig-apps] Deployment iterative rollouts should eventually progress","total":-1,"completed":7,"skipped":70,"failed":0}

SSSS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:11:41.160: INFO: Only supported for providers [vsphere] (not aws)
... skipping 14 lines ...
      Only supported for providers [vsphere] (not aws)

      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/drivers/in_tree.go:1437
------------------------------
S
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]","total":-1,"completed":6,"skipped":65,"failed":0}
[BeforeEach] [sig-storage] Projected downwardAPI
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:11:37.851: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename projected
STEP: Waiting for a default service account to be provisioned in namespace
[BeforeEach] [sig-storage] Projected downwardAPI
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/projected_downwardapi.go:41
[It] should set DefaultMode on files [LinuxOnly] [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating a pod to test downward API volume plugin
May  9 18:11:39.301: INFO: Waiting up to 5m0s for pod "downwardapi-volume-6c28b516-a8a0-4d71-86c4-7b79728e6663" in namespace "projected-1813" to be "Succeeded or Failed"
May  9 18:11:39.541: INFO: Pod "downwardapi-volume-6c28b516-a8a0-4d71-86c4-7b79728e6663": Phase="Pending", Reason="", readiness=false. Elapsed: 240.70729ms
May  9 18:11:41.788: INFO: Pod "downwardapi-volume-6c28b516-a8a0-4d71-86c4-7b79728e6663": Phase="Succeeded", Reason="", readiness=false. Elapsed: 2.487004763s
STEP: Saw pod success
May  9 18:11:41.788: INFO: Pod "downwardapi-volume-6c28b516-a8a0-4d71-86c4-7b79728e6663" satisfied condition "Succeeded or Failed"
May  9 18:11:42.028: INFO: Trying to get logs from node ip-172-20-61-172.ap-south-1.compute.internal pod downwardapi-volume-6c28b516-a8a0-4d71-86c4-7b79728e6663 container client-container: <nil>
STEP: delete the pod
May  9 18:11:42.517: INFO: Waiting for pod downwardapi-volume-6c28b516-a8a0-4d71-86c4-7b79728e6663 to disappear
May  9 18:11:42.757: INFO: Pod downwardapi-volume-6c28b516-a8a0-4d71-86c4-7b79728e6663 no longer exists
[AfterEach] [sig-storage] Projected downwardAPI
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 26 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
May  9 18:11:43.871: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready
STEP: Destroying namespace "events-2181" for this suite.

•
------------------------------
{"msg":"PASSED [sig-instrumentation] Events API should delete a collection of events [Conformance]","total":-1,"completed":8,"skipped":76,"failed":0}

SS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (block volmode)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
[BeforeEach] [Testpattern: Dynamic PV (block volmode)] volumes
... skipping 150 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/csi_volumes.go:40
    [Testpattern: Dynamic PV (block volmode)] volumes
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should store data
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volumes.go:159
------------------------------
{"msg":"PASSED [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volumes should store data","total":-1,"completed":5,"skipped":21,"failed":0}

SSS
------------------------------
[BeforeEach] [sig-cli] Kubectl client
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 102 lines ...
May  9 18:11:36.145: INFO: PersistentVolumeClaim pvc-zthg5 found but phase is Pending instead of Bound.
May  9 18:11:38.390: INFO: PersistentVolumeClaim pvc-zthg5 found and phase=Bound (9.21577695s)
May  9 18:11:38.390: INFO: Waiting up to 3m0s for PersistentVolume local-flxb5 to have phase Bound
May  9 18:11:38.630: INFO: PersistentVolume local-flxb5 found and phase=Bound (240.017934ms)
STEP: Creating pod pod-subpath-test-preprovisionedpv-5nrq
STEP: Creating a pod to test subpath
May  9 18:11:39.354: INFO: Waiting up to 5m0s for pod "pod-subpath-test-preprovisionedpv-5nrq" in namespace "provisioning-7089" to be "Succeeded or Failed"
May  9 18:11:39.594: INFO: Pod "pod-subpath-test-preprovisionedpv-5nrq": Phase="Pending", Reason="", readiness=false. Elapsed: 239.720713ms
May  9 18:11:41.834: INFO: Pod "pod-subpath-test-preprovisionedpv-5nrq": Phase="Pending", Reason="", readiness=false. Elapsed: 2.479759147s
May  9 18:11:44.076: INFO: Pod "pod-subpath-test-preprovisionedpv-5nrq": Phase="Succeeded", Reason="", readiness=false. Elapsed: 4.722266384s
STEP: Saw pod success
May  9 18:11:44.076: INFO: Pod "pod-subpath-test-preprovisionedpv-5nrq" satisfied condition "Succeeded or Failed"
May  9 18:11:44.317: INFO: Trying to get logs from node ip-172-20-57-119.ap-south-1.compute.internal pod pod-subpath-test-preprovisionedpv-5nrq container test-container-subpath-preprovisionedpv-5nrq: <nil>
STEP: delete the pod
May  9 18:11:44.807: INFO: Waiting for pod pod-subpath-test-preprovisionedpv-5nrq to disappear
May  9 18:11:45.047: INFO: Pod pod-subpath-test-preprovisionedpv-5nrq no longer exists
STEP: Deleting pod pod-subpath-test-preprovisionedpv-5nrq
May  9 18:11:45.047: INFO: Deleting pod "pod-subpath-test-preprovisionedpv-5nrq" in namespace "provisioning-7089"
... skipping 19 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Pre-provisioned PV (default fs)] subPath
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should support readOnly file specified in the volumeMount [LinuxOnly]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:379
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]","total":-1,"completed":13,"skipped":58,"failed":0}
[BeforeEach] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:11:48.315: INFO: Only supported for providers [azure] (not aws)
[AfterEach] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 141 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/framework.go:23
  Kubectl apply
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/kubectl.go:793
    apply set/view last-applied
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/kubectl.go:828
------------------------------
{"msg":"PASSED [sig-cli] Kubectl client Kubectl apply apply set/view last-applied","total":-1,"completed":6,"skipped":40,"failed":0}

S
------------------------------
[BeforeEach] [sig-network] NetworkPolicy API
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
... skipping 239 lines ...
      Driver hostPath doesn't support DynamicPV -- skipping

      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:116
------------------------------
S
------------------------------
{"msg":"PASSED [sig-cli] Kubectl client Simple pod should support port-forward","total":-1,"completed":9,"skipped":38,"failed":0}
[BeforeEach] [sig-storage] EmptyDir volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:11:46.236: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename emptydir
STEP: Waiting for a default service account to be provisioned in namespace
[BeforeEach] when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/empty_dir.go:50
[It] volume on tmpfs should have the correct mode using FSGroup
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/empty_dir.go:75
STEP: Creating a pod to test emptydir volume type on tmpfs
May  9 18:11:47.683: INFO: Waiting up to 5m0s for pod "pod-b1a074a2-a802-4518-8d0b-0656c01d3088" in namespace "emptydir-3922" to be "Succeeded or Failed"
May  9 18:11:47.917: INFO: Pod "pod-b1a074a2-a802-4518-8d0b-0656c01d3088": Phase="Pending", Reason="", readiness=false. Elapsed: 234.633434ms
May  9 18:11:50.153: INFO: Pod "pod-b1a074a2-a802-4518-8d0b-0656c01d3088": Phase="Pending", Reason="", readiness=false. Elapsed: 2.470099013s
May  9 18:11:52.388: INFO: Pod "pod-b1a074a2-a802-4518-8d0b-0656c01d3088": Phase="Succeeded", Reason="", readiness=false. Elapsed: 4.705613761s
STEP: Saw pod success
May  9 18:11:52.388: INFO: Pod "pod-b1a074a2-a802-4518-8d0b-0656c01d3088" satisfied condition "Succeeded or Failed"
May  9 18:11:52.623: INFO: Trying to get logs from node ip-172-20-61-172.ap-south-1.compute.internal pod pod-b1a074a2-a802-4518-8d0b-0656c01d3088 container test-container: <nil>
STEP: delete the pod
May  9 18:11:53.101: INFO: Waiting for pod pod-b1a074a2-a802-4518-8d0b-0656c01d3088 to disappear
May  9 18:11:53.336: INFO: Pod pod-b1a074a2-a802-4518-8d0b-0656c01d3088 no longer exists
[AfterEach] [sig-storage] EmptyDir volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 6 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/framework.go:23
  when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/empty_dir.go:48
    volume on tmpfs should have the correct mode using FSGroup
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/empty_dir.go:75
------------------------------
{"msg":"PASSED [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] volume on tmpfs should have the correct mode using FSGroup","total":-1,"completed":10,"skipped":38,"failed":0}
[BeforeEach] [Testpattern: Dynamic PV (block volmode)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:11:53.816: INFO: Only supported for providers [azure] (not aws)
[AfterEach] [Testpattern: Dynamic PV (block volmode)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 44 lines ...
• [SLOW TEST:10.044 seconds]
[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin]
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/apimachinery/framework.go:23
  should mutate configmap [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate configmap [Conformance]","total":-1,"completed":6,"skipped":24,"failed":0}

SS
------------------------------
{"msg":"PASSED [sig-network] NetworkPolicy API should support creating NetworkPolicy API operations","total":-1,"completed":9,"skipped":78,"failed":0}
[BeforeEach] [sig-storage] Projected configMap
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:11:50.766: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename projected
STEP: Waiting for a default service account to be provisioned in namespace
[It] should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating configMap with name projected-configmap-test-volume-ab615d7b-a64c-4077-8fc4-cc4f08e61c8c
STEP: Creating a pod to test consume configMaps
May  9 18:11:52.476: INFO: Waiting up to 5m0s for pod "pod-projected-configmaps-34566b99-da65-4531-9a9f-e4b2750caa78" in namespace "projected-2457" to be "Succeeded or Failed"
May  9 18:11:52.720: INFO: Pod "pod-projected-configmaps-34566b99-da65-4531-9a9f-e4b2750caa78": Phase="Pending", Reason="", readiness=false. Elapsed: 243.723487ms
May  9 18:11:54.964: INFO: Pod "pod-projected-configmaps-34566b99-da65-4531-9a9f-e4b2750caa78": Phase="Succeeded", Reason="", readiness=false. Elapsed: 2.487883063s
STEP: Saw pod success
May  9 18:11:54.964: INFO: Pod "pod-projected-configmaps-34566b99-da65-4531-9a9f-e4b2750caa78" satisfied condition "Succeeded or Failed"
May  9 18:11:55.208: INFO: Trying to get logs from node ip-172-20-33-176.ap-south-1.compute.internal pod pod-projected-configmaps-34566b99-da65-4531-9a9f-e4b2750caa78 container projected-configmap-volume-test: <nil>
STEP: delete the pod
May  9 18:11:55.703: INFO: Waiting for pod pod-projected-configmaps-34566b99-da65-4531-9a9f-e4b2750caa78 to disappear
May  9 18:11:55.947: INFO: Pod pod-projected-configmaps-34566b99-da65-4531-9a9f-e4b2750caa78 no longer exists
[AfterEach] [sig-storage] Projected configMap
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 35 lines ...
STEP: Waiting for a default service account to be provisioned in namespace
[BeforeEach] [sig-storage] Downward API volume
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/downwardapi_volume.go:41
[It] should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating a pod to test downward API volume plugin
May  9 18:11:51.509: INFO: Waiting up to 5m0s for pod "downwardapi-volume-d9ec3acb-d265-45de-9c6d-8c26cd1378b5" in namespace "downward-api-9667" to be "Succeeded or Failed"
May  9 18:11:51.754: INFO: Pod "downwardapi-volume-d9ec3acb-d265-45de-9c6d-8c26cd1378b5": Phase="Pending", Reason="", readiness=false. Elapsed: 245.50688ms
May  9 18:11:53.995: INFO: Pod "downwardapi-volume-d9ec3acb-d265-45de-9c6d-8c26cd1378b5": Phase="Pending", Reason="", readiness=false. Elapsed: 2.486090119s
May  9 18:11:56.235: INFO: Pod "downwardapi-volume-d9ec3acb-d265-45de-9c6d-8c26cd1378b5": Phase="Succeeded", Reason="", readiness=false. Elapsed: 4.726729554s
STEP: Saw pod success
May  9 18:11:56.235: INFO: Pod "downwardapi-volume-d9ec3acb-d265-45de-9c6d-8c26cd1378b5" satisfied condition "Succeeded or Failed"
May  9 18:11:56.476: INFO: Trying to get logs from node ip-172-20-61-172.ap-south-1.compute.internal pod downwardapi-volume-d9ec3acb-d265-45de-9c6d-8c26cd1378b5 container client-container: <nil>
STEP: delete the pod
May  9 18:11:56.978: INFO: Waiting for pod downwardapi-volume-d9ec3acb-d265-45de-9c6d-8c26cd1378b5 to disappear
May  9 18:11:57.221: INFO: Pod downwardapi-volume-d9ec3acb-d265-45de-9c6d-8c26cd1378b5 no longer exists
[AfterEach] [sig-storage] Downward API volume
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 4 lines ...
• [SLOW TEST:7.643 seconds]
[sig-storage] Downward API volume
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/framework.go:23
  should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-storage] Downward API volume should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]","total":-1,"completed":14,"skipped":72,"failed":0}

SSSSSS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:11:57.735: INFO: Only supported for providers [gce gke] (not aws)
... skipping 60 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/in_tree_volumes.go:58
    [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should resize volume when PVC is edited while pod is using it
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:246
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it","total":-1,"completed":7,"skipped":39,"failed":0}
[BeforeEach] [Testpattern: Inline-volume (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:11:58.580: INFO: Only supported for providers [azure] (not aws)
[AfterEach] [Testpattern: Inline-volume (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186

... skipping 87 lines ...
May  9 18:11:23.540: INFO: PersistentVolumeClaim pvc-mgkcj found and phase=Bound (239.705523ms)
STEP: Deleting the previously created pod
May  9 18:11:33.742: INFO: Deleting pod "pvc-volume-tester-9msjd" in namespace "csi-mock-volumes-2093"
May  9 18:11:33.985: INFO: Wait up to 5m0s for pod "pvc-volume-tester-9msjd" to be fully deleted
STEP: Checking CSI driver logs
May  9 18:11:36.726: INFO: Found volume attribute csi.storage.k8s.io/serviceAccount.tokens: {"":{"token":"eyJhbGciOiJSUzI1NiIsImtpZCI6InlGaW9mUWZaWHBERTBqSjhBM2pwOGZ2NlRYRmJXaDdTMEN1UDBJZGJGY1kifQ.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.ZdYqaywCPgl22Ha_BnKzoRLPAEp7HU5PGr61dDSkNh07Js5RdET9QKSHNS-wfgg77zBwf7rjjYSVP1RlclM3e7znPxMPLjJ6FvpUs71LOMGYLUBnLIX4M7us2yTImQmi6ad080lQYdaynwEBPK5cVpHRFsAuEkgIx5Z-L14zNObb04CZwAWdHhcw0WD3UiTbzTULYTZRlOUKlA5lb2Asvt2rnBJTePFpX2_KkYZBbtgT-exzkkrYxzvgzLGEIgcnGBzFCskUo8bUKJV_j3SnZrbUFt-wnLBx9TGDzBIQVdc-WT-COSrTQCKKff_CU8gVGQm0JW_vF541ryW4YoZm4w","expirationTimestamp":"2021-05-09T18:21:29Z"}}
May  9 18:11:36.726: INFO: Found NodeUnpublishVolume: {json: {"Method":"/csi.v1.Node/NodeUnpublishVolume","Request":{"volume_id":"4","target_path":"/var/lib/kubelet/pods/1108010d-b455-4d53-82c0-6fa48ea1305f/volumes/kubernetes.io~csi/pvc-5dbceaca-d753-4e0f-bc3f-05603cde334e/mount"},"Response":{},"Error":"","FullError":null} Method:NodeUnpublishVolume Request:{VolumeContext:map[]} FullError:{Code:OK Message:} Error:}
STEP: Deleting pod pvc-volume-tester-9msjd
May  9 18:11:36.726: INFO: Deleting pod "pvc-volume-tester-9msjd" in namespace "csi-mock-volumes-2093"
STEP: Deleting claim pvc-mgkcj
May  9 18:11:37.447: INFO: Waiting up to 2m0s for PersistentVolume pvc-5dbceaca-d753-4e0f-bc3f-05603cde334e to get deleted
May  9 18:11:37.686: INFO: PersistentVolume pvc-5dbceaca-d753-4e0f-bc3f-05603cde334e was removed
STEP: Deleting storageclass csi-mock-volumes-2093-scj45qt
... skipping 44 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/framework.go:23
  CSIServiceAccountToken
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/csi_mock_volume.go:1374
    token should be plumbed down when csiServiceAccountTokenEnabled=true
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/csi_mock_volume.go:1402
------------------------------
{"msg":"PASSED [sig-storage] CSI mock volume CSIServiceAccountToken token should be plumbed down when csiServiceAccountTokenEnabled=true","total":-1,"completed":8,"skipped":31,"failed":0}

SS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (block volmode)] volumeMode
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
[BeforeEach] [Testpattern: Dynamic PV (block volmode)] volumeMode
... skipping 53 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/runtime.go:41
    on terminated container
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/runtime.go:134
      should report termination message [LinuxOnly] if TerminationMessagePath is set as non-root user and at a non-default path [NodeConformance] [Conformance]
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-node] Container Runtime blackbox test on terminated container should report termination message [LinuxOnly] if TerminationMessagePath is set as non-root user and at a non-default path [NodeConformance] [Conformance]","total":-1,"completed":7,"skipped":26,"failed":0}

SS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:12:00.645: INFO: Driver local doesn't support DynamicPV -- skipping
... skipping 102 lines ...
May  9 18:11:53.665: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename emptydir
STEP: Waiting for a default service account to be provisioned in namespace
[It] should support (non-root,0666,default) [LinuxOnly] [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating a pod to test emptydir 0666 on node default medium
May  9 18:11:55.095: INFO: Waiting up to 5m0s for pod "pod-979c46bd-266e-4b69-a420-7c3a8bf74a8e" in namespace "emptydir-9740" to be "Succeeded or Failed"
May  9 18:11:55.335: INFO: Pod "pod-979c46bd-266e-4b69-a420-7c3a8bf74a8e": Phase="Pending", Reason="", readiness=false. Elapsed: 240.781264ms
May  9 18:11:57.584: INFO: Pod "pod-979c46bd-266e-4b69-a420-7c3a8bf74a8e": Phase="Pending", Reason="", readiness=false. Elapsed: 2.489555215s
May  9 18:11:59.822: INFO: Pod "pod-979c46bd-266e-4b69-a420-7c3a8bf74a8e": Phase="Succeeded", Reason="", readiness=false. Elapsed: 4.727667004s
STEP: Saw pod success
May  9 18:11:59.822: INFO: Pod "pod-979c46bd-266e-4b69-a420-7c3a8bf74a8e" satisfied condition "Succeeded or Failed"
May  9 18:12:00.059: INFO: Trying to get logs from node ip-172-20-61-172.ap-south-1.compute.internal pod pod-979c46bd-266e-4b69-a420-7c3a8bf74a8e container test-container: <nil>
STEP: delete the pod
May  9 18:12:00.549: INFO: Waiting for pod pod-979c46bd-266e-4b69-a420-7c3a8bf74a8e to disappear
May  9 18:12:00.786: INFO: Pod pod-979c46bd-266e-4b69-a420-7c3a8bf74a8e no longer exists
[AfterEach] [sig-storage] EmptyDir volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 75 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/persistent_volumes-local.go:192
    One pod requesting one prebound PVC
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/persistent_volumes-local.go:209
      should be able to mount volume and read from pod1
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/persistent_volumes-local.go:232
------------------------------
{"msg":"PASSED [sig-storage] PersistentVolumes-local  [Volume type: blockfswithoutformat] One pod requesting one prebound PVC should be able to mount volume and read from pod1","total":-1,"completed":8,"skipped":35,"failed":0}

S
------------------------------
[BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
[BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath
... skipping 15 lines ...
May  9 18:11:50.928: INFO: PersistentVolumeClaim pvc-6nd87 found but phase is Pending instead of Bound.
May  9 18:11:53.167: INFO: PersistentVolumeClaim pvc-6nd87 found and phase=Bound (2.477186272s)
May  9 18:11:53.167: INFO: Waiting up to 3m0s for PersistentVolume local-xjxt9 to have phase Bound
May  9 18:11:53.406: INFO: PersistentVolume local-xjxt9 found and phase=Bound (238.319164ms)
STEP: Creating pod pod-subpath-test-preprovisionedpv-pj4r
STEP: Creating a pod to test subpath
May  9 18:11:54.129: INFO: Waiting up to 5m0s for pod "pod-subpath-test-preprovisionedpv-pj4r" in namespace "provisioning-5884" to be "Succeeded or Failed"
May  9 18:11:54.367: INFO: Pod "pod-subpath-test-preprovisionedpv-pj4r": Phase="Pending", Reason="", readiness=false. Elapsed: 238.55008ms
May  9 18:11:56.607: INFO: Pod "pod-subpath-test-preprovisionedpv-pj4r": Phase="Pending", Reason="", readiness=false. Elapsed: 2.477753568s
May  9 18:11:58.847: INFO: Pod "pod-subpath-test-preprovisionedpv-pj4r": Phase="Succeeded", Reason="", readiness=false. Elapsed: 4.717707523s
STEP: Saw pod success
May  9 18:11:58.847: INFO: Pod "pod-subpath-test-preprovisionedpv-pj4r" satisfied condition "Succeeded or Failed"
May  9 18:11:59.086: INFO: Trying to get logs from node ip-172-20-33-8.ap-south-1.compute.internal pod pod-subpath-test-preprovisionedpv-pj4r container test-container-subpath-preprovisionedpv-pj4r: <nil>
STEP: delete the pod
May  9 18:11:59.573: INFO: Waiting for pod pod-subpath-test-preprovisionedpv-pj4r to disappear
May  9 18:11:59.812: INFO: Pod pod-subpath-test-preprovisionedpv-pj4r no longer exists
STEP: Deleting pod pod-subpath-test-preprovisionedpv-pj4r
May  9 18:11:59.812: INFO: Deleting pod "pod-subpath-test-preprovisionedpv-pj4r" in namespace "provisioning-5884"
STEP: Creating pod pod-subpath-test-preprovisionedpv-pj4r
STEP: Creating a pod to test subpath
May  9 18:12:00.289: INFO: Waiting up to 5m0s for pod "pod-subpath-test-preprovisionedpv-pj4r" in namespace "provisioning-5884" to be "Succeeded or Failed"
May  9 18:12:00.528: INFO: Pod "pod-subpath-test-preprovisionedpv-pj4r": Phase="Pending", Reason="", readiness=false. Elapsed: 239.133798ms
May  9 18:12:02.768: INFO: Pod "pod-subpath-test-preprovisionedpv-pj4r": Phase="Succeeded", Reason="", readiness=false. Elapsed: 2.478987299s
STEP: Saw pod success
May  9 18:12:02.768: INFO: Pod "pod-subpath-test-preprovisionedpv-pj4r" satisfied condition "Succeeded or Failed"
May  9 18:12:03.006: INFO: Trying to get logs from node ip-172-20-33-8.ap-south-1.compute.internal pod pod-subpath-test-preprovisionedpv-pj4r container test-container-subpath-preprovisionedpv-pj4r: <nil>
STEP: delete the pod
May  9 18:12:03.492: INFO: Waiting for pod pod-subpath-test-preprovisionedpv-pj4r to disappear
May  9 18:12:03.730: INFO: Pod pod-subpath-test-preprovisionedpv-pj4r no longer exists
STEP: Deleting pod pod-subpath-test-preprovisionedpv-pj4r
May  9 18:12:03.730: INFO: Deleting pod "pod-subpath-test-preprovisionedpv-pj4r" in namespace "provisioning-5884"
... skipping 75 lines ...
May  9 18:11:09.111: INFO: Waiting up to timeout=5m0s for PersistentVolumeClaims [pvc-pstl9] to have phase Bound
May  9 18:11:09.347: INFO: PersistentVolumeClaim pvc-pstl9 found and phase=Bound (235.958705ms)
STEP: Deleting the previously created pod
May  9 18:11:16.533: INFO: Deleting pod "pvc-volume-tester-4zgwb" in namespace "csi-mock-volumes-9115"
May  9 18:11:16.771: INFO: Wait up to 5m0s for pod "pvc-volume-tester-4zgwb" to be fully deleted
STEP: Checking CSI driver logs
May  9 18:11:23.493: INFO: Found NodeUnpublishVolume: {json: {"Method":"/csi.v1.Node/NodeUnpublishVolume","Request":{"volume_id":"4","target_path":"/var/lib/kubelet/pods/9c405fad-104c-4ae7-ba4a-04c0c125243f/volumes/kubernetes.io~csi/pvc-9f7007b9-8bf3-49a1-8f79-c0275878b255/mount"},"Response":{},"Error":"","FullError":null} Method:NodeUnpublishVolume Request:{VolumeContext:map[]} FullError:{Code:OK Message:} Error:}
STEP: Deleting pod pvc-volume-tester-4zgwb
May  9 18:11:23.494: INFO: Deleting pod "pvc-volume-tester-4zgwb" in namespace "csi-mock-volumes-9115"
STEP: Deleting claim pvc-pstl9
May  9 18:11:24.203: INFO: Waiting up to 2m0s for PersistentVolume pvc-9f7007b9-8bf3-49a1-8f79-c0275878b255 to get deleted
May  9 18:11:24.440: INFO: PersistentVolume pvc-9f7007b9-8bf3-49a1-8f79-c0275878b255 was removed
STEP: Deleting storageclass csi-mock-volumes-9115-scdghxt
... skipping 44 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/framework.go:23
  CSI workload information using mock driver
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/csi_mock_volume.go:443
    should not be passed when podInfoOnMount=false
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/csi_mock_volume.go:493
------------------------------
{"msg":"PASSED [sig-storage] CSI mock volume CSI workload information using mock driver should not be passed when podInfoOnMount=false","total":-1,"completed":10,"skipped":59,"failed":0}

SSSS
------------------------------
[BeforeEach] [Testpattern: Inline-volume (default fs)] subPath
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:12:07.627: INFO: Driver supports dynamic provisioning, skipping InlineVolume pattern
... skipping 35 lines ...
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volumes.go:196

      Driver hostPathSymlink doesn't support PreprovisionedPV -- skipping

      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:116
------------------------------
{"msg":"PASSED [sig-storage] Projected downwardAPI should set DefaultMode on files [LinuxOnly] [NodeConformance] [Conformance]","total":-1,"completed":7,"skipped":65,"failed":0}
[BeforeEach] [sig-node] Container Lifecycle Hook
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:11:43.246: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename container-lifecycle-hook
STEP: Waiting for a default service account to be provisioned in namespace
... skipping 37 lines ...
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/framework.go:23
  when create a pod with lifecycle hook
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/lifecycle_hook.go:43
    should execute poststart exec hook properly [NodeConformance] [Conformance]
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart exec hook properly [NodeConformance] [Conformance]","total":-1,"completed":8,"skipped":65,"failed":0}

SS
------------------------------
[BeforeEach] [Testpattern: Inline-volume (ext4)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:12:07.887: INFO: Driver local doesn't support InlineVolume -- skipping
... skipping 60 lines ...
      Driver "nfs" does not support volume expansion - skipping

      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:94
------------------------------
SSSSS
------------------------------
{"msg":"PASSED [sig-node] Probing container with readiness probe that fails should never be ready and never restart [NodeConformance] [Conformance]","total":-1,"completed":10,"skipped":85,"failed":0}
[BeforeEach] [sig-node] Probing container
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:11:47.111: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename container-probe
STEP: Waiting for a default service account to be provisioned in namespace
... skipping 22 lines ...
• [SLOW TEST:22.694 seconds]
[sig-node] Probing container
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/node/framework.go:23
  with readiness probe should not be ready before initial delay and never restart [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-node] Probing container with readiness probe should not be ready before initial delay and never restart [NodeConformance] [Conformance]","total":-1,"completed":11,"skipped":85,"failed":0}

S
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:12:09.818: INFO: Driver local doesn't support DynamicPV -- skipping
... skipping 157 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/csi_volumes.go:40
    [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      should support multiple inline ephemeral volumes
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/ephemeral.go:211
------------------------------
{"msg":"PASSED [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes","total":-1,"completed":2,"skipped":3,"failed":0}

SSSSS
------------------------------
[BeforeEach] [Testpattern: Dynamic PV (default fs)] volumes
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:51
May  9 18:12:10.496: INFO: Driver local doesn't support DynamicPV -- skipping
... skipping 205 lines ...
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/csi_volumes.go:40
    [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand
    /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/framework/testsuite.go:50
      Verify if offline PVC expansion works
      /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:174
------------------------------
{"msg":"PASSED [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works","total":-1,"completed":6,"skipped":21,"failed":0}

SS
------------------------------
{"msg":"PASSED [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource","total":-1,"completed":13,"skipped":76,"failed":0}
[BeforeEach] [sig-storage] Downward API volume
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:12:06.966: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename downward-api
STEP: Waiting for a default service account to be provisioned in namespace
[BeforeEach] [sig-storage] Downward API volume
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/downwardapi_volume.go:41
[It] should provide container's cpu request [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
STEP: Creating a pod to test downward API volume plugin
May  9 18:12:08.399: INFO: Waiting up to 5m0s for pod "downwardapi-volume-30b162e4-a78b-4bf8-bcdf-9cf96226dfa9" in namespace "downward-api-3739" to be "Succeeded or Failed"
May  9 18:12:08.640: INFO: Pod "downwardapi-volume-30b162e4-a78b-4bf8-bcdf-9cf96226dfa9": Phase="Pending", Reason="", readiness=false. Elapsed: 241.118634ms
May  9 18:12:10.880: INFO: Pod "downwardapi-volume-30b162e4-a78b-4bf8-bcdf-9cf96226dfa9": Phase="Succeeded", Reason="", readiness=false. Elapsed: 2.481619708s
STEP: Saw pod success
May  9 18:12:10.881: INFO: Pod "downwardapi-volume-30b162e4-a78b-4bf8-bcdf-9cf96226dfa9" satisfied condition "Succeeded or Failed"
May  9 18:12:11.120: INFO: Trying to get logs from node ip-172-20-33-176.ap-south-1.compute.internal pod downwardapi-volume-30b162e4-a78b-4bf8-bcdf-9cf96226dfa9 container client-container: <nil>
STEP: delete the pod
May  9 18:12:11.615: INFO: Waiting for pod downwardapi-volume-30b162e4-a78b-4bf8-bcdf-9cf96226dfa9 to disappear
May  9 18:12:11.856: INFO: Pod downwardapi-volume-30b162e4-a78b-4bf8-bcdf-9cf96226dfa9 no longer exists
[AfterEach] [sig-storage] Downward API volume
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186
... skipping 4 lines ...
• [SLOW TEST:5.383 seconds]
[sig-storage] Downward API volume
/workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/common/storage/framework.go:23
  should provide container's cpu request [NodeConformance] [Conformance]
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:630
------------------------------
{"msg":"PASSED [sig-storage] Downward API volume should provide container's cpu request [NodeConformance] [Conformance]","total":-1,"completed":14,"skipped":76,"failed":0}

S
------------------------------
{"msg":"PASSED [sig-network] EndpointSliceMirroring should mirror a custom Endpoints resource through create update and delete [Conformance]","total":-1,"completed":11,"skipped":39,"failed":0}
[BeforeEach] [sig-cli] Kubectl client
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185
STEP: Creating a kubernetes client
May  9 18:11:57.152: INFO: >>> kubeConfig: /root/.kube/config
STEP: Building a namespace api object, basename kubectl
STEP: Waiting for a default service account to be provisioned in namespace
[BeforeEach] [sig-cli] Kubectl client
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/kubectl.go:241
[It] should check if cluster-info dump succeeds
  /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubectl/kubectl.go:1078
STEP: running cluster-info dump
May  9 18:11:58.328: INFO: Running '/tmp/kubectl3539518766/kubectl --server=https://api.e2e-394a1565f9-8b358.test-cncf-aws.k8s.io --kubeconfig=/root/.kube/config --namespace=kubectl-7059 cluster-info dump'
May  9 18:12:14.193: INFO: stderr: ""
May  9 18:12:14.196: INFO: stdout: "{\n    \"kind\": \"NodeList\",\n    \"apiVersion\": \"v1\",\n    \"metadata\": {\n        \"resourceVersion\": \"12297\"\n    },\n    \"items\": [\n        {\n            \"metadata\": {\n                \"name\": \"ip-172-20-33-176.ap-south-1.compute.internal\",\n                \"uid\": \"365c679e-1e97-4908-8c44-7bcca9ad7b7d\",\n                \"resourceVersion\": \"11620\",\n                \"creationTimestamp\": \"2021-05-09T18:04:41Z\",\n                \"labels\": {\n                    \"beta.kubernetes.io/arch\": \"amd64\",\n                    \"beta.kubernetes.io/instance-type\": \"t3.medium\",\n                    \"beta.kubernetes.io/os\": \"linux\",\n                    \"failure-domain.beta.kubernetes.io/region\": \"ap-south-1\",\n                    \"failure-domain.beta.kubernetes.io/zone\": \"ap-south-1a\",\n                    \"kops.k8s.io/instancegroup\": \"nodes-ap-south-1a\",\n                    \"kubernetes.io/arch\": \"amd64\",\n                    \"kubernetes.io/hostname\": \"ip-172-20-33-176.ap-south-1.compute.internal\",\n                    \"kubernetes.io/os\": \"linux\",\n                    \"kubernetes.io/role\": \"node\",\n                    \"node-role.kubernetes.io/node\": \"\",\n                    \"node.kubernetes.io/instance-type\": \"t3.medium\",\n                    \"topology.ebs.csi.aws.com/zone\": \"ap-south-1a\",\n                    \"topology.hostpath.csi/node\": \"ip-172-20-33-176.ap-south-1.compute.internal\",\n                    \"topology.kubernetes.io/region\": \"ap-south-1\",\n                    \"topology.kubernetes.io/zone\": \"ap-south-1a\"\n                },\n                \"annotations\": {\n                    \"csi.volume.kubernetes.io/nodeid\": \"{\\\"csi-hostpath-ephemeral-4392\\\":\\\"ip-172-20-33-176.ap-south-1.compute.internal\\\",\\\"csi-hostpath-provisioning-3315\\\":\\\"ip-172-20-33-176.ap-south-1.compute.internal\\\",\\\"ebs.csi.aws.com\\\":\\\"i-04ba9d58b3f67a658\\\"}\",\n                    \"node.alpha.kubernetes.io/ttl\": \"0\",\n                    \"volumes.kubernetes.io/controller-managed-attach-detach\": \"true\"\n                }\n            },\n            \"spec\": {\n                \"podCIDR\": \"100.96.1.0/24\",\n                \"podCIDRs\": [\n                    \"100.96.1.0/24\"\n                ],\n                \"providerID\": \"aws:///ap-south-1a/i-04ba9d58b3f67a658\"\n            },\n            \"status\": {\n                \"capacity\": {\n                    \"cpu\": \"2\",\n                    \"ephemeral-storage\": \"48725632Ki\",\n                    \"hugepages-1Gi\": \"0\",\n                    \"hugepages-2Mi\": \"0\",\n                    \"memory\": \"3969484Ki\",\n                    \"pods\": \"110\"\n                },\n                \"allocatable\": {\n                    \"cpu\": \"2\",\n                    \"ephemeral-storage\": \"44905542377\",\n                    \"hugepages-1Gi\": \"0\",\n                    \"hugepages-2Mi\": \"0\",\n                    \"memory\": \"3867084Ki\",\n                    \"pods\": \"110\"\n                },\n                \"conditions\": [\n                    {\n                        \"type\": \"NetworkUnavailable\",\n                        \"status\": \"False\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:04:49Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:04:49Z\",\n                        \"reason\": \"RouteCreated\",\n                        \"message\": \"RouteController created a route\"\n                    },\n                    {\n                        \"type\": \"MemoryPressure\",\n                        \"status\": \"False\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:11:43Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:04:41Z\",\n                        \"reason\": \"KubeletHasSufficientMemory\",\n                        \"message\": \"kubelet has sufficient memory available\"\n                    },\n                    {\n                        \"type\": \"DiskPressure\",\n                        \"status\": \"False\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:11:43Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:04:41Z\",\n                        \"reason\": \"KubeletHasNoDiskPressure\",\n                        \"message\": \"kubelet has no disk pressure\"\n                    },\n                    {\n                        \"type\": \"PIDPressure\",\n                        \"status\": \"False\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:11:43Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:04:41Z\",\n                        \"reason\": \"KubeletHasSufficientPID\",\n                        \"message\": \"kubelet has sufficient PID available\"\n                    },\n                    {\n                        \"type\": \"Ready\",\n                        \"status\": \"True\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:11:43Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:04:42Z\",\n                        \"reason\": \"KubeletReady\",\n                        \"message\": \"kubelet is posting ready status. AppArmor enabled\"\n                    }\n                ],\n                \"addresses\": [\n                    {\n                        \"type\": \"InternalIP\",\n                        \"address\": \"172.20.33.176\"\n                    },\n                    {\n                        \"type\": \"ExternalIP\",\n                        \"address\": \"13.232.164.223\"\n                    },\n                    {\n                        \"type\": \"Hostname\",\n                        \"address\": \"ip-172-20-33-176.ap-south-1.compute.internal\"\n                    },\n                    {\n                        \"type\": \"InternalDNS\",\n                        \"address\": \"ip-172-20-33-176.ap-south-1.compute.internal\"\n                    },\n                    {\n                        \"type\": \"ExternalDNS\",\n                        \"address\": \"ec2-13-232-164-223.ap-south-1.compute.amazonaws.com\"\n                    }\n                ],\n                \"daemonEndpoints\": {\n                    \"kubeletEndpoint\": {\n                        \"Port\": 10250\n                    }\n                },\n                \"nodeInfo\": {\n                    \"machineID\": \"ec27e8c3c81b9e480dfbad72cfba03c2\",\n                    \"systemUUID\": \"ec27e8c3-c81b-9e48-0dfb-ad72cfba03c2\",\n                    \"bootID\": \"e28b47f0-7954-4995-ab5c-e27896713535\",\n                    \"kernelVersion\": \"5.4.0-1047-aws\",\n                    \"osImage\": \"Ubuntu 20.04.2 LTS\",\n                    \"containerRuntimeVersion\": \"docker://20.10.5\",\n                    \"kubeletVersion\": \"v1.21.0\",\n                    \"kubeProxyVersion\": \"v1.21.0\",\n                    \"operatingSystem\": \"linux\",\n                    \"architecture\": \"amd64\"\n                },\n                \"images\": [\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/provider-aws/aws-ebs-csi-driver@sha256:a0294bf95fd94eabdc9b313b6c16232019a8707c711c031a2f99ab1f919560bd\",\n                            \"k8s.gcr.io/provider-aws/aws-ebs-csi-driver:v1.0.0\"\n                        ],\n                        \"sizeBytes\": 192610197\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/e2e-test-images/agnhost@sha256:8bd76a6a7778e203b61e18e5ee85b1faf52e6a30eb07e445a165ab90fe9633e3\",\n                            \"k8s.gcr.io/e2e-test-images/agnhost:2.31\"\n                        ],\n                        \"sizeBytes\": 125138466\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/e2e-test-images/httpd@sha256:b913fa234cc3473cfe16e937d106b455a7609f927f59031c81aca791e2689b50\",\n                            \"k8s.gcr.io/e2e-test-images/httpd:2.4.38-1\"\n                        ],\n                        \"sizeBytes\": 123781643\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/kube-proxy-amd64:v1.21.0\"\n                        ],\n                        \"sizeBytes\": 122238196\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-provisioner@sha256:20c828075d1e36f679d6a91e905b0927141eef5e15be0c9a1ca4a6a0ed9313d2\",\n                            \"k8s.gcr.io/sig-storage/csi-provisioner:v2.1.0\"\n                        ],\n                        \"sizeBytes\": 51645752\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-provisioner@sha256:78e3393f5fd5ff6c1e5dada2478cfa456fb7164929e573cf9a87bf6532730679\",\n                            \"k8s.gcr.io/sig-storage/csi-provisioner:v1.6.0\"\n                        ],\n                        \"sizeBytes\": 48281550\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-snapshotter@sha256:26e327b018c21a49523b759d7787e99553181ae9ef90b6bdc13abe362a43ced0\",\n                            \"k8s.gcr.io/sig-storage/csi-snapshotter:v3.0.2\"\n                        ],\n                        \"sizeBytes\": 47823451\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-attacher@sha256:2ffa647e8107cfd39e5f464e738dce014c9f5e51b108da36c3ab621048d0bbab\",\n                            \"k8s.gcr.io/sig-storage/csi-attacher:v2.2.0\"\n                        ],\n                        \"sizeBytes\": 46131354\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-resizer@sha256:6c6a0332693a7c456378f6abd2bb40611826c1e1a733cadbdae2daab3125b71c\",\n                            \"k8s.gcr.io/sig-storage/csi-resizer:v0.5.0\"\n                        ],\n                        \"sizeBytes\": 46041582\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/hostpathplugin@sha256:d2b357bb02430fee9eaa43b16083981463d260419fe3acb2f560ede5c129f6f5\",\n                            \"k8s.gcr.io/sig-storage/hostpathplugin:v1.4.0\"\n                        ],\n                        \"sizeBytes\": 27762720\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-node-driver-registrar@sha256:a61d309da54641db41fb8f35718f744e9f730d4d0384f8c4b186ddc9f06cbd5f\",\n                            \"k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.1.0\"\n                        ],\n                        \"sizeBytes\": 19662887\n                    },\n                    {\n                        \"names\": [\n                            \"quay.io/k8scsi/livenessprobe@sha256:d657c5644aefe12d4bbdffb900602df65c67dbaea99b26b2005465b88b1bc96e\",\n                            \"quay.io/k8scsi/livenessprobe:v2.2.0\"\n                        ],\n                        \"sizeBytes\": 17805321\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/mock-driver@sha256:a7b517f9e0f42ffade802eef9cefa271372386b85f55b702b493241e58459793\",\n                            \"k8s.gcr.io/sig-storage/mock-driver:v4.1.0\"\n                        ],\n                        \"sizeBytes\": 17680993\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-node-driver-registrar@sha256:9622c6a6dac7499a055a382930f4de82905a3c5735c0753f7094115c9c871309\",\n                            \"k8s.gcr.io/sig-storage/csi-node-driver-registrar:v1.3.0\"\n                        ],\n                        \"sizeBytes\": 16322467\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/e2e-test-images/nginx@sha256:503b7abb89e57383eba61cc8a9cb0b495ea575c516108f7d972a6ff6e1ab3c9b\",\n                            \"k8s.gcr.io/e2e-test-images/nginx:1.14-1\"\n                        ],\n                        \"sizeBytes\": 16032814\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/livenessprobe@sha256:f8cec70adc74897ddde5da4f1da0209a497370eaf657566e2b36bc5f0f3ccbd7\",\n                            \"k8s.gcr.io/sig-storage/livenessprobe:v1.1.0\"\n                        ],\n                        \"sizeBytes\": 14967303\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/e2e-test-images/busybox@sha256:39e1e963e5310e9c313bad51523be012ede7b35bb9316517d19089a010356592\",\n                            \"k8s.gcr.io/e2e-test-images/busybox:1.29-1\"\n                        ],\n                        \"sizeBytes\": 1154361\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/pause@sha256:927d98197ec1141a368550822d18fa1c60bdae27b78b0c004f705f548c07814f\",\n                            \"k8s.gcr.io/pause:3.2\"\n                        ],\n                        \"sizeBytes\": 682696\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/pause@sha256:6c3835cab3980f11b83277305d0d736051c32b17606f5ec59f1dda67c9ba3810\",\n                            \"k8s.gcr.io/pause:3.4.1\"\n                        ],\n                        \"sizeBytes\": 682696\n                    }\n                ]\n            }\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ip-172-20-33-8.ap-south-1.compute.internal\",\n                \"uid\": \"ea6e2288-7787-4657-a126-c4914dfd797a\",\n                \"resourceVersion\": \"12245\",\n                \"creationTimestamp\": \"2021-05-09T18:04:45Z\",\n                \"labels\": {\n                    \"beta.kubernetes.io/arch\": \"amd64\",\n                    \"beta.kubernetes.io/instance-type\": \"t3.medium\",\n                    \"beta.kubernetes.io/os\": \"linux\",\n                    \"failure-domain.beta.kubernetes.io/region\": \"ap-south-1\",\n                    \"failure-domain.beta.kubernetes.io/zone\": \"ap-south-1a\",\n                    \"kops.k8s.io/instancegroup\": \"nodes-ap-south-1a\",\n                    \"kubernetes.io/arch\": \"amd64\",\n                    \"kubernetes.io/hostname\": \"ip-172-20-33-8.ap-south-1.compute.internal\",\n                    \"kubernetes.io/os\": \"linux\",\n                    \"kubernetes.io/role\": \"node\",\n                    \"node-role.kubernetes.io/node\": \"\",\n                    \"node.kubernetes.io/instance-type\": \"t3.medium\",\n                    \"topology.ebs.csi.aws.com/zone\": \"ap-south-1a\",\n                    \"topology.hostpath.csi/node\": \"ip-172-20-33-8.ap-south-1.compute.internal\",\n                    \"topology.kubernetes.io/region\": \"ap-south-1\",\n                    \"topology.kubernetes.io/zone\": \"ap-south-1a\"\n                },\n                \"annotations\": {\n                    \"csi.volume.kubernetes.io/nodeid\": \"{\\\"csi-hostpath-provisioning-6175\\\":\\\"ip-172-20-33-8.ap-south-1.compute.internal\\\",\\\"csi-hostpath-volume-8895\\\":\\\"ip-172-20-33-8.ap-south-1.compute.internal\\\",\\\"ebs.csi.aws.com\\\":\\\"i-0d2fccf962ca64ce8\\\"}\",\n                    \"node.alpha.kubernetes.io/ttl\": \"0\",\n                    \"volumes.kubernetes.io/controller-managed-attach-detach\": \"true\"\n                }\n            },\n            \"spec\": {\n                \"podCIDR\": \"100.96.2.0/24\",\n                \"podCIDRs\": [\n                    \"100.96.2.0/24\"\n                ],\n                \"providerID\": \"aws:///ap-south-1a/i-0d2fccf962ca64ce8\"\n            },\n            \"status\": {\n                \"capacity\": {\n                    \"cpu\": \"2\",\n                    \"ephemeral-storage\": \"48725632Ki\",\n                    \"hugepages-1Gi\": \"0\",\n                    \"hugepages-2Mi\": \"0\",\n                    \"memory\": \"3969484Ki\",\n                    \"pods\": \"110\"\n                },\n                \"allocatable\": {\n                    \"cpu\": \"2\",\n                    \"ephemeral-storage\": \"44905542377\",\n                    \"hugepages-1Gi\": \"0\",\n                    \"hugepages-2Mi\": \"0\",\n                    \"memory\": \"3867084Ki\",\n                    \"pods\": \"110\"\n                },\n                \"conditions\": [\n                    {\n                        \"type\": \"NetworkUnavailable\",\n                        \"status\": \"False\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:04:49Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:04:49Z\",\n                        \"reason\": \"RouteCreated\",\n                        \"message\": \"RouteController created a route\"\n                    },\n                    {\n                        \"type\": \"MemoryPressure\",\n                        \"status\": \"False\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:11:57Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:04:45Z\",\n                        \"reason\": \"KubeletHasSufficientMemory\",\n                        \"message\": \"kubelet has sufficient memory available\"\n                    },\n                    {\n                        \"type\": \"DiskPressure\",\n                        \"status\": \"False\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:11:57Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:04:45Z\",\n                        \"reason\": \"KubeletHasNoDiskPressure\",\n                        \"message\": \"kubelet has no disk pressure\"\n                    },\n                    {\n                        \"type\": \"PIDPressure\",\n                        \"status\": \"False\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:11:57Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:04:45Z\",\n                        \"reason\": \"KubeletHasSufficientPID\",\n                        \"message\": \"kubelet has sufficient PID available\"\n                    },\n                    {\n                        \"type\": \"Ready\",\n                        \"status\": \"True\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:11:57Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:04:46Z\",\n                        \"reason\": \"KubeletReady\",\n                        \"message\": \"kubelet is posting ready status. AppArmor enabled\"\n                    }\n                ],\n                \"addresses\": [\n                    {\n                        \"type\": \"InternalIP\",\n                        \"address\": \"172.20.33.8\"\n                    },\n                    {\n                        \"type\": \"ExternalIP\",\n                        \"address\": \"52.66.62.64\"\n                    },\n                    {\n                        \"type\": \"Hostname\",\n                        \"address\": \"ip-172-20-33-8.ap-south-1.compute.internal\"\n                    },\n                    {\n                        \"type\": \"InternalDNS\",\n                        \"address\": \"ip-172-20-33-8.ap-south-1.compute.internal\"\n                    },\n                    {\n                        \"type\": \"ExternalDNS\",\n                        \"address\": \"ec2-52-66-62-64.ap-south-1.compute.amazonaws.com\"\n                    }\n                ],\n                \"daemonEndpoints\": {\n                    \"kubeletEndpoint\": {\n                        \"Port\": 10250\n                    }\n                },\n                \"nodeInfo\": {\n                    \"machineID\": \"ec264de93439b600efa388e1a4ef04b6\",\n                    \"systemUUID\": \"ec264de9-3439-b600-efa3-88e1a4ef04b6\",\n                    \"bootID\": \"ae4b2ca0-b4cf-482d-97a3-e55b060e2ac4\",\n                    \"kernelVersion\": \"5.4.0-1047-aws\",\n                    \"osImage\": \"Ubuntu 20.04.2 LTS\",\n                    \"containerRuntimeVersion\": \"docker://20.10.5\",\n                    \"kubeletVersion\": \"v1.21.0\",\n                    \"kubeProxyVersion\": \"v1.21.0\",\n                    \"operatingSystem\": \"linux\",\n                    \"architecture\": \"amd64\"\n                },\n                \"images\": [\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/e2e-test-images/glusterdynamic-provisioner@sha256:8bc20b52ce066dd4ea3d9eaac40c04ea8a77f47c33789676580cf4c7c9ea3c3d\",\n                            \"k8s.gcr.io/e2e-test-images/glusterdynamic-provisioner:v1.0\"\n                        ],\n                        \"sizeBytes\": 373281573\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/etcd@sha256:4ad90a11b55313b182afc186b9876c8e891531b8db4c9bf1541953021618d0e2\",\n                            \"k8s.gcr.io/etcd:3.4.13-0\"\n                        ],\n                        \"sizeBytes\": 253392289\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/provider-aws/aws-ebs-csi-driver@sha256:a0294bf95fd94eabdc9b313b6c16232019a8707c711c031a2f99ab1f919560bd\",\n                            \"k8s.gcr.io/provider-aws/aws-ebs-csi-driver:v1.0.0\"\n                        ],\n                        \"sizeBytes\": 192610197\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/e2e-test-images/agnhost@sha256:8bd76a6a7778e203b61e18e5ee85b1faf52e6a30eb07e445a165ab90fe9633e3\",\n                            \"k8s.gcr.io/e2e-test-images/agnhost:2.31\"\n                        ],\n                        \"sizeBytes\": 125138466\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/e2e-test-images/httpd@sha256:b913fa234cc3473cfe16e937d106b455a7609f927f59031c81aca791e2689b50\",\n                            \"k8s.gcr.io/e2e-test-images/httpd:2.4.38-1\"\n                        ],\n                        \"sizeBytes\": 123781643\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/kube-proxy-amd64:v1.21.0\"\n                        ],\n                        \"sizeBytes\": 122238196\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/e2e-test-images/nautilus@sha256:1f36a24cfb5e0c3f725d7565a867c2384282fcbeccc77b07b423c9da95763a9a\",\n                            \"k8s.gcr.io/e2e-test-images/nautilus:1.4\"\n                        ],\n                        \"sizeBytes\": 121748345\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/e2e-test-images/sample-apiserver@sha256:e7fddbaac4c3451da2365ab90bad149d32f11409738034e41e0f460927f7c276\",\n                            \"k8s.gcr.io/e2e-test-images/sample-apiserver:1.17.4\"\n                        ],\n                        \"sizeBytes\": 58172101\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-provisioner@sha256:78e3393f5fd5ff6c1e5dada2478cfa456fb7164929e573cf9a87bf6532730679\",\n                            \"k8s.gcr.io/sig-storage/csi-provisioner:v1.6.0\"\n                        ],\n                        \"sizeBytes\": 48281550\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-snapshotter@sha256:26e327b018c21a49523b759d7787e99553181ae9ef90b6bdc13abe362a43ced0\",\n                            \"k8s.gcr.io/sig-storage/csi-snapshotter:v3.0.2\"\n                        ],\n                        \"sizeBytes\": 47823451\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-attacher@sha256:2ffa647e8107cfd39e5f464e738dce014c9f5e51b108da36c3ab621048d0bbab\",\n                            \"k8s.gcr.io/sig-storage/csi-attacher:v2.2.0\"\n                        ],\n                        \"sizeBytes\": 46131354\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-resizer@sha256:6c6a0332693a7c456378f6abd2bb40611826c1e1a733cadbdae2daab3125b71c\",\n                            \"k8s.gcr.io/sig-storage/csi-resizer:v0.5.0\"\n                        ],\n                        \"sizeBytes\": 46041582\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/cpa/cluster-proportional-autoscaler@sha256:67640771ad9fc56f109d5b01e020f0c858e7c890bb0eb15ba0ebd325df3285e7\",\n                            \"k8s.gcr.io/cpa/cluster-proportional-autoscaler:1.8.3\"\n                        ],\n                        \"sizeBytes\": 40647382\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/hostpathplugin@sha256:d2b357bb02430fee9eaa43b16083981463d260419fe3acb2f560ede5c129f6f5\",\n                            \"k8s.gcr.io/sig-storage/hostpathplugin:v1.4.0\"\n                        ],\n                        \"sizeBytes\": 27762720\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-node-driver-registrar@sha256:a61d309da54641db41fb8f35718f744e9f730d4d0384f8c4b186ddc9f06cbd5f\",\n                            \"k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.1.0\"\n                        ],\n                        \"sizeBytes\": 19662887\n                    },\n                    {\n                        \"names\": [\n                            \"quay.io/k8scsi/livenessprobe@sha256:d657c5644aefe12d4bbdffb900602df65c67dbaea99b26b2005465b88b1bc96e\",\n                            \"quay.io/k8scsi/livenessprobe:v2.2.0\"\n                        ],\n                        \"sizeBytes\": 17805321\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-node-driver-registrar@sha256:9622c6a6dac7499a055a382930f4de82905a3c5735c0753f7094115c9c871309\",\n                            \"k8s.gcr.io/sig-storage/csi-node-driver-registrar:v1.3.0\"\n                        ],\n                        \"sizeBytes\": 16322467\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/e2e-test-images/nginx@sha256:503b7abb89e57383eba61cc8a9cb0b495ea575c516108f7d972a6ff6e1ab3c9b\",\n                            \"k8s.gcr.io/e2e-test-images/nginx:1.14-1\"\n                        ],\n                        \"sizeBytes\": 16032814\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/livenessprobe@sha256:f8cec70adc74897ddde5da4f1da0209a497370eaf657566e2b36bc5f0f3ccbd7\",\n                            \"k8s.gcr.io/sig-storage/livenessprobe:v1.1.0\"\n                        ],\n                        \"sizeBytes\": 14967303\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/e2e-test-images/busybox@sha256:39e1e963e5310e9c313bad51523be012ede7b35bb9316517d19089a010356592\",\n                            \"k8s.gcr.io/e2e-test-images/busybox:1.29-1\"\n                        ],\n                        \"sizeBytes\": 1154361\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/pause@sha256:927d98197ec1141a368550822d18fa1c60bdae27b78b0c004f705f548c07814f\",\n                            \"k8s.gcr.io/pause:3.2\"\n                        ],\n                        \"sizeBytes\": 682696\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/pause@sha256:6c3835cab3980f11b83277305d0d736051c32b17606f5ec59f1dda67c9ba3810\",\n                            \"k8s.gcr.io/pause:3.4.1\"\n                        ],\n                        \"sizeBytes\": 682696\n                    }\n                ],\n                \"volumesInUse\": [\n                    \"kubernetes.io/csi/csi-hostpath-provisioning-6175^fc4c8d11-b0f1-11eb-b4d2-02f820c48d11\"\n                ],\n                \"volumesAttached\": [\n                    {\n                        \"name\": \"kubernetes.io/csi/csi-hostpath-provisioning-6175^fc4c8d11-b0f1-11eb-b4d2-02f820c48d11\",\n                        \"devicePath\": \"\"\n                    }\n                ]\n            }\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ip-172-20-45-192.ap-south-1.compute.internal\",\n                \"uid\": \"71538644-3fa3-4f3b-aa86-4bb51e3491dd\",\n                \"resourceVersion\": \"5908\",\n                \"creationTimestamp\": \"2021-05-09T18:03:07Z\",\n                \"labels\": {\n                    \"beta.kubernetes.io/arch\": \"amd64\",\n                    \"beta.kubernetes.io/instance-type\": \"c5.large\",\n                    \"beta.kubernetes.io/os\": \"linux\",\n                    \"failure-domain.beta.kubernetes.io/region\": \"ap-south-1\",\n                    \"failure-domain.beta.kubernetes.io/zone\": \"ap-south-1a\",\n                    \"kops.k8s.io/instancegroup\": \"master-ap-south-1a\",\n                    \"kops.k8s.io/kops-controller-pki\": \"\",\n                    \"kubernetes.io/arch\": \"amd64\",\n                    \"kubernetes.io/hostname\": \"ip-172-20-45-192.ap-south-1.compute.internal\",\n                    \"kubernetes.io/os\": \"linux\",\n                    \"kubernetes.io/role\": \"master\",\n                    \"node-role.kubernetes.io/control-plane\": \"\",\n                    \"node-role.kubernetes.io/master\": \"\",\n                    \"node.kubernetes.io/exclude-from-external-load-balancers\": \"\",\n                    \"node.kubernetes.io/instance-type\": \"c5.large\",\n                    \"topology.ebs.csi.aws.com/zone\": \"ap-south-1a\",\n                    \"topology.kubernetes.io/region\": \"ap-south-1\",\n                    \"topology.kubernetes.io/zone\": \"ap-south-1a\"\n                },\n                \"annotations\": {\n                    \"csi.volume.kubernetes.io/nodeid\": \"{\\\"ebs.csi.aws.com\\\":\\\"i-0c6f14ced87520d7b\\\"}\",\n                    \"node.alpha.kubernetes.io/ttl\": \"0\",\n                    \"volumes.kubernetes.io/controller-managed-attach-detach\": \"true\"\n                }\n            },\n            \"spec\": {\n                \"podCIDR\": \"100.96.0.0/24\",\n                \"podCIDRs\": [\n                    \"100.96.0.0/24\"\n                ],\n                \"providerID\": \"aws:///ap-south-1a/i-0c6f14ced87520d7b\",\n                \"taints\": [\n                    {\n                        \"key\": \"node-role.kubernetes.io/master\",\n                        \"effect\": \"NoSchedule\"\n                    }\n                ]\n            },\n            \"status\": {\n                \"capacity\": {\n                    \"cpu\": \"2\",\n                    \"ephemeral-storage\": \"48725632Ki\",\n                    \"hugepages-1Gi\": \"0\",\n                    \"hugepages-2Mi\": \"0\",\n                    \"memory\": \"3785168Ki\",\n                    \"pods\": \"110\"\n                },\n                \"allocatable\": {\n                    \"cpu\": \"2\",\n                    \"ephemeral-storage\": \"44905542377\",\n                    \"hugepages-1Gi\": \"0\",\n                    \"hugepages-2Mi\": \"0\",\n                    \"memory\": \"3682768Ki\",\n                    \"pods\": \"110\"\n                },\n                \"conditions\": [\n                    {\n                        \"type\": \"NetworkUnavailable\",\n                        \"status\": \"False\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:03:19Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:03:19Z\",\n                        \"reason\": \"RouteCreated\",\n                        \"message\": \"RouteController created a route\"\n                    },\n                    {\n                        \"type\": \"MemoryPressure\",\n                        \"status\": \"False\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:09:48Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:03:07Z\",\n                        \"reason\": \"KubeletHasSufficientMemory\",\n                        \"message\": \"kubelet has sufficient memory available\"\n                    },\n                    {\n                        \"type\": \"DiskPressure\",\n                        \"status\": \"False\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:09:48Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:03:07Z\",\n                        \"reason\": \"KubeletHasNoDiskPressure\",\n                        \"message\": \"kubelet has no disk pressure\"\n                    },\n                    {\n                        \"type\": \"PIDPressure\",\n                        \"status\": \"False\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:09:48Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:03:07Z\",\n                        \"reason\": \"KubeletHasSufficientPID\",\n                        \"message\": \"kubelet has sufficient PID available\"\n                    },\n                    {\n                        \"type\": \"Ready\",\n                        \"status\": \"True\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:09:48Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:03:17Z\",\n                        \"reason\": \"KubeletReady\",\n                        \"message\": \"kubelet is posting ready status. AppArmor enabled\"\n                    }\n                ],\n                \"addresses\": [\n                    {\n                        \"type\": \"InternalIP\",\n                        \"address\": \"172.20.45.192\"\n                    },\n                    {\n                        \"type\": \"ExternalIP\",\n                        \"address\": \"65.0.17.147\"\n                    },\n                    {\n                        \"type\": \"Hostname\",\n                        \"address\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n                    },\n                    {\n                        \"type\": \"InternalDNS\",\n                        \"address\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n                    },\n                    {\n                        \"type\": \"ExternalDNS\",\n                        \"address\": \"ec2-65-0-17-147.ap-south-1.compute.amazonaws.com\"\n                    }\n                ],\n                \"daemonEndpoints\": {\n                    \"kubeletEndpoint\": {\n                        \"Port\": 10250\n                    }\n                },\n                \"nodeInfo\": {\n                    \"machineID\": \"ec20493e62987f3c88d4727b5bddfe0d\",\n                    \"systemUUID\": \"ec20493e-6298-7f3c-88d4-727b5bddfe0d\",\n                    \"bootID\": \"62b4f8f4-b37e-428d-87d3-10da6c67f121\",\n                    \"kernelVersion\": \"5.4.0-1047-aws\",\n                    \"osImage\": \"Ubuntu 20.04.2 LTS\",\n                    \"containerRuntimeVersion\": \"docker://20.10.5\",\n                    \"kubeletVersion\": \"v1.21.0\",\n                    \"kubeProxyVersion\": \"v1.21.0\",\n                    \"operatingSystem\": \"linux\",\n                    \"architecture\": \"amd64\"\n                },\n                \"images\": [\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/etcdadm/etcd-manager@sha256:ebb73d3d4a99da609f9e01c556cd9f9aa7a0aecba8f5bc5588d7c45eb38e3a7e\",\n                            \"k8s.gcr.io/etcdadm/etcd-manager:3.0.20210430\"\n                        ],\n                        \"sizeBytes\": 492748624\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/provider-aws/aws-ebs-csi-driver@sha256:a0294bf95fd94eabdc9b313b6c16232019a8707c711c031a2f99ab1f919560bd\",\n                            \"k8s.gcr.io/provider-aws/aws-ebs-csi-driver:v1.0.0\"\n                        ],\n                        \"sizeBytes\": 192610197\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/kube-apiserver-amd64:v1.21.0\"\n                        ],\n                        \"sizeBytes\": 125591921\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/kube-proxy-amd64:v1.21.0\"\n                        ],\n                        \"sizeBytes\": 122238196\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/kube-controller-manager-amd64:v1.21.0\"\n                        ],\n                        \"sizeBytes\": 119808868\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/kops/dns-controller:1.22.0-alpha.1\"\n                        ],\n                        \"sizeBytes\": 112232812\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/kops/kops-controller:1.22.0-alpha.1\"\n                        ],\n                        \"sizeBytes\": 110423227\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-provisioner@sha256:c8e03f60afa90a28e4bb6ec9a8d0fc36d89de4b7475cf2d613afa793ec969fe0\",\n                            \"k8s.gcr.io/sig-storage/csi-provisioner:v2.2.0\"\n                        ],\n                        \"sizeBytes\": 56382329\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-attacher@sha256:c5be65d6679efabb969d9b019300d187437ae876f992c40911fd2892bbef3b36\",\n                            \"k8s.gcr.io/sig-storage/csi-attacher:v3.2.0\"\n                        ],\n                        \"sizeBytes\": 53500826\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/kube-scheduler-amd64:v1.21.0\"\n                        ],\n                        \"sizeBytes\": 50631537\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-snapshotter@sha256:51f2dfde5bccac7854b3704689506aeecfb793328427b91115ba253a93e60782\",\n                            \"k8s.gcr.io/sig-storage/csi-snapshotter:v4.0.0\"\n                        ],\n                        \"sizeBytes\": 49559562\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-resizer@sha256:7a5ba58a44e0d749e0767e4e37315bcf6a61f33ce3185c1991848af4db0fb70a\",\n                            \"k8s.gcr.io/sig-storage/csi-resizer:v1.1.0\"\n                        ],\n                        \"sizeBytes\": 49176472\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/kops/kube-apiserver-healthcheck:1.22.0-alpha.1\"\n                        ],\n                        \"sizeBytes\": 24013245\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-node-driver-registrar@sha256:a61d309da54641db41fb8f35718f744e9f730d4d0384f8c4b186ddc9f06cbd5f\",\n                            \"k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.1.0\"\n                        ],\n                        \"sizeBytes\": 19662887\n                    },\n                    {\n                        \"names\": [\n                            \"quay.io/k8scsi/livenessprobe@sha256:d657c5644aefe12d4bbdffb900602df65c67dbaea99b26b2005465b88b1bc96e\",\n                            \"quay.io/k8scsi/livenessprobe:v2.2.0\"\n                        ],\n                        \"sizeBytes\": 17805321\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/livenessprobe@sha256:48da0e4ed7238ad461ea05f68c25921783c37b315f21a5c5a2780157a6460994\",\n                            \"k8s.gcr.io/sig-storage/livenessprobe:v2.2.0\"\n                        ],\n                        \"sizeBytes\": 17776649\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/pause@sha256:927d98197ec1141a368550822d18fa1c60bdae27b78b0c004f705f548c07814f\",\n                            \"k8s.gcr.io/pause:3.2\"\n                        ],\n                        \"sizeBytes\": 682696\n                    }\n                ]\n            }\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ip-172-20-57-119.ap-south-1.compute.internal\",\n                \"uid\": \"d7a91f95-d306-4f69-a605-3f4adfe43389\",\n                \"resourceVersion\": \"12020\",\n                \"creationTimestamp\": \"2021-05-09T18:04:54Z\",\n                \"labels\": {\n                    \"beta.kubernetes.io/arch\": \"amd64\",\n                    \"beta.kubernetes.io/instance-type\": \"t3.medium\",\n                    \"beta.kubernetes.io/os\": \"linux\",\n                    \"failure-domain.beta.kubernetes.io/region\": \"ap-south-1\",\n                    \"failure-domain.beta.kubernetes.io/zone\": \"ap-south-1a\",\n                    \"kops.k8s.io/instancegroup\": \"nodes-ap-south-1a\",\n                    \"kubernetes.io/arch\": \"amd64\",\n                    \"kubernetes.io/hostname\": \"ip-172-20-57-119.ap-south-1.compute.internal\",\n                    \"kubernetes.io/os\": \"linux\",\n                    \"kubernetes.io/role\": \"node\",\n                    \"node-role.kubernetes.io/node\": \"\",\n                    \"node.kubernetes.io/instance-type\": \"t3.medium\",\n                    \"topology.ebs.csi.aws.com/zone\": \"ap-south-1a\",\n                    \"topology.hostpath.csi/node\": \"ip-172-20-57-119.ap-south-1.compute.internal\",\n                    \"topology.kubernetes.io/region\": \"ap-south-1\",\n                    \"topology.kubernetes.io/zone\": \"ap-south-1a\"\n                },\n                \"annotations\": {\n                    \"csi.volume.kubernetes.io/nodeid\": \"{\\\"csi-hostpath-volume-expand-9485\\\":\\\"ip-172-20-57-119.ap-south-1.compute.internal\\\",\\\"ebs.csi.aws.com\\\":\\\"i-06b2a8cf55cd2f611\\\"}\",\n                    \"node.alpha.kubernetes.io/ttl\": \"0\",\n                    \"volumes.kubernetes.io/controller-managed-attach-detach\": \"true\"\n                }\n            },\n            \"spec\": {\n                \"podCIDR\": \"100.96.4.0/24\",\n                \"podCIDRs\": [\n                    \"100.96.4.0/24\"\n                ],\n                \"providerID\": \"aws:///ap-south-1a/i-06b2a8cf55cd2f611\"\n            },\n            \"status\": {\n                \"capacity\": {\n                    \"cpu\": \"2\",\n                    \"ephemeral-storage\": \"48725632Ki\",\n                    \"hugepages-1Gi\": \"0\",\n                    \"hugepages-2Mi\": \"0\",\n                    \"memory\": \"3969484Ki\",\n                    \"pods\": \"110\"\n                },\n                \"allocatable\": {\n                    \"cpu\": \"2\",\n                    \"ephemeral-storage\": \"44905542377\",\n                    \"hugepages-1Gi\": \"0\",\n                    \"hugepages-2Mi\": \"0\",\n                    \"memory\": \"3867084Ki\",\n                    \"pods\": \"110\"\n                },\n                \"conditions\": [\n                    {\n                        \"type\": \"NetworkUnavailable\",\n                        \"status\": \"False\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:04:59Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:04:59Z\",\n                        \"reason\": \"RouteCreated\",\n                        \"message\": \"RouteController created a route\"\n                    },\n                    {\n                        \"type\": \"MemoryPressure\",\n                        \"status\": \"False\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:11:36Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:04:54Z\",\n                        \"reason\": \"KubeletHasSufficientMemory\",\n                        \"message\": \"kubelet has sufficient memory available\"\n                    },\n                    {\n                        \"type\": \"DiskPressure\",\n                        \"status\": \"False\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:11:36Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:04:54Z\",\n                        \"reason\": \"KubeletHasNoDiskPressure\",\n                        \"message\": \"kubelet has no disk pressure\"\n                    },\n                    {\n                        \"type\": \"PIDPressure\",\n                        \"status\": \"False\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:11:36Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:04:54Z\",\n                        \"reason\": \"KubeletHasSufficientPID\",\n                        \"message\": \"kubelet has sufficient PID available\"\n                    },\n                    {\n                        \"type\": \"Ready\",\n                        \"status\": \"True\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:11:36Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:04:57Z\",\n                        \"reason\": \"KubeletReady\",\n                        \"message\": \"kubelet is posting ready status. AppArmor enabled\"\n                    }\n                ],\n                \"addresses\": [\n                    {\n                        \"type\": \"InternalIP\",\n                        \"address\": \"172.20.57.119\"\n                    },\n                    {\n                        \"type\": \"ExternalIP\",\n                        \"address\": \"65.0.31.113\"\n                    },\n                    {\n                        \"type\": \"Hostname\",\n                        \"address\": \"ip-172-20-57-119.ap-south-1.compute.internal\"\n                    },\n                    {\n                        \"type\": \"InternalDNS\",\n                        \"address\": \"ip-172-20-57-119.ap-south-1.compute.internal\"\n                    },\n                    {\n                        \"type\": \"ExternalDNS\",\n                        \"address\": \"ec2-65-0-31-113.ap-south-1.compute.amazonaws.com\"\n                    }\n                ],\n                \"daemonEndpoints\": {\n                    \"kubeletEndpoint\": {\n                        \"Port\": 10250\n                    }\n                },\n                \"nodeInfo\": {\n                    \"machineID\": \"ec296154a2639b9fe6326eeefd14352b\",\n                    \"systemUUID\": \"ec296154-a263-9b9f-e632-6eeefd14352b\",\n                    \"bootID\": \"f3a62a9f-e1f5-4dfd-acf7-692d9db2d89c\",\n                    \"kernelVersion\": \"5.4.0-1047-aws\",\n                    \"osImage\": \"Ubuntu 20.04.2 LTS\",\n                    \"containerRuntimeVersion\": \"docker://20.10.5\",\n                    \"kubeletVersion\": \"v1.21.0\",\n                    \"kubeProxyVersion\": \"v1.21.0\",\n                    \"operatingSystem\": \"linux\",\n                    \"architecture\": \"amd64\"\n                },\n                \"images\": [\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/nfs-provisioner@sha256:c1bedac8758029948afe060bf8f6ee63ea489b5e08d29745f44fab68ee0d46ca\",\n                            \"k8s.gcr.io/sig-storage/nfs-provisioner:v2.2.2\"\n                        ],\n                        \"sizeBytes\": 391772778\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/provider-aws/aws-ebs-csi-driver@sha256:a0294bf95fd94eabdc9b313b6c16232019a8707c711c031a2f99ab1f919560bd\",\n                            \"k8s.gcr.io/provider-aws/aws-ebs-csi-driver:v1.0.0\"\n                        ],\n                        \"sizeBytes\": 192610197\n                    },\n                    {\n                        \"names\": [\n                            \"nginx@sha256:75a55d33ecc73c2a242450a9f1cc858499d468f077ea942867e662c247b5e412\",\n                            \"nginx:latest\"\n                        ],\n                        \"sizeBytes\": 133117205\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/e2e-test-images/agnhost@sha256:8bd76a6a7778e203b61e18e5ee85b1faf52e6a30eb07e445a165ab90fe9633e3\",\n                            \"k8s.gcr.io/e2e-test-images/agnhost:2.31\"\n                        ],\n                        \"sizeBytes\": 125138466\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/e2e-test-images/httpd@sha256:b913fa234cc3473cfe16e937d106b455a7609f927f59031c81aca791e2689b50\",\n                            \"k8s.gcr.io/e2e-test-images/httpd:2.4.38-1\"\n                        ],\n                        \"sizeBytes\": 123781643\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/kube-proxy-amd64:v1.21.0\"\n                        ],\n                        \"sizeBytes\": 122238196\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/e2e-test-images/nautilus@sha256:1f36a24cfb5e0c3f725d7565a867c2384282fcbeccc77b07b423c9da95763a9a\",\n                            \"k8s.gcr.io/e2e-test-images/nautilus:1.4\"\n                        ],\n                        \"sizeBytes\": 121748345\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-provisioner@sha256:20c828075d1e36f679d6a91e905b0927141eef5e15be0c9a1ca4a6a0ed9313d2\",\n                            \"k8s.gcr.io/sig-storage/csi-provisioner:v2.1.0\"\n                        ],\n                        \"sizeBytes\": 51645752\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-provisioner@sha256:78e3393f5fd5ff6c1e5dada2478cfa456fb7164929e573cf9a87bf6532730679\",\n                            \"k8s.gcr.io/sig-storage/csi-provisioner:v1.6.0\"\n                        ],\n                        \"sizeBytes\": 48281550\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-snapshotter@sha256:26e327b018c21a49523b759d7787e99553181ae9ef90b6bdc13abe362a43ced0\",\n                            \"k8s.gcr.io/sig-storage/csi-snapshotter:v3.0.2\"\n                        ],\n                        \"sizeBytes\": 47823451\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-attacher@sha256:2ffa647e8107cfd39e5f464e738dce014c9f5e51b108da36c3ab621048d0bbab\",\n                            \"k8s.gcr.io/sig-storage/csi-attacher:v2.2.0\"\n                        ],\n                        \"sizeBytes\": 46131354\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-resizer@sha256:6c6a0332693a7c456378f6abd2bb40611826c1e1a733cadbdae2daab3125b71c\",\n                            \"k8s.gcr.io/sig-storage/csi-resizer:v0.5.0\"\n                        ],\n                        \"sizeBytes\": 46041582\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/coredns@sha256:73ca82b4ce829766d4f1f10947c3a338888f876fbed0540dc849c89ff256e90c\",\n                            \"k8s.gcr.io/coredns:1.7.0\"\n                        ],\n                        \"sizeBytes\": 45227747\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/hostpathplugin@sha256:d2b357bb02430fee9eaa43b16083981463d260419fe3acb2f560ede5c129f6f5\",\n                            \"k8s.gcr.io/sig-storage/hostpathplugin:v1.4.0\"\n                        ],\n                        \"sizeBytes\": 27762720\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-node-driver-registrar@sha256:a61d309da54641db41fb8f35718f744e9f730d4d0384f8c4b186ddc9f06cbd5f\",\n                            \"k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.1.0\"\n                        ],\n                        \"sizeBytes\": 19662887\n                    },\n                    {\n                        \"names\": [\n                            \"quay.io/k8scsi/livenessprobe@sha256:d657c5644aefe12d4bbdffb900602df65c67dbaea99b26b2005465b88b1bc96e\",\n                            \"quay.io/k8scsi/livenessprobe:v2.2.0\"\n                        ],\n                        \"sizeBytes\": 17805321\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/mock-driver@sha256:a7b517f9e0f42ffade802eef9cefa271372386b85f55b702b493241e58459793\",\n                            \"k8s.gcr.io/sig-storage/mock-driver:v4.1.0\"\n                        ],\n                        \"sizeBytes\": 17680993\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-node-driver-registrar@sha256:9622c6a6dac7499a055a382930f4de82905a3c5735c0753f7094115c9c871309\",\n                            \"k8s.gcr.io/sig-storage/csi-node-driver-registrar:v1.3.0\"\n                        ],\n                        \"sizeBytes\": 16322467\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/e2e-test-images/nginx@sha256:503b7abb89e57383eba61cc8a9cb0b495ea575c516108f7d972a6ff6e1ab3c9b\",\n                            \"k8s.gcr.io/e2e-test-images/nginx:1.14-1\"\n                        ],\n                        \"sizeBytes\": 16032814\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/livenessprobe@sha256:f8cec70adc74897ddde5da4f1da0209a497370eaf657566e2b36bc5f0f3ccbd7\",\n                            \"k8s.gcr.io/sig-storage/livenessprobe:v1.1.0\"\n                        ],\n                        \"sizeBytes\": 14967303\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/e2e-test-images/busybox@sha256:39e1e963e5310e9c313bad51523be012ede7b35bb9316517d19089a010356592\",\n                            \"k8s.gcr.io/e2e-test-images/busybox:1.29-1\"\n                        ],\n                        \"sizeBytes\": 1154361\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/pause@sha256:927d98197ec1141a368550822d18fa1c60bdae27b78b0c004f705f548c07814f\",\n                            \"k8s.gcr.io/pause:3.2\"\n                        ],\n                        \"sizeBytes\": 682696\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/pause@sha256:6c3835cab3980f11b83277305d0d736051c32b17606f5ec59f1dda67c9ba3810\",\n                            \"k8s.gcr.io/pause:3.4.1\"\n                        ],\n                        \"sizeBytes\": 682696\n                    }\n                ],\n                \"volumesInUse\": [\n                    \"kubernetes.io/csi/ebs.csi.aws.com^vol-06149c60bc88ebed7\",\n                    \"kubernetes.io/csi/ebs.csi.aws.com^vol-0739b4f78756990f5\"\n                ],\n                \"volumesAttached\": [\n                    {\n                        \"name\": \"kubernetes.io/csi/ebs.csi.aws.com^vol-06149c60bc88ebed7\",\n                        \"devicePath\": \"\"\n                    },\n                    {\n                        \"name\": \"kubernetes.io/csi/ebs.csi.aws.com^vol-0739b4f78756990f5\",\n                        \"devicePath\": \"\"\n                    }\n                ]\n            }\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ip-172-20-61-172.ap-south-1.compute.internal\",\n                \"uid\": \"6fce2abe-f442-48de-a9c9-27eccdc43f76\",\n                \"resourceVersion\": \"11853\",\n                \"creationTimestamp\": \"2021-05-09T18:04:46Z\",\n                \"labels\": {\n                    \"beta.kubernetes.io/arch\": \"amd64\",\n                    \"beta.kubernetes.io/instance-type\": \"t3.medium\",\n                    \"beta.kubernetes.io/os\": \"linux\",\n                    \"failure-domain.beta.kubernetes.io/region\": \"ap-south-1\",\n                    \"failure-domain.beta.kubernetes.io/zone\": \"ap-south-1a\",\n                    \"kops.k8s.io/instancegroup\": \"nodes-ap-south-1a\",\n                    \"kubernetes.io/arch\": \"amd64\",\n                    \"kubernetes.io/hostname\": \"ip-172-20-61-172.ap-south-1.compute.internal\",\n                    \"kubernetes.io/os\": \"linux\",\n                    \"kubernetes.io/role\": \"node\",\n                    \"node-role.kubernetes.io/node\": \"\",\n                    \"node.kubernetes.io/instance-type\": \"t3.medium\",\n                    \"topology.ebs.csi.aws.com/zone\": \"ap-south-1a\",\n                    \"topology.hostpath.csi/node\": \"ip-172-20-61-172.ap-south-1.compute.internal\",\n                    \"topology.kubernetes.io/region\": \"ap-south-1\",\n                    \"topology.kubernetes.io/zone\": \"ap-south-1a\"\n                },\n                \"annotations\": {\n                    \"csi.volume.kubernetes.io/nodeid\": \"{\\\"csi-hostpath-ephemeral-4451\\\":\\\"ip-172-20-61-172.ap-south-1.compute.internal\\\",\\\"csi-hostpath-provisioning-2213\\\":\\\"ip-172-20-61-172.ap-south-1.compute.internal\\\",\\\"ebs.csi.aws.com\\\":\\\"i-0a9e1374c3bae1e94\\\"}\",\n                    \"node.alpha.kubernetes.io/ttl\": \"0\",\n                    \"volumes.kubernetes.io/controller-managed-attach-detach\": \"true\"\n                }\n            },\n            \"spec\": {\n                \"podCIDR\": \"100.96.3.0/24\",\n                \"podCIDRs\": [\n                    \"100.96.3.0/24\"\n                ],\n                \"providerID\": \"aws:///ap-south-1a/i-0a9e1374c3bae1e94\"\n            },\n            \"status\": {\n                \"capacity\": {\n                    \"cpu\": \"2\",\n                    \"ephemeral-storage\": \"48725632Ki\",\n                    \"hugepages-1Gi\": \"0\",\n                    \"hugepages-2Mi\": \"0\",\n                    \"memory\": \"3969484Ki\",\n                    \"pods\": \"110\"\n                },\n                \"allocatable\": {\n                    \"cpu\": \"2\",\n                    \"ephemeral-storage\": \"44905542377\",\n                    \"hugepages-1Gi\": \"0\",\n                    \"hugepages-2Mi\": \"0\",\n                    \"memory\": \"3867084Ki\",\n                    \"pods\": \"110\"\n                },\n                \"conditions\": [\n                    {\n                        \"type\": \"NetworkUnavailable\",\n                        \"status\": \"False\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:04:49Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:04:49Z\",\n                        \"reason\": \"RouteCreated\",\n                        \"message\": \"RouteController created a route\"\n                    },\n                    {\n                        \"type\": \"MemoryPressure\",\n                        \"status\": \"False\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:11:47Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:04:45Z\",\n                        \"reason\": \"KubeletHasSufficientMemory\",\n                        \"message\": \"kubelet has sufficient memory available\"\n                    },\n                    {\n                        \"type\": \"DiskPressure\",\n                        \"status\": \"False\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:11:47Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:04:45Z\",\n                        \"reason\": \"KubeletHasNoDiskPressure\",\n                        \"message\": \"kubelet has no disk pressure\"\n                    },\n                    {\n                        \"type\": \"PIDPressure\",\n                        \"status\": \"False\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:11:47Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:04:45Z\",\n                        \"reason\": \"KubeletHasSufficientPID\",\n                        \"message\": \"kubelet has sufficient PID available\"\n                    },\n                    {\n                        \"type\": \"Ready\",\n                        \"status\": \"True\",\n                        \"lastHeartbeatTime\": \"2021-05-09T18:11:47Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:04:46Z\",\n                        \"reason\": \"KubeletReady\",\n                        \"message\": \"kubelet is posting ready status. AppArmor enabled\"\n                    }\n                ],\n                \"addresses\": [\n                    {\n                        \"type\": \"InternalIP\",\n                        \"address\": \"172.20.61.172\"\n                    },\n                    {\n                        \"type\": \"ExternalIP\",\n                        \"address\": \"13.233.229.208\"\n                    },\n                    {\n                        \"type\": \"Hostname\",\n                        \"address\": \"ip-172-20-61-172.ap-south-1.compute.internal\"\n                    },\n                    {\n                        \"type\": \"InternalDNS\",\n                        \"address\": \"ip-172-20-61-172.ap-south-1.compute.internal\"\n                    },\n                    {\n                        \"type\": \"ExternalDNS\",\n                        \"address\": \"ec2-13-233-229-208.ap-south-1.compute.amazonaws.com\"\n                    }\n                ],\n                \"daemonEndpoints\": {\n                    \"kubeletEndpoint\": {\n                        \"Port\": 10250\n                    }\n                },\n                \"nodeInfo\": {\n                    \"machineID\": \"ec2a451a2a74a0491c6058a06d153124\",\n                    \"systemUUID\": \"ec2a451a-2a74-a049-1c60-58a06d153124\",\n                    \"bootID\": \"3e461ca7-3c42-4366-ad2d-35b2883fd986\",\n                    \"kernelVersion\": \"5.4.0-1047-aws\",\n                    \"osImage\": \"Ubuntu 20.04.2 LTS\",\n                    \"containerRuntimeVersion\": \"docker://20.10.5\",\n                    \"kubeletVersion\": \"v1.21.0\",\n                    \"kubeProxyVersion\": \"v1.21.0\",\n                    \"operatingSystem\": \"linux\",\n                    \"architecture\": \"amd64\"\n                },\n                \"images\": [\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/nfs-provisioner@sha256:c1bedac8758029948afe060bf8f6ee63ea489b5e08d29745f44fab68ee0d46ca\",\n                            \"k8s.gcr.io/sig-storage/nfs-provisioner:v2.2.2\"\n                        ],\n                        \"sizeBytes\": 391772778\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/e2e-test-images/jessie-dnsutils@sha256:702a992280fb7c3303e84a5801acbb4c9c7fcf48cffe0e9c8be3f0c60f74cf89\",\n                            \"k8s.gcr.io/e2e-test-images/jessie-dnsutils:1.4\"\n                        ],\n                        \"sizeBytes\": 253371792\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/provider-aws/aws-ebs-csi-driver@sha256:a0294bf95fd94eabdc9b313b6c16232019a8707c711c031a2f99ab1f919560bd\",\n                            \"k8s.gcr.io/provider-aws/aws-ebs-csi-driver:v1.0.0\"\n                        ],\n                        \"sizeBytes\": 192610197\n                    },\n                    {\n                        \"names\": [\n                            \"nginx@sha256:75a55d33ecc73c2a242450a9f1cc858499d468f077ea942867e662c247b5e412\",\n                            \"nginx:latest\"\n                        ],\n                        \"sizeBytes\": 133117205\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/e2e-test-images/agnhost@sha256:8bd76a6a7778e203b61e18e5ee85b1faf52e6a30eb07e445a165ab90fe9633e3\",\n                            \"k8s.gcr.io/e2e-test-images/agnhost:2.31\"\n                        ],\n                        \"sizeBytes\": 125138466\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/e2e-test-images/httpd@sha256:b913fa234cc3473cfe16e937d106b455a7609f927f59031c81aca791e2689b50\",\n                            \"k8s.gcr.io/e2e-test-images/httpd:2.4.38-1\"\n                        ],\n                        \"sizeBytes\": 123781643\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/kube-proxy-amd64:v1.21.0\"\n                        ],\n                        \"sizeBytes\": 122238196\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/e2e-test-images/nautilus@sha256:1f36a24cfb5e0c3f725d7565a867c2384282fcbeccc77b07b423c9da95763a9a\",\n                            \"k8s.gcr.io/e2e-test-images/nautilus:1.4\"\n                        ],\n                        \"sizeBytes\": 121748345\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-provisioner@sha256:78e3393f5fd5ff6c1e5dada2478cfa456fb7164929e573cf9a87bf6532730679\",\n                            \"k8s.gcr.io/sig-storage/csi-provisioner:v1.6.0\"\n                        ],\n                        \"sizeBytes\": 48281550\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-snapshotter@sha256:26e327b018c21a49523b759d7787e99553181ae9ef90b6bdc13abe362a43ced0\",\n                            \"k8s.gcr.io/sig-storage/csi-snapshotter:v3.0.2\"\n                        ],\n                        \"sizeBytes\": 47823451\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-attacher@sha256:2ffa647e8107cfd39e5f464e738dce014c9f5e51b108da36c3ab621048d0bbab\",\n                            \"k8s.gcr.io/sig-storage/csi-attacher:v2.2.0\"\n                        ],\n                        \"sizeBytes\": 46131354\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-resizer@sha256:6c6a0332693a7c456378f6abd2bb40611826c1e1a733cadbdae2daab3125b71c\",\n                            \"k8s.gcr.io/sig-storage/csi-resizer:v0.5.0\"\n                        ],\n                        \"sizeBytes\": 46041582\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/coredns@sha256:73ca82b4ce829766d4f1f10947c3a338888f876fbed0540dc849c89ff256e90c\",\n                            \"k8s.gcr.io/coredns:1.7.0\"\n                        ],\n                        \"sizeBytes\": 45227747\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/hostpathplugin@sha256:d2b357bb02430fee9eaa43b16083981463d260419fe3acb2f560ede5c129f6f5\",\n                            \"k8s.gcr.io/sig-storage/hostpathplugin:v1.4.0\"\n                        ],\n                        \"sizeBytes\": 27762720\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-node-driver-registrar@sha256:a61d309da54641db41fb8f35718f744e9f730d4d0384f8c4b186ddc9f06cbd5f\",\n                            \"k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.1.0\"\n                        ],\n                        \"sizeBytes\": 19662887\n                    },\n                    {\n                        \"names\": [\n                            \"quay.io/k8scsi/livenessprobe@sha256:d657c5644aefe12d4bbdffb900602df65c67dbaea99b26b2005465b88b1bc96e\",\n                            \"quay.io/k8scsi/livenessprobe:v2.2.0\"\n                        ],\n                        \"sizeBytes\": 17805321\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/csi-node-driver-registrar@sha256:9622c6a6dac7499a055a382930f4de82905a3c5735c0753f7094115c9c871309\",\n                            \"k8s.gcr.io/sig-storage/csi-node-driver-registrar:v1.3.0\"\n                        ],\n                        \"sizeBytes\": 16322467\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/e2e-test-images/nginx@sha256:503b7abb89e57383eba61cc8a9cb0b495ea575c516108f7d972a6ff6e1ab3c9b\",\n                            \"k8s.gcr.io/e2e-test-images/nginx:1.14-1\"\n                        ],\n                        \"sizeBytes\": 16032814\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/sig-storage/livenessprobe@sha256:f8cec70adc74897ddde5da4f1da0209a497370eaf657566e2b36bc5f0f3ccbd7\",\n                            \"k8s.gcr.io/sig-storage/livenessprobe:v1.1.0\"\n                        ],\n                        \"sizeBytes\": 14967303\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac\",\n                            \"k8s.gcr.io/e2e-test-images/nonewprivs:1.3\"\n                        ],\n                        \"sizeBytes\": 7107254\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/e2e-test-images/busybox@sha256:39e1e963e5310e9c313bad51523be012ede7b35bb9316517d19089a010356592\",\n                            \"k8s.gcr.io/e2e-test-images/busybox:1.29-1\"\n                        ],\n                        \"sizeBytes\": 1154361\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/pause@sha256:927d98197ec1141a368550822d18fa1c60bdae27b78b0c004f705f548c07814f\",\n                            \"k8s.gcr.io/pause:3.2\"\n                        ],\n                        \"sizeBytes\": 682696\n                    },\n                    {\n                        \"names\": [\n                            \"k8s.gcr.io/pause@sha256:6c3835cab3980f11b83277305d0d736051c32b17606f5ec59f1dda67c9ba3810\",\n                            \"k8s.gcr.io/pause:3.4.1\"\n                        ],\n                        \"sizeBytes\": 682696\n                    }\n                ],\n                \"volumesInUse\": [\n                    \"kubernetes.io/csi/ebs.csi.aws.com^vol-015bc787f0b76760f\",\n                    \"kubernetes.io/csi/ebs.csi.aws.com^vol-0b77f6fb08f932ccf\"\n                ],\n                \"volumesAttached\": [\n                    {\n                        \"name\": \"kubernetes.io/csi/ebs.csi.aws.com^vol-0b77f6fb08f932ccf\",\n                        \"devicePath\": \"\"\n                    },\n                    {\n                        \"name\": \"kubernetes.io/csi/ebs.csi.aws.com^vol-015bc787f0b76760f\",\n                        \"devicePath\": \"\"\n                    }\n                ]\n            }\n        }\n    ]\n}\n{\n    \"kind\": \"EventList\",\n    \"apiVersion\": \"v1\",\n    \"metadata\": {\n        \"resourceVersion\": \"5846\"\n    },\n    \"items\": [\n        {\n            \"metadata\": {\n                \"name\": \"coredns-66cbffdd77-njn45.167d781b5adcd816\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"e8e31bb4-b9ad-4392-b5fc-a4f8d013db87\",\n                \"resourceVersion\": \"259\",\n                \"creationTimestamp\": \"2021-05-09T18:04:59Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns-66cbffdd77-njn45\",\n                \"uid\": \"8ee23a12-77c0-4948-aafc-4e5692ab1250\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"783\"\n            },\n            \"reason\": \"Scheduled\",\n            \"message\": \"Successfully assigned kube-system/coredns-66cbffdd77-njn45 to ip-172-20-57-119.ap-south-1.compute.internal\",\n            \"source\": {\n                \"component\": \"default-scheduler\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:59Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:59Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-66cbffdd77-njn45.167d781b98040dab\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"e63ae04f-62a8-4782-889f-8b244675dae7\",\n                \"resourceVersion\": \"263\",\n                \"creationTimestamp\": \"2021-05-09T18:05:00Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns-66cbffdd77-njn45\",\n                \"uid\": \"8ee23a12-77c0-4948-aafc-4e5692ab1250\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"786\",\n                \"fieldPath\": \"spec.containers{coredns}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/coredns:1.7.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-57-119.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:00Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:00Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-66cbffdd77-njn45.167d781bb9bda3ea\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"c2925420-5670-4a48-b1f3-730caeef0410\",\n                \"resourceVersion\": \"264\",\n                \"creationTimestamp\": \"2021-05-09T18:05:01Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns-66cbffdd77-njn45\"\n            },\n            \"reason\": \"TaintManagerEviction\",\n            \"message\": \"Cancelling deletion of Pod kube-system/coredns-66cbffdd77-njn45\",\n            \"source\": {\n                \"component\": \"taint-controller\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:01Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:01Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-66cbffdd77-njn45.167d781d64c7074b\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"a9d0b740-5e9f-4893-8281-90caa12c3aaf\",\n                \"resourceVersion\": \"280\",\n                \"creationTimestamp\": \"2021-05-09T18:05:08Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns-66cbffdd77-njn45\",\n                \"uid\": \"8ee23a12-77c0-4948-aafc-4e5692ab1250\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"786\",\n                \"fieldPath\": \"spec.containers{coredns}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/coredns:1.7.0\\\" in 7.730284948s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-57-119.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:08Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:08Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-66cbffdd77-njn45.167d781d6b667798\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"05af14fc-9a5e-4627-b627-6f5305b34202\",\n                \"resourceVersion\": \"281\",\n                \"creationTimestamp\": \"2021-05-09T18:05:08Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns-66cbffdd77-njn45\",\n                \"uid\": \"8ee23a12-77c0-4948-aafc-4e5692ab1250\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"786\",\n                \"fieldPath\": \"spec.containers{coredns}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container coredns\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-57-119.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:08Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:08Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-66cbffdd77-njn45.167d781d723f2494\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"d9da222b-5643-4b89-a7f3-c4dbe9c3abd2\",\n                \"resourceVersion\": \"282\",\n                \"creationTimestamp\": \"2021-05-09T18:05:08Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns-66cbffdd77-njn45\",\n                \"uid\": \"8ee23a12-77c0-4948-aafc-4e5692ab1250\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"786\",\n                \"fieldPath\": \"spec.containers{coredns}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container coredns\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-57-119.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:08Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:08Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-66cbffdd77-zkthw.167d780ab86c1311\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"e2d0df41-e5bc-4528-96c9-99d6f38b85f9\",\n                \"resourceVersion\": \"112\",\n                \"creationTimestamp\": \"2021-05-09T18:03:48Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns-66cbffdd77-zkthw\",\n                \"uid\": \"9f572125-40d1-4e2f-9bd9-813500fbe120\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"435\"\n            },\n            \"reason\": \"FailedScheduling\",\n            \"message\": \"0/1 nodes are available: 1 node(s) had taint {node-role.kubernetes.io/master: }, that the pod didn't tolerate.\",\n            \"source\": {\n                \"component\": \"default-scheduler\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:48Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:17Z\",\n            \"count\": 5,\n            \"type\": \"Warning\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-66cbffdd77-zkthw.167d78172e9bbb47\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"76b9da47-e687-4e09-990b-ca3da60c311f\",\n                \"resourceVersion\": \"140\",\n                \"creationTimestamp\": \"2021-05-09T18:04:41Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns-66cbffdd77-zkthw\",\n                \"uid\": \"9f572125-40d1-4e2f-9bd9-813500fbe120\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"475\"\n            },\n            \"reason\": \"FailedScheduling\",\n            \"message\": \"0/2 nodes are available: 1 node(s) had taint {node-role.kubernetes.io/master: }, that the pod didn't tolerate, 1 node(s) had taint {node.kubernetes.io/not-ready: }, that the pod didn't tolerate.\",\n            \"source\": {\n                \"component\": \"default-scheduler\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:41Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:41Z\",\n            \"count\": 1,\n            \"type\": \"Warning\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-66cbffdd77-zkthw.167d7819a210d35f\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"d564659a-01f8-4c7f-8b63-18f0a2e19e5f\",\n                \"resourceVersion\": \"196\",\n                \"creationTimestamp\": \"2021-05-09T18:04:52Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns-66cbffdd77-zkthw\",\n                \"uid\": \"9f572125-40d1-4e2f-9bd9-813500fbe120\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"649\"\n            },\n            \"reason\": \"Scheduled\",\n            \"message\": \"Successfully assigned kube-system/coredns-66cbffdd77-zkthw to ip-172-20-61-172.ap-south-1.compute.internal\",\n            \"source\": {\n                \"component\": \"default-scheduler\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:52Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:52Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-66cbffdd77-zkthw.167d781a059e3448\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"93eb79c9-6ba3-472a-ae90-b4d4ae5ba8f9\",\n                \"resourceVersion\": \"214\",\n                \"creationTimestamp\": \"2021-05-09T18:04:54Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns-66cbffdd77-zkthw\",\n                \"uid\": \"9f572125-40d1-4e2f-9bd9-813500fbe120\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"728\",\n                \"fieldPath\": \"spec.containers{coredns}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/coredns:1.7.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-61-172.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:54Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:54Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-66cbffdd77-zkthw.167d781b2697bcb9\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"e1228049-bda7-45b1-8529-8ff29cea6508\",\n                \"resourceVersion\": \"247\",\n                \"creationTimestamp\": \"2021-05-09T18:04:58Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns-66cbffdd77-zkthw\",\n                \"uid\": \"9f572125-40d1-4e2f-9bd9-813500fbe120\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"728\",\n                \"fieldPath\": \"spec.containers{coredns}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/coredns:1.7.0\\\" in 4.848178127s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-61-172.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:58Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:58Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-66cbffdd77-zkthw.167d781b2cfc7e19\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"4b61fd35-628a-4512-9a82-7551b1a8cf1c\",\n                \"resourceVersion\": \"248\",\n                \"creationTimestamp\": \"2021-05-09T18:04:59Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns-66cbffdd77-zkthw\",\n                \"uid\": \"9f572125-40d1-4e2f-9bd9-813500fbe120\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"728\",\n                \"fieldPath\": \"spec.containers{coredns}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container coredns\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-61-172.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:59Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:59Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-66cbffdd77-zkthw.167d781b34cb9f74\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"546c6e02-bd2f-4262-9da1-a7dac024aafc\",\n                \"resourceVersion\": \"250\",\n                \"creationTimestamp\": \"2021-05-09T18:04:59Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns-66cbffdd77-zkthw\",\n                \"uid\": \"9f572125-40d1-4e2f-9bd9-813500fbe120\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"728\",\n                \"fieldPath\": \"spec.containers{coredns}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container coredns\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-61-172.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:59Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:59Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-66cbffdd77.167d78049ad03255\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"167d133d-6724-4054-9b45-3c83a3fdb076\",\n                \"resourceVersion\": \"52\",\n                \"creationTimestamp\": \"2021-05-09T18:03:22Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"ReplicaSet\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns-66cbffdd77\",\n                \"uid\": \"61f4e213-1b0d-4447-b2a5-824feaaa3472\",\n                \"apiVersion\": \"apps/v1\",\n                \"resourceVersion\": \"413\"\n            },\n            \"reason\": \"SuccessfulCreate\",\n            \"message\": \"Created pod: coredns-66cbffdd77-zkthw\",\n            \"source\": {\n                \"component\": \"replicaset-controller\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:22Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:22Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-66cbffdd77.167d781b59b93e61\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"9fa5b912-dc10-48a8-8ef3-fb200219ac1c\",\n                \"resourceVersion\": \"258\",\n                \"creationTimestamp\": \"2021-05-09T18:04:59Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"ReplicaSet\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns-66cbffdd77\",\n                \"uid\": \"61f4e213-1b0d-4447-b2a5-824feaaa3472\",\n                \"apiVersion\": \"apps/v1\",\n                \"resourceVersion\": \"782\"\n            },\n            \"reason\": \"SuccessfulCreate\",\n            \"message\": \"Created pod: coredns-66cbffdd77-njn45\",\n            \"source\": {\n                \"component\": \"replicaset-controller\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:59Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:59Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-autoscaler-6f594f4c58-jhvmb.167d780aba7886c0\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"878d96de-4232-4682-b346-ea8a13a9766e\",\n                \"resourceVersion\": \"113\",\n                \"creationTimestamp\": \"2021-05-09T18:03:48Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns-autoscaler-6f594f4c58-jhvmb\",\n                \"uid\": \"d5ab454e-e9c8-49bd-86df-3f3009429476\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"432\"\n            },\n            \"reason\": \"FailedScheduling\",\n            \"message\": \"0/1 nodes are available: 1 node(s) had taint {node-role.kubernetes.io/master: }, that the pod didn't tolerate.\",\n            \"source\": {\n                \"component\": \"default-scheduler\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:48Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:17Z\",\n            \"count\": 5,\n            \"type\": \"Warning\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-autoscaler-6f594f4c58-jhvmb.167d78172fa419c7\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"105020e4-b5e2-4764-8623-5530ddd23a4f\",\n                \"resourceVersion\": \"141\",\n                \"creationTimestamp\": \"2021-05-09T18:04:41Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns-autoscaler-6f594f4c58-jhvmb\",\n                \"uid\": \"d5ab454e-e9c8-49bd-86df-3f3009429476\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"477\"\n            },\n            \"reason\": \"FailedScheduling\",\n            \"message\": \"0/2 nodes are available: 1 node(s) had taint {node-role.kubernetes.io/master: }, that the pod didn't tolerate, 1 node(s) had taint {node.kubernetes.io/not-ready: }, that the pod didn't tolerate.\",\n            \"source\": {\n                \"component\": \"default-scheduler\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:41Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:41Z\",\n            \"count\": 1,\n            \"type\": \"Warning\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-autoscaler-6f594f4c58-jhvmb.167d7819a264f315\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"5e8ae4a5-d7dc-41e0-b1ee-11f574d7f402\",\n                \"resourceVersion\": \"197\",\n                \"creationTimestamp\": \"2021-05-09T18:04:52Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns-autoscaler-6f594f4c58-jhvmb\",\n                \"uid\": \"d5ab454e-e9c8-49bd-86df-3f3009429476\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"652\"\n            },\n            \"reason\": \"Scheduled\",\n            \"message\": \"Successfully assigned kube-system/coredns-autoscaler-6f594f4c58-jhvmb to ip-172-20-33-8.ap-south-1.compute.internal\",\n            \"source\": {\n                \"component\": \"default-scheduler\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:52Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:52Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-autoscaler-6f594f4c58-jhvmb.167d7819dea6106e\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"8f62433f-16b8-4e2a-89d8-f4404f48b04f\",\n                \"resourceVersion\": \"218\",\n                \"creationTimestamp\": \"2021-05-09T18:04:54Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns-autoscaler-6f594f4c58-jhvmb\",\n                \"uid\": \"d5ab454e-e9c8-49bd-86df-3f3009429476\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"729\",\n                \"fieldPath\": \"spec.containers{autoscaler}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/cpa/cluster-proportional-autoscaler:1.8.3\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-8.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:53Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:53Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-autoscaler-6f594f4c58-jhvmb.167d781b3cbaaeef\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"ce56233a-d673-4468-8547-0cfdca456b82\",\n                \"resourceVersion\": \"251\",\n                \"creationTimestamp\": \"2021-05-09T18:04:59Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns-autoscaler-6f594f4c58-jhvmb\",\n                \"uid\": \"d5ab454e-e9c8-49bd-86df-3f3009429476\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"729\",\n                \"fieldPath\": \"spec.containers{autoscaler}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/cpa/cluster-proportional-autoscaler:1.8.3\\\" in 5.873368022s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-8.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:59Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:59Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-autoscaler-6f594f4c58-jhvmb.167d781b428803c0\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"6e7eacf3-8a4b-46e4-86ca-4635e79ce5fc\",\n                \"resourceVersion\": \"253\",\n                \"creationTimestamp\": \"2021-05-09T18:04:59Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns-autoscaler-6f594f4c58-jhvmb\",\n                \"uid\": \"d5ab454e-e9c8-49bd-86df-3f3009429476\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"729\",\n                \"fieldPath\": \"spec.containers{autoscaler}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container autoscaler\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-8.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:59Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:59Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-autoscaler-6f594f4c58-jhvmb.167d781b4903c81b\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"f2c6c6a1-d320-48f6-b827-5f873f61ddb5\",\n                \"resourceVersion\": \"254\",\n                \"creationTimestamp\": \"2021-05-09T18:04:59Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns-autoscaler-6f594f4c58-jhvmb\",\n                \"uid\": \"d5ab454e-e9c8-49bd-86df-3f3009429476\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"729\",\n                \"fieldPath\": \"spec.containers{autoscaler}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container autoscaler\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-8.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:59Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:59Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-autoscaler-6f594f4c58.167d78049a6e1049\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"2d2c66ca-3efd-4e53-bc88-114d17bf9e92\",\n                \"resourceVersion\": \"49\",\n                \"creationTimestamp\": \"2021-05-09T18:03:22Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"ReplicaSet\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns-autoscaler-6f594f4c58\",\n                \"uid\": \"1599663f-9877-4ad4-9198-cd85df0bdc07\",\n                \"apiVersion\": \"apps/v1\",\n                \"resourceVersion\": \"416\"\n            },\n            \"reason\": \"SuccessfulCreate\",\n            \"message\": \"Created pod: coredns-autoscaler-6f594f4c58-jhvmb\",\n            \"source\": {\n                \"component\": \"replicaset-controller\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:22Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:22Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-autoscaler.167d78049139d66f\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"4353e39e-64e0-4670-9f85-28ee730ed9c5\",\n                \"resourceVersion\": \"46\",\n                \"creationTimestamp\": \"2021-05-09T18:03:21Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Deployment\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns-autoscaler\",\n                \"uid\": \"67ce1e3d-2f80-473c-be38-e143ca4b7fbc\",\n                \"apiVersion\": \"apps/v1\",\n                \"resourceVersion\": \"239\"\n            },\n            \"reason\": \"ScalingReplicaSet\",\n            \"message\": \"Scaled up replica set coredns-autoscaler-6f594f4c58 to 1\",\n            \"source\": {\n                \"component\": \"deployment-controller\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:21Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:21Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns.167d780490a9f269\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"41f33c9d-1522-4561-b85d-7325169bc4df\",\n                \"resourceVersion\": \"45\",\n                \"creationTimestamp\": \"2021-05-09T18:03:21Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Deployment\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns\",\n                \"uid\": \"a61b575f-ac1b-42c7-a8b1-37725ddf02ff\",\n                \"apiVersion\": \"apps/v1\",\n                \"resourceVersion\": \"240\"\n            },\n            \"reason\": \"ScalingReplicaSet\",\n            \"message\": \"Scaled up replica set coredns-66cbffdd77 to 1\",\n            \"source\": {\n                \"component\": \"deployment-controller\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:21Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:21Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns.167d781b595199ce\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"dca4cbe4-3202-4565-8894-c96a47307fbd\",\n                \"resourceVersion\": \"257\",\n                \"creationTimestamp\": \"2021-05-09T18:04:59Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Deployment\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"coredns\",\n                \"uid\": \"a61b575f-ac1b-42c7-a8b1-37725ddf02ff\",\n                \"apiVersion\": \"apps/v1\",\n                \"resourceVersion\": \"781\"\n            },\n            \"reason\": \"ScalingReplicaSet\",\n            \"message\": \"Scaled up replica set coredns-66cbffdd77 to 2\",\n            \"source\": {\n                \"component\": \"deployment-controller\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:59Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:59Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"dns-controller-5f98b58844-qbszv.167d780abb4b424a\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"98a63796-2dba-4d38-9197-87e2b8c6ee93\",\n                \"resourceVersion\": \"61\",\n                \"creationTimestamp\": \"2021-05-09T18:03:48Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"dns-controller-5f98b58844-qbszv\",\n                \"uid\": \"9ac9b338-9060-43d1-9a06-702078f66322\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"433\"\n            },\n            \"reason\": \"Scheduled\",\n            \"message\": \"Successfully assigned kube-system/dns-controller-5f98b58844-qbszv to ip-172-20-45-192.ap-south-1.compute.internal\",\n            \"source\": {\n                \"component\": \"default-scheduler\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:48Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:48Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"dns-controller-5f98b58844-qbszv.167d780b9a50de40\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"a23efc87-0df2-4ab1-b3e4-ef53fc7b9008\",\n                \"resourceVersion\": \"68\",\n                \"creationTimestamp\": \"2021-05-09T18:03:52Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"dns-controller-5f98b58844-qbszv\",\n                \"uid\": \"9ac9b338-9060-43d1-9a06-702078f66322\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"478\",\n                \"fieldPath\": \"spec.containers{dns-controller}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Container image \\\"k8s.gcr.io/kops/dns-controller:1.22.0-alpha.1\\\" already present on machine\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:52Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:52Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"dns-controller-5f98b58844-qbszv.167d780b9e871016\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"a6eb0b35-e7ca-4176-b7d0-a732231b27d0\",\n                \"resourceVersion\": \"69\",\n                \"creationTimestamp\": \"2021-05-09T18:03:52Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"dns-controller-5f98b58844-qbszv\",\n                \"uid\": \"9ac9b338-9060-43d1-9a06-702078f66322\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"478\",\n                \"fieldPath\": \"spec.containers{dns-controller}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container dns-controller\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:52Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:52Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"dns-controller-5f98b58844-qbszv.167d780bac30299b\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"86afa17f-f9e2-4faf-a7c8-d1e74a921caa\",\n                \"resourceVersion\": \"71\",\n                \"creationTimestamp\": \"2021-05-09T18:03:52Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"dns-controller-5f98b58844-qbszv\",\n                \"uid\": \"9ac9b338-9060-43d1-9a06-702078f66322\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"478\",\n                \"fieldPath\": \"spec.containers{dns-controller}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container dns-controller\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:52Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:52Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"dns-controller-5f98b58844.167d78049ac00613\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"97691156-c7a4-4124-868d-85dc6f057360\",\n                \"resourceVersion\": \"50\",\n                \"creationTimestamp\": \"2021-05-09T18:03:22Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"ReplicaSet\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"dns-controller-5f98b58844\",\n                \"uid\": \"bf1b4cc8-6542-40f7-a008-0973a92fc819\",\n                \"apiVersion\": \"apps/v1\",\n                \"resourceVersion\": \"415\"\n            },\n            \"reason\": \"SuccessfulCreate\",\n            \"message\": \"Created pod: dns-controller-5f98b58844-qbszv\",\n            \"source\": {\n                \"component\": \"replicaset-controller\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:22Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:22Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"dns-controller.167d780490960909\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"7c4f4143-5ade-4bf7-9b87-37b36af1dbe1\",\n                \"resourceVersion\": \"43\",\n                \"creationTimestamp\": \"2021-05-09T18:03:21Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Deployment\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"dns-controller\",\n                \"uid\": \"77ad756f-5d8d-4aad-b4c5-f1fbaa77b0c6\",\n                \"apiVersion\": \"apps/v1\",\n                \"resourceVersion\": \"255\"\n            },\n            \"reason\": \"ScalingReplicaSet\",\n            \"message\": \"Scaled up replica set dns-controller-5f98b58844 to 1\",\n            \"source\": {\n                \"component\": \"deployment-controller\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:21Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:21Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-aws-com.167d780e6966de0d\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"e3d18b45-beb5-4ce4-901b-2f9f4f5b9162\",\n                \"resourceVersion\": \"92\",\n                \"creationTimestamp\": \"2021-05-09T18:04:04Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Lease\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-aws-com\",\n                \"uid\": \"8d3e78ff-0c5f-41fc-b617-ee2d35e81b7a\",\n                \"apiVersion\": \"coordination.k8s.io/v1\",\n                \"resourceVersion\": \"520\"\n            },\n            \"reason\": \"LeaderElection\",\n            \"message\": \"ebs-csi-controller-79fb985c8d-b6bjr became leader\",\n            \"source\": {\n                \"component\": \"ebs.csi.aws.com/ebs-csi-controller-79fb985c8d-b6bjr\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:04Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:04Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d780ab8b7d8a3\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"1d8ed680-cc70-4069-b65b-1162086bd609\",\n                \"resourceVersion\": \"56\",\n                \"creationTimestamp\": \"2021-05-09T18:03:48Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"434\"\n            },\n            \"reason\": \"Scheduled\",\n            \"message\": \"Successfully assigned kube-system/ebs-csi-controller-79fb985c8d-b6bjr to ip-172-20-45-192.ap-south-1.compute.internal\",\n            \"source\": {\n                \"component\": \"default-scheduler\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:48Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:48Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d780b9898a5fd\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"2e32a996-318a-4149-9de2-f9075ba7e7e2\",\n                \"resourceVersion\": \"67\",\n                \"creationTimestamp\": \"2021-05-09T18:03:52Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"471\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/provider-aws/aws-ebs-csi-driver:v1.0.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:52Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:52Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d780ce7db6f10\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"ac29e369-92e3-4214-b139-b3d20647881b\",\n                \"resourceVersion\": \"76\",\n                \"creationTimestamp\": \"2021-05-09T18:03:57Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"471\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/provider-aws/aws-ebs-csi-driver:v1.0.0\\\" in 5.624730603s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:57Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:57Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d780d0e3741df\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"e03d9515-c537-4417-9ea6-5ab5797aaf0a\",\n                \"resourceVersion\": \"77\",\n                \"creationTimestamp\": \"2021-05-09T18:03:58Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"471\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container ebs-plugin\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:58Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:58Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d780d161baca2\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"e992fd45-0b46-4b98-8a52-4eb63947fd4d\",\n                \"resourceVersion\": \"78\",\n                \"creationTimestamp\": \"2021-05-09T18:03:58Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"471\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container ebs-plugin\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:58Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:58Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d780d166df26d\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"5fbddbfd-5f06-4a93-9067-3083c53d5358\",\n                \"resourceVersion\": \"79\",\n                \"creationTimestamp\": \"2021-05-09T18:03:58Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"471\",\n                \"fieldPath\": \"spec.containers{csi-provisioner}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/sig-storage/csi-provisioner:v2.2.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:58Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:58Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d780e5601436f\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"92cf26f8-3487-46c4-a70a-8dba7bb48a80\",\n                \"resourceVersion\": \"88\",\n                \"creationTimestamp\": \"2021-05-09T18:04:03Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"471\",\n                \"fieldPath\": \"spec.containers{csi-provisioner}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/sig-storage/csi-provisioner:v2.2.0\\\" in 5.361566476s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:03Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:03Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d780e5df03ef1\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"12411bc6-59ca-4af5-a89c-e74303edf3e2\",\n                \"resourceVersion\": \"89\",\n                \"creationTimestamp\": \"2021-05-09T18:04:04Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"471\",\n                \"fieldPath\": \"spec.containers{csi-provisioner}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container csi-provisioner\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:04Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:04Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d780e661d2185\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"a9e7031b-ab23-4d2c-9e3c-fbd2c5baea7a\",\n                \"resourceVersion\": \"90\",\n                \"creationTimestamp\": \"2021-05-09T18:04:04Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"471\",\n                \"fieldPath\": \"spec.containers{csi-provisioner}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container csi-provisioner\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:04Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:04Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d780e6690827e\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"06658036-d906-477c-9a2b-eb3eacf2c306\",\n                \"resourceVersion\": \"91\",\n                \"creationTimestamp\": \"2021-05-09T18:04:04Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"471\",\n                \"fieldPath\": \"spec.containers{csi-attacher}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/sig-storage/csi-attacher:v3.2.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:04Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:04Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d78103c6aa98c\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"5935f0dd-2253-43ba-977f-5839164c6829\",\n                \"resourceVersion\": \"103\",\n                \"creationTimestamp\": \"2021-05-09T18:04:12Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"471\",\n                \"fieldPath\": \"spec.containers{csi-attacher}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/sig-storage/csi-attacher:v3.2.0\\\" in 7.882799211s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:12Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:12Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d781044458247\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"066a4cca-904c-4cdd-aeb2-c8d0dea3083b\",\n                \"resourceVersion\": \"104\",\n                \"creationTimestamp\": \"2021-05-09T18:04:12Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"471\",\n                \"fieldPath\": \"spec.containers{csi-attacher}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container csi-attacher\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:12Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:12Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d78104b1a107f\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"cbf0db23-6a1f-4248-ad2f-8e3ec3e68c32\",\n                \"resourceVersion\": \"105\",\n                \"creationTimestamp\": \"2021-05-09T18:04:12Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"471\",\n                \"fieldPath\": \"spec.containers{csi-attacher}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container csi-attacher\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:12Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:12Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d78104b8af137\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"f7fd7799-3e9d-4b28-be91-fef08d23a095\",\n                \"resourceVersion\": \"106\",\n                \"creationTimestamp\": \"2021-05-09T18:04:12Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"471\",\n                \"fieldPath\": \"spec.containers{csi-snapshotter}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/sig-storage/csi-snapshotter:v4.0.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:12Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:12Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d7812eee4dbf0\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"95a00546-cd53-4ca9-bad7-0a622c2e4341\",\n                \"resourceVersion\": \"117\",\n                \"creationTimestamp\": \"2021-05-09T18:04:23Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"471\",\n                \"fieldPath\": \"spec.containers{csi-snapshotter}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/sig-storage/csi-snapshotter:v4.0.0\\\" in 11.330503572s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:23Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:23Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d7812f85cf04d\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"962304a3-3caf-4c01-873a-c0ff12dbaf5a\",\n                \"resourceVersion\": \"118\",\n                \"creationTimestamp\": \"2021-05-09T18:04:23Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"471\",\n                \"fieldPath\": \"spec.containers{csi-snapshotter}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container csi-snapshotter\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:23Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:23Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d7813022fb214\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"f07bf6bf-79e0-4c87-b3ef-31365800605e\",\n                \"resourceVersion\": \"119\",\n                \"creationTimestamp\": \"2021-05-09T18:04:23Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"471\",\n                \"fieldPath\": \"spec.containers{csi-snapshotter}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container csi-snapshotter\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:23Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:23Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d781302adc413\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"783277c4-2f53-4d86-88f3-93b9a80d3b23\",\n                \"resourceVersion\": \"120\",\n                \"creationTimestamp\": \"2021-05-09T18:04:23Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"471\",\n                \"fieldPath\": \"spec.containers{csi-resizer}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/sig-storage/csi-resizer:v1.1.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:23Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:23Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d7814183994d3\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"d3bc7803-851b-44a1-9757-cc5977316703\",\n                \"resourceVersion\": \"126\",\n                \"creationTimestamp\": \"2021-05-09T18:04:28Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"471\",\n                \"fieldPath\": \"spec.containers{csi-resizer}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/sig-storage/csi-resizer:v1.1.0\\\" in 4.656436599s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:28Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:28Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d78141f404306\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"10eca82e-777f-407d-a7d2-9b8a852b2c0d\",\n                \"resourceVersion\": \"127\",\n                \"creationTimestamp\": \"2021-05-09T18:04:28Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"471\",\n                \"fieldPath\": \"spec.containers{csi-resizer}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container csi-resizer\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:28Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:28Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d781426cb3a9b\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"1affc650-1199-490f-9b72-191ddbf4215d\",\n                \"resourceVersion\": \"128\",\n                \"creationTimestamp\": \"2021-05-09T18:04:28Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"471\",\n                \"fieldPath\": \"spec.containers{csi-resizer}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container csi-resizer\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:28Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:28Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d781426fc6785\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"bbda5046-ead2-4913-9362-a36bcec65385\",\n                \"resourceVersion\": \"129\",\n                \"creationTimestamp\": \"2021-05-09T18:04:28Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"471\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/sig-storage/livenessprobe:v2.2.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:28Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:28Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d7814fe60761d\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"f0f38cf1-9ef8-41a3-8c9e-eefd2af38a5e\",\n                \"resourceVersion\": \"134\",\n                \"creationTimestamp\": \"2021-05-09T18:04:32Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"471\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/sig-storage/livenessprobe:v2.2.0\\\" in 3.613649211s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:32Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:32Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d781503c1e134\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"b30e279a-26cc-4ac7-ad56-7f5520cf8708\",\n                \"resourceVersion\": \"135\",\n                \"creationTimestamp\": \"2021-05-09T18:04:32Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"471\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container liveness-probe\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:32Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:32Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr.167d78150c4021c7\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"0048b430-e0ca-4be0-aed0-72f2aa054e6e\",\n                \"resourceVersion\": \"136\",\n                \"creationTimestamp\": \"2021-05-09T18:04:32Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-b6bjr\",\n                \"uid\": \"4cbe84e7-0576-4443-9ca2-000db0c8d457\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"471\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container liveness-probe\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:32Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:32Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d780abac0ad93\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"54b321f2-c93f-4746-bfb8-640de6355d76\",\n                \"resourceVersion\": \"60\",\n                \"creationTimestamp\": \"2021-05-09T18:03:48Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"437\"\n            },\n            \"reason\": \"Scheduled\",\n            \"message\": \"Successfully assigned kube-system/ebs-csi-controller-79fb985c8d-s69s9 to ip-172-20-45-192.ap-south-1.compute.internal\",\n            \"source\": {\n                \"component\": \"default-scheduler\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:48Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:48Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d780bab6cbe26\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"af41a7c0-c5ef-4364-a072-fe484290b36d\",\n                \"resourceVersion\": \"70\",\n                \"creationTimestamp\": \"2021-05-09T18:03:52Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"476\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/provider-aws/aws-ebs-csi-driver:v1.0.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:52Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:52Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d780d227ca892\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"458f59b7-3cb1-468a-9f9f-207f50256cdd\",\n                \"resourceVersion\": \"80\",\n                \"creationTimestamp\": \"2021-05-09T18:03:58Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"476\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/provider-aws/aws-ebs-csi-driver:v1.0.0\\\" in 6.292486549s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:58Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:58Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d780d2619addd\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"828deba1-b6a3-439e-b883-a6a4620c2e07\",\n                \"resourceVersion\": \"81\",\n                \"creationTimestamp\": \"2021-05-09T18:03:58Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"476\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container ebs-plugin\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:58Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:58Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d780d2d5d678c\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"4f3db752-7039-4481-b487-d3bde9d1bd4c\",\n                \"resourceVersion\": \"82\",\n                \"creationTimestamp\": \"2021-05-09T18:03:58Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"476\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container ebs-plugin\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:58Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:58Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d780d2e2b048c\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"5d5374d2-769d-4ae4-8d42-bc9b5ecb5fa4\",\n                \"resourceVersion\": \"83\",\n                \"creationTimestamp\": \"2021-05-09T18:03:58Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"476\",\n                \"fieldPath\": \"spec.containers{csi-provisioner}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/sig-storage/csi-provisioner:v2.2.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:58Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:58Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d780e921ff5bf\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"8134b9b7-8328-4515-a679-e9373f1ee94d\",\n                \"resourceVersion\": \"93\",\n                \"creationTimestamp\": \"2021-05-09T18:04:04Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"476\",\n                \"fieldPath\": \"spec.containers{csi-provisioner}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/sig-storage/csi-provisioner:v2.2.0\\\" in 5.971952878s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:04Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:04Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d780e949019d3\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"43717c7d-3e8f-49a3-8031-ba8989dfd301\",\n                \"resourceVersion\": \"94\",\n                \"creationTimestamp\": \"2021-05-09T18:04:04Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"476\",\n                \"fieldPath\": \"spec.containers{csi-provisioner}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container csi-provisioner\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:04Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:04Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d780e9c11f95e\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"f4d8d0d5-bb88-466a-a089-7fcfeb3f5b3e\",\n                \"resourceVersion\": \"95\",\n                \"creationTimestamp\": \"2021-05-09T18:04:05Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"476\",\n                \"fieldPath\": \"spec.containers{csi-provisioner}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container csi-provisioner\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:05Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:05Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d780e9c3e792c\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"416d99b7-1b6a-474f-beb1-ed598d49d078\",\n                \"resourceVersion\": \"96\",\n                \"creationTimestamp\": \"2021-05-09T18:04:05Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"476\",\n                \"fieldPath\": \"spec.containers{csi-attacher}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/sig-storage/csi-attacher:v3.2.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:05Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:05Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d7810799db8d0\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"3b68776f-b584-498b-b349-5b01f8dca1a2\",\n                \"resourceVersion\": \"108\",\n                \"creationTimestamp\": \"2021-05-09T18:04:13Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"476\",\n                \"fieldPath\": \"spec.containers{csi-attacher}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/sig-storage/csi-attacher:v3.2.0\\\" in 8.008947683s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:13Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:13Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d78107ea37b0d\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"7ada6833-d5a3-42fb-ab9e-007220ccac7f\",\n                \"resourceVersion\": \"109\",\n                \"creationTimestamp\": \"2021-05-09T18:04:13Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"476\",\n                \"fieldPath\": \"spec.containers{csi-attacher}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container csi-attacher\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:13Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:13Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d78108654aa1b\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"edff270b-4f1e-4f24-b954-ab36a763af76\",\n                \"resourceVersion\": \"110\",\n                \"creationTimestamp\": \"2021-05-09T18:04:13Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"476\",\n                \"fieldPath\": \"spec.containers{csi-attacher}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container csi-attacher\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:13Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:13Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d781086f3861e\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"0be875e6-0479-430e-96ba-ef778d3aadf9\",\n                \"resourceVersion\": \"111\",\n                \"creationTimestamp\": \"2021-05-09T18:04:13Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"476\",\n                \"fieldPath\": \"spec.containers{csi-snapshotter}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/sig-storage/csi-snapshotter:v4.0.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:13Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:13Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d781332e066c2\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"79860b16-f243-4c0d-a63e-9d8ac3f57652\",\n                \"resourceVersion\": \"122\",\n                \"creationTimestamp\": \"2021-05-09T18:04:24Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"476\",\n                \"fieldPath\": \"spec.containers{csi-snapshotter}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/sig-storage/csi-snapshotter:v4.0.0\\\" in 11.474349074s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:24Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:24Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d781335593770\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"2dc27235-ea43-45a8-9b00-7fa2d96ea791\",\n                \"resourceVersion\": \"123\",\n                \"creationTimestamp\": \"2021-05-09T18:04:24Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"476\",\n                \"fieldPath\": \"spec.containers{csi-snapshotter}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container csi-snapshotter\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:24Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:24Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d78133bd5674c\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"666b429a-a94a-4840-af60-1d39ee3e6df3\",\n                \"resourceVersion\": \"124\",\n                \"creationTimestamp\": \"2021-05-09T18:04:24Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"476\",\n                \"fieldPath\": \"spec.containers{csi-snapshotter}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container csi-snapshotter\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:24Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:24Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d78133c2f1cff\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"ec25c7f5-f7d2-4440-8ba4-c082b4329985\",\n                \"resourceVersion\": \"125\",\n                \"creationTimestamp\": \"2021-05-09T18:04:24Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"476\",\n                \"fieldPath\": \"spec.containers{csi-resizer}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/sig-storage/csi-resizer:v1.1.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:24Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:24Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d7814550342fa\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"aec440a9-8e5c-4c13-a0b6-7492f3305ec0\",\n                \"resourceVersion\": \"130\",\n                \"creationTimestamp\": \"2021-05-09T18:04:29Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"476\",\n                \"fieldPath\": \"spec.containers{csi-resizer}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/sig-storage/csi-resizer:v1.1.0\\\" in 4.711500241s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:29Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:29Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d78145774d3db\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"4056b1c2-4af1-4adf-a233-c449a45293a7\",\n                \"resourceVersion\": \"131\",\n                \"creationTimestamp\": \"2021-05-09T18:04:29Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"476\",\n                \"fieldPath\": \"spec.containers{csi-resizer}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container csi-resizer\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:29Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:29Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d78145f177754\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"a03a3995-3f08-48f6-a27c-35ce03c119c7\",\n                \"resourceVersion\": \"132\",\n                \"creationTimestamp\": \"2021-05-09T18:04:29Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"476\",\n                \"fieldPath\": \"spec.containers{csi-resizer}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container csi-resizer\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:29Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:29Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d78145f8bdad7\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"84de8d0c-ddce-46c9-bf32-008158cfb665\",\n                \"resourceVersion\": \"133\",\n                \"creationTimestamp\": \"2021-05-09T18:04:29Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"476\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/sig-storage/livenessprobe:v2.2.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:29Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:29Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d78153aec5425\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"87340050-4d28-45f6-bc86-749deabece93\",\n                \"resourceVersion\": \"137\",\n                \"creationTimestamp\": \"2021-05-09T18:04:33Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"476\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/sig-storage/livenessprobe:v2.2.0\\\" in 3.68052002s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:33Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:33Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d78153d401d40\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"c51adc1f-8ccf-438d-a12b-990bbf218d5a\",\n                \"resourceVersion\": \"138\",\n                \"creationTimestamp\": \"2021-05-09T18:04:33Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"476\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container liveness-probe\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:33Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:33Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9.167d7815447d0ac9\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"d250c7d3-9258-4276-a874-716dbf862437\",\n                \"resourceVersion\": \"139\",\n                \"creationTimestamp\": \"2021-05-09T18:04:33Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d-s69s9\",\n                \"uid\": \"c884f503-9e9b-426a-99a1-1eaaf1f1a564\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"476\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container liveness-probe\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:33Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:33Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d.167d78049ac70be1\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"c1d43ac9-154e-4a27-b702-40d67d84355a\",\n                \"resourceVersion\": \"51\",\n                \"creationTimestamp\": \"2021-05-09T18:03:22Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"ReplicaSet\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d\",\n                \"uid\": \"2f9a36f4-6290-46f3-a081-f903f741a6f4\",\n                \"apiVersion\": \"apps/v1\",\n                \"resourceVersion\": \"414\"\n            },\n            \"reason\": \"SuccessfulCreate\",\n            \"message\": \"Created pod: ebs-csi-controller-79fb985c8d-b6bjr\",\n            \"source\": {\n                \"component\": \"replicaset-controller\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:22Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:22Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d.167d78049b495fbe\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"271d0b64-8009-43ed-9e34-f75199724f12\",\n                \"resourceVersion\": \"53\",\n                \"creationTimestamp\": \"2021-05-09T18:03:22Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"ReplicaSet\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller-79fb985c8d\",\n                \"uid\": \"2f9a36f4-6290-46f3-a081-f903f741a6f4\",\n                \"apiVersion\": \"apps/v1\",\n                \"resourceVersion\": \"414\"\n            },\n            \"reason\": \"SuccessfulCreate\",\n            \"message\": \"Created pod: ebs-csi-controller-79fb985c8d-s69s9\",\n            \"source\": {\n                \"component\": \"replicaset-controller\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:22Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:22Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller.167d7804909ebc97\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"784c9d52-c2d9-48e6-a04b-499161c81ebd\",\n                \"resourceVersion\": \"44\",\n                \"creationTimestamp\": \"2021-05-09T18:03:21Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Deployment\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-controller\",\n                \"uid\": \"6c145f46-f068-4e39-992e-003776a34b5e\",\n                \"apiVersion\": \"apps/v1\",\n                \"resourceVersion\": \"285\"\n            },\n            \"reason\": \"ScalingReplicaSet\",\n            \"message\": \"Scaled up replica set ebs-csi-controller-79fb985c8d to 2\",\n            \"source\": {\n                \"component\": \"deployment-controller\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:21Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:21Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-bjxbk.167d780ab91dc257\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"4563e38f-ece9-423a-9f6f-213975fb1323\",\n                \"resourceVersion\": \"57\",\n                \"creationTimestamp\": \"2021-05-09T18:03:48Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-bjxbk\",\n                \"uid\": \"bd457d39-3c7b-4fcb-b51e-8a7e067a7cda\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"428\"\n            },\n            \"reason\": \"Scheduled\",\n            \"message\": \"Successfully assigned kube-system/ebs-csi-node-bjxbk to ip-172-20-45-192.ap-south-1.compute.internal\",\n            \"source\": {\n                \"component\": \"default-scheduler\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:48Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:48Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-bjxbk.167d780bad1662ad\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"5e0522a3-5b81-4e49-8196-a798ff7978af\",\n                \"resourceVersion\": \"72\",\n                \"creationTimestamp\": \"2021-05-09T18:03:52Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-bjxbk\",\n                \"uid\": \"bd457d39-3c7b-4fcb-b51e-8a7e067a7cda\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"473\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/provider-aws/aws-ebs-csi-driver:v1.0.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:52Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:52Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-bjxbk.167d780d5efda318\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"243a525f-d391-49ad-853a-9b889322b659\",\n                \"resourceVersion\": \"84\",\n                \"creationTimestamp\": \"2021-05-09T18:03:59Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-bjxbk\",\n                \"uid\": \"bd457d39-3c7b-4fcb-b51e-8a7e067a7cda\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"473\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/provider-aws/aws-ebs-csi-driver:v1.0.0\\\" in 7.279679154s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:59Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:59Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-bjxbk.167d780d61ceff1a\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"1b98f8c9-de40-4128-9197-b4fb6b2e1b7b\",\n                \"resourceVersion\": \"85\",\n                \"creationTimestamp\": \"2021-05-09T18:03:59Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-bjxbk\",\n                \"uid\": \"bd457d39-3c7b-4fcb-b51e-8a7e067a7cda\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"473\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container ebs-plugin\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:59Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:59Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-bjxbk.167d780d68f9fa24\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"298c2143-9966-49aa-9a1d-be9dc3e55780\",\n                \"resourceVersion\": \"86\",\n                \"creationTimestamp\": \"2021-05-09T18:03:59Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-bjxbk\",\n                \"uid\": \"bd457d39-3c7b-4fcb-b51e-8a7e067a7cda\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"473\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container ebs-plugin\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:59Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:59Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-bjxbk.167d780d696a27a5\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"e0995027-1514-4a9c-950c-acf0181b8a37\",\n                \"resourceVersion\": \"87\",\n                \"creationTimestamp\": \"2021-05-09T18:03:59Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-bjxbk\",\n                \"uid\": \"bd457d39-3c7b-4fcb-b51e-8a7e067a7cda\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"473\",\n                \"fieldPath\": \"spec.containers{node-driver-registrar}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.1.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:59Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:59Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-bjxbk.167d780f44d3f87e\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"fa711898-b810-4bf4-b342-78d8ce91eaac\",\n                \"resourceVersion\": \"97\",\n                \"creationTimestamp\": \"2021-05-09T18:04:07Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-bjxbk\",\n                \"uid\": \"bd457d39-3c7b-4fcb-b51e-8a7e067a7cda\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"473\",\n                \"fieldPath\": \"spec.containers{node-driver-registrar}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.1.0\\\" in 7.976070003s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:07Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:07Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-bjxbk.167d780f4a057993\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"202be2bd-9ce5-4099-814b-5ad5ce2d8b5a\",\n                \"resourceVersion\": \"98\",\n                \"creationTimestamp\": \"2021-05-09T18:04:07Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-bjxbk\",\n                \"uid\": \"bd457d39-3c7b-4fcb-b51e-8a7e067a7cda\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"473\",\n                \"fieldPath\": \"spec.containers{node-driver-registrar}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container node-driver-registrar\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:07Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:07Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-bjxbk.167d780f51cafde0\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"f4cec11a-a7ba-4b9d-9bc5-0b4479727746\",\n                \"resourceVersion\": \"99\",\n                \"creationTimestamp\": \"2021-05-09T18:04:08Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-bjxbk\",\n                \"uid\": \"bd457d39-3c7b-4fcb-b51e-8a7e067a7cda\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"473\",\n                \"fieldPath\": \"spec.containers{node-driver-registrar}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container node-driver-registrar\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:08Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:08Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-bjxbk.167d780f5230996b\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"3453d835-f3e4-44e0-833d-0b7914fe5b7a\",\n                \"resourceVersion\": \"100\",\n                \"creationTimestamp\": \"2021-05-09T18:04:08Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-bjxbk\",\n                \"uid\": \"bd457d39-3c7b-4fcb-b51e-8a7e067a7cda\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"473\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"quay.io/k8scsi/livenessprobe:v2.2.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:08Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:08Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-bjxbk.167d781203e049d2\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"4cc334b4-fe75-4350-a9e0-589e5ae0575a\",\n                \"resourceVersion\": \"114\",\n                \"creationTimestamp\": \"2021-05-09T18:04:19Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-bjxbk\",\n                \"uid\": \"bd457d39-3c7b-4fcb-b51e-8a7e067a7cda\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"473\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"quay.io/k8scsi/livenessprobe:v2.2.0\\\" in 11.571002288s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:19Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:19Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-bjxbk.167d78120913b820\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"b7679a8b-bf44-472f-b521-966fa2a64369\",\n                \"resourceVersion\": \"115\",\n                \"creationTimestamp\": \"2021-05-09T18:04:19Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-bjxbk\",\n                \"uid\": \"bd457d39-3c7b-4fcb-b51e-8a7e067a7cda\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"473\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container liveness-probe\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:19Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:19Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-bjxbk.167d7812109c4ebd\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"e0c4f772-66df-4ced-bb67-0755a69f6680\",\n                \"resourceVersion\": \"116\",\n                \"creationTimestamp\": \"2021-05-09T18:04:19Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-bjxbk\",\n                \"uid\": \"bd457d39-3c7b-4fcb-b51e-8a7e067a7cda\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"473\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container liveness-probe\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:19Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:19Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-d2972.167d78181bdd7785\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"7fdb787f-a8b6-4603-9267-b4dd423f77b3\",\n                \"resourceVersion\": \"146\",\n                \"creationTimestamp\": \"2021-05-09T18:04:45Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-d2972\",\n                \"uid\": \"f10cef20-0e79-4077-9004-4e188c0fcd93\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"679\"\n            },\n            \"reason\": \"Scheduled\",\n            \"message\": \"Successfully assigned kube-system/ebs-csi-node-d2972 to ip-172-20-33-8.ap-south-1.compute.internal\",\n            \"source\": {\n                \"component\": \"default-scheduler\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:45Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:45Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-d2972.167d781903c773f8\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"e5f3b409-8802-4cd6-8e22-c46b18263779\",\n                \"resourceVersion\": \"213\",\n                \"creationTimestamp\": \"2021-05-09T18:04:54Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-d2972\",\n                \"uid\": \"f10cef20-0e79-4077-9004-4e188c0fcd93\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"681\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/provider-aws/aws-ebs-csi-driver:v1.0.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-8.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:49Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:49Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-d2972.167d781a6589b69a\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"e939d138-1859-465f-9b2d-95eff37ee359\",\n                \"resourceVersion\": \"225\",\n                \"creationTimestamp\": \"2021-05-09T18:04:55Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-d2972\",\n                \"uid\": \"f10cef20-0e79-4077-9004-4e188c0fcd93\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"681\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/provider-aws/aws-ebs-csi-driver:v1.0.0\\\" in 5.935074527s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-8.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:55Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:55Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-d2972.167d781a8a06120c\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"c27c0ff4-4a6f-444f-b211-e4f696f2e70c\",\n                \"resourceVersion\": \"230\",\n                \"creationTimestamp\": \"2021-05-09T18:04:56Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-d2972\",\n                \"uid\": \"f10cef20-0e79-4077-9004-4e188c0fcd93\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"681\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container ebs-plugin\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-8.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:56Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:56Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-d2972.167d781a91976806\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"2cb853ee-01c6-4ad7-9c6e-6fd4a95e5244\",\n                \"resourceVersion\": \"232\",\n                \"creationTimestamp\": \"2021-05-09T18:04:56Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-d2972\",\n                \"uid\": \"f10cef20-0e79-4077-9004-4e188c0fcd93\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"681\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container ebs-plugin\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-8.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:56Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:56Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-d2972.167d781a91f7a155\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"8ebdfbcd-9555-4e53-af14-754723e76c3c\",\n                \"resourceVersion\": \"233\",\n                \"creationTimestamp\": \"2021-05-09T18:04:56Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-d2972\",\n                \"uid\": \"f10cef20-0e79-4077-9004-4e188c0fcd93\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"681\",\n                \"fieldPath\": \"spec.containers{node-driver-registrar}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.1.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-8.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:56Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:56Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-d2972.167d781c045191c9\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"dd16f15f-b08e-4cfe-be50-d1ae967f03f2\",\n                \"resourceVersion\": \"272\",\n                \"creationTimestamp\": \"2021-05-09T18:05:02Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-d2972\",\n                \"uid\": \"f10cef20-0e79-4077-9004-4e188c0fcd93\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"681\",\n                \"fieldPath\": \"spec.containers{node-driver-registrar}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.1.0\\\" in 6.213449979s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-8.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:02Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:02Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-d2972.167d781c08c0fa0c\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"ef6b5820-2e88-41b0-9837-3fff18757f36\",\n                \"resourceVersion\": \"273\",\n                \"creationTimestamp\": \"2021-05-09T18:05:02Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-d2972\",\n                \"uid\": \"f10cef20-0e79-4077-9004-4e188c0fcd93\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"681\",\n                \"fieldPath\": \"spec.containers{node-driver-registrar}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container node-driver-registrar\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-8.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:02Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:02Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-d2972.167d781c0fdda70e\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"6c0b62dc-8bf5-48d9-a350-fd3103d2ec02\",\n                \"resourceVersion\": \"274\",\n                \"creationTimestamp\": \"2021-05-09T18:05:02Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-d2972\",\n                \"uid\": \"f10cef20-0e79-4077-9004-4e188c0fcd93\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"681\",\n                \"fieldPath\": \"spec.containers{node-driver-registrar}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container node-driver-registrar\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-8.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:02Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:02Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-d2972.167d781c10160c22\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"242e80fe-f3c2-4886-8837-5f6bac270ddb\",\n                \"resourceVersion\": \"275\",\n                \"creationTimestamp\": \"2021-05-09T18:05:02Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-d2972\",\n                \"uid\": \"f10cef20-0e79-4077-9004-4e188c0fcd93\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"681\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"quay.io/k8scsi/livenessprobe:v2.2.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-8.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:02Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:02Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-d2972.167d781d9af1194e\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"e4a6c4a4-915c-4f64-b21b-68ed3abe9239\",\n                \"resourceVersion\": \"286\",\n                \"creationTimestamp\": \"2021-05-09T18:05:09Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-d2972\",\n                \"uid\": \"f10cef20-0e79-4077-9004-4e188c0fcd93\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"681\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"quay.io/k8scsi/livenessprobe:v2.2.0\\\" in 6.624568826s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-8.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:09Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:09Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-d2972.167d781d9ef54b5d\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"0394b047-94d7-4e5c-b6c7-54e1d27a0ae5\",\n                \"resourceVersion\": \"287\",\n                \"creationTimestamp\": \"2021-05-09T18:05:09Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-d2972\",\n                \"uid\": \"f10cef20-0e79-4077-9004-4e188c0fcd93\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"681\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container liveness-probe\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-8.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:09Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:09Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-d2972.167d781da7f5495e\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"0be63247-7ebd-4f52-a49e-f7cc5dd9ed10\",\n                \"resourceVersion\": \"288\",\n                \"creationTimestamp\": \"2021-05-09T18:05:09Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-d2972\",\n                \"uid\": \"f10cef20-0e79-4077-9004-4e188c0fcd93\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"681\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container liveness-probe\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-8.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:09Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:09Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-m677f.167d781836212456\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"55057d7f-fba8-4b94-abeb-7b68979532e5\",\n                \"resourceVersion\": \"148\",\n                \"creationTimestamp\": \"2021-05-09T18:04:46Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-m677f\",\n                \"uid\": \"25b57291-b1ae-4fcc-b656-e2e32cff9cf9\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"691\"\n            },\n            \"reason\": \"Scheduled\",\n            \"message\": \"Successfully assigned kube-system/ebs-csi-node-m677f to ip-172-20-61-172.ap-south-1.compute.internal\",\n            \"source\": {\n                \"component\": \"default-scheduler\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:46Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:46Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-m677f.167d7819094c8d7f\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"dd097ff0-e335-4dd3-bd18-a9b48310e095\",\n                \"resourceVersion\": \"186\",\n                \"creationTimestamp\": \"2021-05-09T18:04:49Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-m677f\",\n                \"uid\": \"25b57291-b1ae-4fcc-b656-e2e32cff9cf9\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"693\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/provider-aws/aws-ebs-csi-driver:v1.0.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-61-172.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:49Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:49Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-m677f.167d781a66cb5114\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"001fcd8f-54bc-4dd7-bc23-348593b237bf\",\n                \"resourceVersion\": \"226\",\n                \"creationTimestamp\": \"2021-05-09T18:04:55Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-m677f\",\n                \"uid\": \"25b57291-b1ae-4fcc-b656-e2e32cff9cf9\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"693\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/provider-aws/aws-ebs-csi-driver:v1.0.0\\\" in 5.863538643s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-61-172.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:55Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:55Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-m677f.167d781a7ac9e64c\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"e8a7fe96-53d2-4252-8c48-083ebaa89432\",\n                \"resourceVersion\": \"227\",\n                \"creationTimestamp\": \"2021-05-09T18:04:56Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-m677f\",\n                \"uid\": \"25b57291-b1ae-4fcc-b656-e2e32cff9cf9\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"693\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container ebs-plugin\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-61-172.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:56Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:56Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-m677f.167d781a81555a76\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"08518461-721e-4ba8-9a4b-08d2723ce44a\",\n                \"resourceVersion\": \"228\",\n                \"creationTimestamp\": \"2021-05-09T18:04:56Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-m677f\",\n                \"uid\": \"25b57291-b1ae-4fcc-b656-e2e32cff9cf9\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"693\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container ebs-plugin\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-61-172.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:56Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:56Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-m677f.167d781a817cc578\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"81ec7f30-c6bb-471f-8bd8-4390d2fc1cb2\",\n                \"resourceVersion\": \"229\",\n                \"creationTimestamp\": \"2021-05-09T18:04:56Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-m677f\",\n                \"uid\": \"25b57291-b1ae-4fcc-b656-e2e32cff9cf9\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"693\",\n                \"fieldPath\": \"spec.containers{node-driver-registrar}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.1.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-61-172.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:56Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:56Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-m677f.167d781bf09b8b1f\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"161286bb-a969-4c9b-917e-2ba47ac5fe21\",\n                \"resourceVersion\": \"267\",\n                \"creationTimestamp\": \"2021-05-09T18:05:02Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-m677f\",\n                \"uid\": \"25b57291-b1ae-4fcc-b656-e2e32cff9cf9\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"693\",\n                \"fieldPath\": \"spec.containers{node-driver-registrar}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.1.0\\\" in 6.159243039s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-61-172.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:02Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:02Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-m677f.167d781bf5f3ff1e\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"eed2c641-eb77-400c-91d2-d162609437d6\",\n                \"resourceVersion\": \"268\",\n                \"creationTimestamp\": \"2021-05-09T18:05:02Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-m677f\",\n                \"uid\": \"25b57291-b1ae-4fcc-b656-e2e32cff9cf9\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"693\",\n                \"fieldPath\": \"spec.containers{node-driver-registrar}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container node-driver-registrar\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-61-172.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:02Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:02Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-m677f.167d781bfd85849d\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"df6d342c-7613-49c3-be73-80b9f59b26c6\",\n                \"resourceVersion\": \"270\",\n                \"creationTimestamp\": \"2021-05-09T18:05:02Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-m677f\",\n                \"uid\": \"25b57291-b1ae-4fcc-b656-e2e32cff9cf9\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"693\",\n                \"fieldPath\": \"spec.containers{node-driver-registrar}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container node-driver-registrar\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-61-172.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:02Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:02Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-m677f.167d781bfdc36491\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"28cbf648-b1bd-48c7-9f2d-40a9e65e38cd\",\n                \"resourceVersion\": \"271\",\n                \"creationTimestamp\": \"2021-05-09T18:05:02Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-m677f\",\n                \"uid\": \"25b57291-b1ae-4fcc-b656-e2e32cff9cf9\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"693\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"quay.io/k8scsi/livenessprobe:v2.2.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-61-172.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:02Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:02Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-m677f.167d781d8dbf2305\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"249d4250-98da-4d18-aa28-39c7961f1a5f\",\n                \"resourceVersion\": \"283\",\n                \"creationTimestamp\": \"2021-05-09T18:05:09Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-m677f\",\n                \"uid\": \"25b57291-b1ae-4fcc-b656-e2e32cff9cf9\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"693\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"quay.io/k8scsi/livenessprobe:v2.2.0\\\" in 6.710595075s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-61-172.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:09Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:09Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-m677f.167d781d91b17ad6\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"3f7fe139-5d6a-4a61-837d-b199f8535af4\",\n                \"resourceVersion\": \"284\",\n                \"creationTimestamp\": \"2021-05-09T18:05:09Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-m677f\",\n                \"uid\": \"25b57291-b1ae-4fcc-b656-e2e32cff9cf9\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"693\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container liveness-probe\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-61-172.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:09Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:09Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-m677f.167d781d98592bb8\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"b7ed1618-3ad1-4d31-afd2-47a9410e0274\",\n                \"resourceVersion\": \"285\",\n                \"creationTimestamp\": \"2021-05-09T18:05:09Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-m677f\",\n                \"uid\": \"25b57291-b1ae-4fcc-b656-e2e32cff9cf9\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"693\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container liveness-probe\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-61-172.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:09Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:09Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-sdftg.167d781a3c737530\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"fa8e7809-2878-4dc9-a2c6-18b4802d6f66\",\n                \"resourceVersion\": \"222\",\n                \"creationTimestamp\": \"2021-05-09T18:04:55Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-sdftg\",\n                \"uid\": \"e6d41f60-7245-4752-aa6e-9edd5f497c61\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"743\"\n            },\n            \"reason\": \"Scheduled\",\n            \"message\": \"Successfully assigned kube-system/ebs-csi-node-sdftg to ip-172-20-57-119.ap-south-1.compute.internal\",\n            \"source\": {\n                \"component\": \"default-scheduler\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:55Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:55Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-sdftg.167d781b57e647fc\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"2c1b4767-cf4d-4217-a3c4-472aa69ae916\",\n                \"resourceVersion\": \"256\",\n                \"creationTimestamp\": \"2021-05-09T18:04:59Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-sdftg\",\n                \"uid\": \"e6d41f60-7245-4752-aa6e-9edd5f497c61\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"745\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/provider-aws/aws-ebs-csi-driver:v1.0.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-57-119.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:59Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:59Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-sdftg.167d781ca824fe1f\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"a25f97a8-36e3-4e79-92c6-c4e3bd7503c8\",\n                \"resourceVersion\": \"276\",\n                \"creationTimestamp\": \"2021-05-09T18:05:05Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-sdftg\",\n                \"uid\": \"e6d41f60-7245-4752-aa6e-9edd5f497c61\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"745\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/provider-aws/aws-ebs-csi-driver:v1.0.0\\\" in 5.641242546s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-57-119.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:05Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:05Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-sdftg.167d781cccc71d56\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"09a0029b-7b49-445f-9323-6779f7cfc5ec\",\n                \"resourceVersion\": \"277\",\n                \"creationTimestamp\": \"2021-05-09T18:05:06Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-sdftg\",\n                \"uid\": \"e6d41f60-7245-4752-aa6e-9edd5f497c61\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"745\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container ebs-plugin\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-57-119.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:06Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:06Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-sdftg.167d781cd2c0ed0b\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"b10bebac-0977-4e1e-bf7a-65c03c29b839\",\n                \"resourceVersion\": \"278\",\n                \"creationTimestamp\": \"2021-05-09T18:05:06Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-sdftg\",\n                \"uid\": \"e6d41f60-7245-4752-aa6e-9edd5f497c61\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"745\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container ebs-plugin\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-57-119.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:06Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:06Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-sdftg.167d781cd34a0450\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"7810991b-34d1-423a-9878-7eb337c31ae5\",\n                \"resourceVersion\": \"279\",\n                \"creationTimestamp\": \"2021-05-09T18:05:06Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-sdftg\",\n                \"uid\": \"e6d41f60-7245-4752-aa6e-9edd5f497c61\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"745\",\n                \"fieldPath\": \"spec.containers{node-driver-registrar}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.1.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-57-119.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:06Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:06Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-sdftg.167d781e0f0a955e\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"4c1a9fab-b50a-4fcb-9355-d5d1a531352d\",\n                \"resourceVersion\": \"289\",\n                \"creationTimestamp\": \"2021-05-09T18:05:11Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-sdftg\",\n                \"uid\": \"e6d41f60-7245-4752-aa6e-9edd5f497c61\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"745\",\n                \"fieldPath\": \"spec.containers{node-driver-registrar}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.1.0\\\" in 5.297431404s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-57-119.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:11Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:11Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-sdftg.167d781e1373e547\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"dd550915-36d9-47ec-bafe-b5f5f3ad14de\",\n                \"resourceVersion\": \"290\",\n                \"creationTimestamp\": \"2021-05-09T18:05:11Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-sdftg\",\n                \"uid\": \"e6d41f60-7245-4752-aa6e-9edd5f497c61\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"745\",\n                \"fieldPath\": \"spec.containers{node-driver-registrar}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container node-driver-registrar\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-57-119.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:11Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:11Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-sdftg.167d781e1a224a07\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"a8f8b705-ab87-4dec-bc17-563213b235e4\",\n                \"resourceVersion\": \"291\",\n                \"creationTimestamp\": \"2021-05-09T18:05:11Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-sdftg\",\n                \"uid\": \"e6d41f60-7245-4752-aa6e-9edd5f497c61\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"745\",\n                \"fieldPath\": \"spec.containers{node-driver-registrar}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container node-driver-registrar\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-57-119.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:11Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:11Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-sdftg.167d781e1a5d54e8\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"590abc9d-5370-4c11-be48-38043b40a303\",\n                \"resourceVersion\": \"292\",\n                \"creationTimestamp\": \"2021-05-09T18:05:11Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-sdftg\",\n                \"uid\": \"e6d41f60-7245-4752-aa6e-9edd5f497c61\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"745\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"quay.io/k8scsi/livenessprobe:v2.2.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-57-119.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:11Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:11Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-sdftg.167d781fa6e3ca42\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"c00409ce-6484-4939-bede-fe8668269e5b\",\n                \"resourceVersion\": \"293\",\n                \"creationTimestamp\": \"2021-05-09T18:05:18Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-sdftg\",\n                \"uid\": \"e6d41f60-7245-4752-aa6e-9edd5f497c61\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"745\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"quay.io/k8scsi/livenessprobe:v2.2.0\\\" in 6.65256856s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-57-119.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:18Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:18Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-sdftg.167d781faad4765f\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"2a8254e8-4c1b-41ff-8fdd-26c706ba1c78\",\n                \"resourceVersion\": \"294\",\n                \"creationTimestamp\": \"2021-05-09T18:05:18Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-sdftg\",\n                \"uid\": \"e6d41f60-7245-4752-aa6e-9edd5f497c61\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"745\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container liveness-probe\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-57-119.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:18Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:18Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-sdftg.167d781fb11f6f0d\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"e183e20a-3f46-4cf3-8b76-08c76b4450fc\",\n                \"resourceVersion\": \"295\",\n                \"creationTimestamp\": \"2021-05-09T18:05:18Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-sdftg\",\n                \"uid\": \"e6d41f60-7245-4752-aa6e-9edd5f497c61\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"745\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container liveness-probe\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-57-119.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:18Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:18Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-xrzrd.167d78173138b1de\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"0356cce0-8cbe-4641-8540-05f37853ac4e\",\n                \"resourceVersion\": \"143\",\n                \"creationTimestamp\": \"2021-05-09T18:04:41Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-xrzrd\",\n                \"uid\": \"1b4bd541-3937-4ea8-8a2a-cb5c20d5f13b\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"653\"\n            },\n            \"reason\": \"Scheduled\",\n            \"message\": \"Successfully assigned kube-system/ebs-csi-node-xrzrd to ip-172-20-33-176.ap-south-1.compute.internal\",\n            \"source\": {\n                \"component\": \"default-scheduler\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:41Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:41Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-xrzrd.167d7817eb72bb40\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"f347bffb-186a-4488-8daf-a2660a05fc85\",\n                \"resourceVersion\": \"183\",\n                \"creationTimestamp\": \"2021-05-09T18:04:48Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-xrzrd\",\n                \"uid\": \"1b4bd541-3937-4ea8-8a2a-cb5c20d5f13b\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"655\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/provider-aws/aws-ebs-csi-driver:v1.0.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-176.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:45Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:45Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-xrzrd.167d781943769c94\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"9f19e9bc-fefb-4218-87ae-bcc67745e698\",\n                \"resourceVersion\": \"192\",\n                \"creationTimestamp\": \"2021-05-09T18:04:50Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-xrzrd\",\n                \"uid\": \"1b4bd541-3937-4ea8-8a2a-cb5c20d5f13b\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"655\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/provider-aws/aws-ebs-csi-driver:v1.0.0\\\" in 5.771604982s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-176.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:50Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:50Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-xrzrd.167d7819680b19df\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"0a75aafe-df88-4145-b21f-cae8ccb4204e\",\n                \"resourceVersion\": \"193\",\n                \"creationTimestamp\": \"2021-05-09T18:04:51Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-xrzrd\",\n                \"uid\": \"1b4bd541-3937-4ea8-8a2a-cb5c20d5f13b\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"655\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container ebs-plugin\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-176.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:51Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:51Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-xrzrd.167d78196fecb3df\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"d60918f6-0085-4fdb-8d5b-67eb1e0c862b\",\n                \"resourceVersion\": \"194\",\n                \"creationTimestamp\": \"2021-05-09T18:04:51Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-xrzrd\",\n                \"uid\": \"1b4bd541-3937-4ea8-8a2a-cb5c20d5f13b\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"655\",\n                \"fieldPath\": \"spec.containers{ebs-plugin}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container ebs-plugin\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-176.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:51Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:51Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-xrzrd.167d78197037c12a\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"b6f75402-9c0b-4c69-a366-b77d4a330507\",\n                \"resourceVersion\": \"195\",\n                \"creationTimestamp\": \"2021-05-09T18:04:51Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-xrzrd\",\n                \"uid\": \"1b4bd541-3937-4ea8-8a2a-cb5c20d5f13b\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"655\",\n                \"fieldPath\": \"spec.containers{node-driver-registrar}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.1.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-176.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:51Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:51Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-xrzrd.167d781a341f87a2\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"979dd571-9c9e-47c6-a958-6376921e4b65\",\n                \"resourceVersion\": \"219\",\n                \"creationTimestamp\": \"2021-05-09T18:04:54Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-xrzrd\",\n                \"uid\": \"1b4bd541-3937-4ea8-8a2a-cb5c20d5f13b\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"655\",\n                \"fieldPath\": \"spec.containers{node-driver-registrar}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.1.0\\\" in 3.286735636s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-176.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:54Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:54Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-xrzrd.167d781a3ada4718\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"5899fa5c-716e-44b7-9d92-ef7997530666\",\n                \"resourceVersion\": \"220\",\n                \"creationTimestamp\": \"2021-05-09T18:04:54Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-xrzrd\",\n                \"uid\": \"1b4bd541-3937-4ea8-8a2a-cb5c20d5f13b\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"655\",\n                \"fieldPath\": \"spec.containers{node-driver-registrar}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container node-driver-registrar\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-176.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:54Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:54Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-xrzrd.167d781a42c6d258\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"0d629fc5-53cd-4fcd-84e1-0bf884ca522f\",\n                \"resourceVersion\": \"223\",\n                \"creationTimestamp\": \"2021-05-09T18:04:55Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-xrzrd\",\n                \"uid\": \"1b4bd541-3937-4ea8-8a2a-cb5c20d5f13b\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"655\",\n                \"fieldPath\": \"spec.containers{node-driver-registrar}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container node-driver-registrar\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-176.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:55Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:55Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-xrzrd.167d781a42f986dc\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"26d5d013-7a94-4d70-8b9c-20dbc300b23c\",\n                \"resourceVersion\": \"224\",\n                \"creationTimestamp\": \"2021-05-09T18:04:55Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-xrzrd\",\n                \"uid\": \"1b4bd541-3937-4ea8-8a2a-cb5c20d5f13b\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"655\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"quay.io/k8scsi/livenessprobe:v2.2.0\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-176.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:55Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:55Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-xrzrd.167d781beb664688\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"e5e935d0-1891-47d7-81f9-e1ba17bd0e13\",\n                \"resourceVersion\": \"265\",\n                \"creationTimestamp\": \"2021-05-09T18:05:02Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-xrzrd\",\n                \"uid\": \"1b4bd541-3937-4ea8-8a2a-cb5c20d5f13b\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"655\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"quay.io/k8scsi/livenessprobe:v2.2.0\\\" in 7.12065726s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-176.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:02Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:02Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-xrzrd.167d781befb8fd21\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"0c4b2d4a-aa4b-404a-b8b2-5243df6c3c92\",\n                \"resourceVersion\": \"266\",\n                \"creationTimestamp\": \"2021-05-09T18:05:02Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-xrzrd\",\n                \"uid\": \"1b4bd541-3937-4ea8-8a2a-cb5c20d5f13b\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"655\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container liveness-probe\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-176.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:02Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:02Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node-xrzrd.167d781bf776b705\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"c32a67e9-b5c1-4a6f-98ea-d456982630f1\",\n                \"resourceVersion\": \"269\",\n                \"creationTimestamp\": \"2021-05-09T18:05:02Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node-xrzrd\",\n                \"uid\": \"1b4bd541-3937-4ea8-8a2a-cb5c20d5f13b\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"655\",\n                \"fieldPath\": \"spec.containers{liveness-probe}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container liveness-probe\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-176.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:05:02Z\",\n            \"lastTimestamp\": \"2021-05-09T18:05:02Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node.167d7804963bc551\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"c545ecbc-c570-4591-beae-98af2b2eaae9\",\n                \"resourceVersion\": \"47\",\n                \"creationTimestamp\": \"2021-05-09T18:03:22Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"DaemonSet\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node\",\n                \"uid\": \"1f232e7d-aab5-44d1-81f7-51c2bfe90426\",\n                \"apiVersion\": \"apps/v1\",\n                \"resourceVersion\": \"284\"\n            },\n            \"reason\": \"SuccessfulCreate\",\n            \"message\": \"Created pod: ebs-csi-node-bjxbk\",\n            \"source\": {\n                \"component\": \"daemonset-controller\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:22Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:22Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node.167d78173069e40e\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"ba6bbb95-6588-40fe-8642-9310dfbde91d\",\n                \"resourceVersion\": \"142\",\n                \"creationTimestamp\": \"2021-05-09T18:04:41Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"DaemonSet\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node\",\n                \"uid\": \"1f232e7d-aab5-44d1-81f7-51c2bfe90426\",\n                \"apiVersion\": \"apps/v1\",\n                \"resourceVersion\": \"572\"\n            },\n            \"reason\": \"SuccessfulCreate\",\n            \"message\": \"Created pod: ebs-csi-node-xrzrd\",\n            \"source\": {\n                \"component\": \"daemonset-controller\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:41Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:41Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node.167d78181b2ccc52\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"bcec9b9d-862e-4497-8ea9-eea23b735139\",\n                \"resourceVersion\": \"145\",\n                \"creationTimestamp\": \"2021-05-09T18:04:45Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"DaemonSet\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node\",\n                \"uid\": \"1f232e7d-aab5-44d1-81f7-51c2bfe90426\",\n                \"apiVersion\": \"apps/v1\",\n                \"resourceVersion\": \"654\"\n            },\n            \"reason\": \"SuccessfulCreate\",\n            \"message\": \"Created pod: ebs-csi-node-d2972\",\n            \"source\": {\n                \"component\": \"daemonset-controller\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:45Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:45Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node.167d7818351934eb\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"1c615c23-0933-4d8e-8421-0ce108c040ce\",\n                \"resourceVersion\": \"147\",\n                \"creationTimestamp\": \"2021-05-09T18:04:46Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"DaemonSet\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node\",\n                \"uid\": \"1f232e7d-aab5-44d1-81f7-51c2bfe90426\",\n                \"apiVersion\": \"apps/v1\",\n                \"resourceVersion\": \"680\"\n            },\n            \"reason\": \"SuccessfulCreate\",\n            \"message\": \"Created pod: ebs-csi-node-m677f\",\n            \"source\": {\n                \"component\": \"daemonset-controller\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:46Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:46Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node.167d781a3c0db391\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"d0b9f171-7956-4fe3-a5db-8705e4422172\",\n                \"resourceVersion\": \"221\",\n                \"creationTimestamp\": \"2021-05-09T18:04:54Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"DaemonSet\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"ebs-csi-node\",\n                \"uid\": \"1f232e7d-aab5-44d1-81f7-51c2bfe90426\",\n                \"apiVersion\": \"apps/v1\",\n                \"resourceVersion\": \"694\"\n            },\n            \"reason\": \"SuccessfulCreate\",\n            \"message\": \"Created pod: ebs-csi-node-sdftg\",\n            \"source\": {\n                \"component\": \"daemonset-controller\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:54Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:54Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"etcd-manager-events-ip-172-20-45-192.ap-south-1.compute.internal.167d77f767912673\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"b261d85a-4e47-4cbc-aa10-bfb1b56abbfa\",\n                \"resourceVersion\": \"27\",\n                \"creationTimestamp\": \"2021-05-09T18:03:10Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"etcd-manager-events-ip-172-20-45-192.ap-south-1.compute.internal\",\n                \"uid\": \"a91701515f0718e7ef1b5a6e4a78818f\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{etcd-manager}\"\n            },\n            \"reason\": \"Pulling\",\n            \"message\": \"Pulling image \\\"k8s.gcr.io/etcdadm/etcd-manager:3.0.20210430\\\"\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:02:25Z\",\n            \"lastTimestamp\": \"2021-05-09T18:02:25Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"etcd-manager-events-ip-172-20-45-192.ap-south-1.compute.internal.167d77f97c1faaf0\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"8fa7bf84-337c-4101-b787-76ea7488c064\",\n                \"resourceVersion\": \"28\",\n                \"creationTimestamp\": \"2021-05-09T18:03:10Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"etcd-manager-events-ip-172-20-45-192.ap-south-1.compute.internal\",\n                \"uid\": \"a91701515f0718e7ef1b5a6e4a78818f\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{etcd-manager}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Successfully pulled image \\\"k8s.gcr.io/etcdadm/etcd-manager:3.0.20210430\\\" in 8.934808691s\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:02:34Z\",\n            \"lastTimestamp\": \"2021-05-09T18:02:34Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"etcd-manager-events-ip-172-20-45-192.ap-south-1.compute.internal.167d77f9d3cf0d0c\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"a7fd66f8-e178-448e-98b6-8ea9b3b1cf7b\",\n                \"resourceVersion\": \"29\",\n                \"creationTimestamp\": \"2021-05-09T18:03:11Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"etcd-manager-events-ip-172-20-45-192.ap-south-1.compute.internal\",\n                \"uid\": \"a91701515f0718e7ef1b5a6e4a78818f\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{etcd-manager}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container etcd-manager\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:02:35Z\",\n            \"lastTimestamp\": \"2021-05-09T18:02:35Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"etcd-manager-events-ip-172-20-45-192.ap-south-1.compute.internal.167d77f9ddeb3ccf\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"0839fed7-1ebf-4232-bdf5-0818b030c8f4\",\n                \"resourceVersion\": \"30\",\n                \"creationTimestamp\": \"2021-05-09T18:03:11Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"etcd-manager-events-ip-172-20-45-192.ap-south-1.compute.internal\",\n                \"uid\": \"a91701515f0718e7ef1b5a6e4a78818f\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{etcd-manager}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container etcd-manager\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:02:35Z\",\n            \"lastTimestamp\": \"2021-05-09T18:02:35Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"etcd-manager-main-ip-172-20-45-192.ap-south-1.compute.internal.167d77f9de23068c\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"7de98500-573b-41c1-85ad-6428f199e909\",\n                \"resourceVersion\": \"31\",\n                \"creationTimestamp\": \"2021-05-09T18:03:11Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"etcd-manager-main-ip-172-20-45-192.ap-south-1.compute.internal\",\n                \"uid\": \"ba7298e4c9cd77762a049a9c08b1a104\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{etcd-manager}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Container image \\\"k8s.gcr.io/etcdadm/etcd-manager:3.0.20210430\\\" already present on machine\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:02:35Z\",\n            \"lastTimestamp\": \"2021-05-09T18:02:35Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"etcd-manager-main-ip-172-20-45-192.ap-south-1.compute.internal.167d77f9e2081bba\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"3427a93a-063c-477d-bb5e-43a70ae770c1\",\n                \"resourceVersion\": \"32\",\n                \"creationTimestamp\": \"2021-05-09T18:03:11Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"etcd-manager-main-ip-172-20-45-192.ap-south-1.compute.internal\",\n                \"uid\": \"ba7298e4c9cd77762a049a9c08b1a104\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{etcd-manager}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container etcd-manager\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:02:36Z\",\n            \"lastTimestamp\": \"2021-05-09T18:02:36Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"etcd-manager-main-ip-172-20-45-192.ap-south-1.compute.internal.167d77f9e7b09881\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"7323fcdc-6bc7-4447-add6-2dd01092d3b1\",\n                \"resourceVersion\": \"33\",\n                \"creationTimestamp\": \"2021-05-09T18:03:11Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"etcd-manager-main-ip-172-20-45-192.ap-south-1.compute.internal\",\n                \"uid\": \"ba7298e4c9cd77762a049a9c08b1a104\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{etcd-manager}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container etcd-manager\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:02:36Z\",\n            \"lastTimestamp\": \"2021-05-09T18:02:36Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"external-attacher-leader-ebs-csi-aws-com.167d78104d574ef3\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"8b1be046-93ac-4b2f-adcd-178d1f2ce5a0\",\n                \"resourceVersion\": \"107\",\n                \"creationTimestamp\": \"2021-05-09T18:04:12Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Lease\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"external-attacher-leader-ebs-csi-aws-com\",\n                \"uid\": \"b1099d78-e983-4a0f-bc26-a8510cc58946\",\n                \"apiVersion\": \"coordination.k8s.io/v1\",\n                \"resourceVersion\": \"544\"\n            },\n            \"reason\": \"LeaderElection\",\n            \"message\": \"ebs-csi-controller-79fb985c8d-b6bjr became leader\",\n            \"source\": {\n                \"component\": \"external-attacher-leader-ebs.csi.aws.com/ebs-csi-controller-79fb985c8d-b6bjr\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:12Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:12Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"external-snapshotter-leader-ebs-csi-aws-com.167d781303e14683\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"f2a83847-db56-48a5-86b4-5db02083e083\",\n                \"resourceVersion\": \"121\",\n                \"creationTimestamp\": \"2021-05-09T18:04:23Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Lease\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"external-snapshotter-leader-ebs-csi-aws-com\",\n                \"uid\": \"1f234145-8de4-432e-9b99-2be87ded87c6\",\n                \"apiVersion\": \"coordination.k8s.io/v1\",\n                \"resourceVersion\": \"588\"\n            },\n            \"reason\": \"LeaderElection\",\n            \"message\": \"ebs-csi-controller-79fb985c8d-b6bjr became leader\",\n            \"source\": {\n                \"component\": \"external-snapshotter-leader-ebs.csi.aws.com/ebs-csi-controller-79fb985c8d-b6bjr\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:23Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:23Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kops-controller-leader.167d780bc996f1c8\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"284d26ba-64b0-4858-a0cb-72bc01b0f19a\",\n                \"resourceVersion\": \"73\",\n                \"creationTimestamp\": \"2021-05-09T18:03:52Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"ConfigMap\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kops-controller-leader\",\n                \"uid\": \"89fe91d3-35e9-4cee-8a59-77f5a09ebdcd\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"491\"\n            },\n            \"reason\": \"LeaderElection\",\n            \"message\": \"ip-172-20-45-192_c2986315-5a80-4938-bb24-9bc3121c0abc became leader\",\n            \"source\": {\n                \"component\": \"ip-172-20-45-192_c2986315-5a80-4938-bb24-9bc3121c0abc\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:52Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:52Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kops-controller-tvrgx.167d780ab95bc7f5\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"0f2a68b7-a875-4b9a-971a-95fc07ee669e\",\n                \"resourceVersion\": \"58\",\n                \"creationTimestamp\": \"2021-05-09T18:03:48Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kops-controller-tvrgx\",\n                \"uid\": \"78163d1e-a96a-41f2-808d-72045f220491\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"429\"\n            },\n            \"reason\": \"Scheduled\",\n            \"message\": \"Successfully assigned kube-system/kops-controller-tvrgx to ip-172-20-45-192.ap-south-1.compute.internal\",\n            \"source\": {\n                \"component\": \"default-scheduler\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:48Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:48Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kops-controller-tvrgx.167d780b6c6deeb7\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"fd5935ee-adde-4f17-8301-c8247ea08b43\",\n                \"resourceVersion\": \"64\",\n                \"creationTimestamp\": \"2021-05-09T18:03:51Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kops-controller-tvrgx\",\n                \"uid\": \"78163d1e-a96a-41f2-808d-72045f220491\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"474\",\n                \"fieldPath\": \"spec.containers{kops-controller}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Container image \\\"k8s.gcr.io/kops/kops-controller:1.22.0-alpha.1\\\" already present on machine\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:51Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:51Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kops-controller-tvrgx.167d780b6f51940f\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"93748138-c6ba-41b0-bce2-abba7783d6bb\",\n                \"resourceVersion\": \"65\",\n                \"creationTimestamp\": \"2021-05-09T18:03:51Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kops-controller-tvrgx\",\n                \"uid\": \"78163d1e-a96a-41f2-808d-72045f220491\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"474\",\n                \"fieldPath\": \"spec.containers{kops-controller}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container kops-controller\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:51Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:51Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kops-controller-tvrgx.167d780b774bfe1c\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"9e239b9e-e4e5-4e21-bd20-43b682f30218\",\n                \"resourceVersion\": \"66\",\n                \"creationTimestamp\": \"2021-05-09T18:03:51Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kops-controller-tvrgx\",\n                \"uid\": \"78163d1e-a96a-41f2-808d-72045f220491\",\n                \"apiVersion\": \"v1\",\n                \"resourceVersion\": \"474\",\n                \"fieldPath\": \"spec.containers{kops-controller}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container kops-controller\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:51Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:51Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kops-controller.167d780496f10cc5\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"049df222-cd04-4ef0-8039-7d6e73333de9\",\n                \"resourceVersion\": \"48\",\n                \"creationTimestamp\": \"2021-05-09T18:03:22Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"DaemonSet\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kops-controller\",\n                \"uid\": \"cf976bbc-518c-43a6-87e5-06033c99244c\",\n                \"apiVersion\": \"apps/v1\",\n                \"resourceVersion\": \"427\"\n            },\n            \"reason\": \"SuccessfulCreate\",\n            \"message\": \"Created pod: kops-controller-tvrgx\",\n            \"source\": {\n                \"component\": \"daemonset-controller\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:22Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:22Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-apiserver-ip-172-20-45-192.ap-south-1.compute.internal.167d77fc150a90e8\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"2d4e56ba-e8bc-443e-9d8a-1ef30b76c0de\",\n                \"resourceVersion\": \"34\",\n                \"creationTimestamp\": \"2021-05-09T18:03:12Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-apiserver-ip-172-20-45-192.ap-south-1.compute.internal\",\n                \"uid\": \"333bddc2a854222bb7140408ef9f7ebe\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{kube-apiserver}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Container image \\\"k8s.gcr.io/kube-apiserver-amd64:v1.21.0\\\" already present on machine\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:02:45Z\",\n            \"lastTimestamp\": \"2021-05-09T18:02:45Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-apiserver-ip-172-20-45-192.ap-south-1.compute.internal.167d77fc16e4b150\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"d7f156fb-a0b2-4333-9c63-d590b48a1abb\",\n                \"resourceVersion\": \"35\",\n                \"creationTimestamp\": \"2021-05-09T18:03:12Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-apiserver-ip-172-20-45-192.ap-south-1.compute.internal\",\n                \"uid\": \"333bddc2a854222bb7140408ef9f7ebe\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{kube-apiserver}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container kube-apiserver\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:02:45Z\",\n            \"lastTimestamp\": \"2021-05-09T18:02:45Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-apiserver-ip-172-20-45-192.ap-south-1.compute.internal.167d77fc1d2932f4\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"909aa3df-462b-4bdc-8e07-307b1d7dc30d\",\n                \"resourceVersion\": \"36\",\n                \"creationTimestamp\": \"2021-05-09T18:03:12Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-apiserver-ip-172-20-45-192.ap-south-1.compute.internal\",\n                \"uid\": \"333bddc2a854222bb7140408ef9f7ebe\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{kube-apiserver}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container kube-apiserver\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:02:45Z\",\n            \"lastTimestamp\": \"2021-05-09T18:02:45Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-apiserver-ip-172-20-45-192.ap-south-1.compute.internal.167d77fc1d4b8d07\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"521b5e0c-7e06-41ef-8feb-7fe9c44fcca3\",\n                \"resourceVersion\": \"37\",\n                \"creationTimestamp\": \"2021-05-09T18:03:12Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-apiserver-ip-172-20-45-192.ap-south-1.compute.internal\",\n                \"uid\": \"333bddc2a854222bb7140408ef9f7ebe\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{healthcheck}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Container image \\\"k8s.gcr.io/kops/kube-apiserver-healthcheck:1.22.0-alpha.1\\\" already present on machine\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:02:45Z\",\n            \"lastTimestamp\": \"2021-05-09T18:02:45Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-apiserver-ip-172-20-45-192.ap-south-1.compute.internal.167d77fc218d5bd1\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"843700c2-68f2-4d16-85d7-2ab75af25dd8\",\n                \"resourceVersion\": \"38\",\n                \"creationTimestamp\": \"2021-05-09T18:03:12Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-apiserver-ip-172-20-45-192.ap-south-1.compute.internal\",\n                \"uid\": \"333bddc2a854222bb7140408ef9f7ebe\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{healthcheck}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container healthcheck\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:02:45Z\",\n            \"lastTimestamp\": \"2021-05-09T18:02:45Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-apiserver-ip-172-20-45-192.ap-south-1.compute.internal.167d77fc29ac445a\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"7f6bc5b1-928e-4ff0-b1f3-871016ad84ca\",\n                \"resourceVersion\": \"39\",\n                \"creationTimestamp\": \"2021-05-09T18:03:13Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-apiserver-ip-172-20-45-192.ap-south-1.compute.internal\",\n                \"uid\": \"333bddc2a854222bb7140408ef9f7ebe\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{healthcheck}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container healthcheck\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:02:45Z\",\n            \"lastTimestamp\": \"2021-05-09T18:02:45Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-controller-manager-ip-172-20-45-192.ap-south-1.compute.internal.167d77f108a0715e\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"94c3d8b8-da9a-4df6-aae4-4a1703cd9ae7\",\n                \"resourceVersion\": \"18\",\n                \"creationTimestamp\": \"2021-05-09T18:03:08Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-controller-manager-ip-172-20-45-192.ap-south-1.compute.internal\",\n                \"uid\": \"b8d5bbf55fefdc7166d502554436ae69\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{kube-controller-manager}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Container image \\\"k8s.gcr.io/kube-controller-manager-amd64:v1.21.0\\\" already present on machine\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:01:58Z\",\n            \"lastTimestamp\": \"2021-05-09T18:01:58Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-controller-manager-ip-172-20-45-192.ap-south-1.compute.internal.167d77f10b79b618\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"6d43a451-d178-4257-9756-db8d4498ab09\",\n                \"resourceVersion\": \"19\",\n                \"creationTimestamp\": \"2021-05-09T18:03:09Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-controller-manager-ip-172-20-45-192.ap-south-1.compute.internal\",\n                \"uid\": \"b8d5bbf55fefdc7166d502554436ae69\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{kube-controller-manager}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container kube-controller-manager\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:01:58Z\",\n            \"lastTimestamp\": \"2021-05-09T18:01:58Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-controller-manager-ip-172-20-45-192.ap-south-1.compute.internal.167d77f111d6f414\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"11f05e3e-d12d-494d-bf47-c21d10537f51\",\n                \"resourceVersion\": \"20\",\n                \"creationTimestamp\": \"2021-05-09T18:03:09Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-controller-manager-ip-172-20-45-192.ap-south-1.compute.internal\",\n                \"uid\": \"b8d5bbf55fefdc7166d502554436ae69\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{kube-controller-manager}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container kube-controller-manager\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:01:58Z\",\n            \"lastTimestamp\": \"2021-05-09T18:01:58Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-controller-manager.167d7801189b45a3\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"b969dd2a-df90-4d84-afaf-7b6ad0d1467d\",\n                \"resourceVersion\": \"8\",\n                \"creationTimestamp\": \"2021-05-09T18:03:07Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Lease\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-controller-manager\",\n                \"uid\": \"f3c34f80-cc61-401b-bef5-cdf90db461b4\",\n                \"apiVersion\": \"coordination.k8s.io/v1\",\n                \"resourceVersion\": \"199\"\n            },\n            \"reason\": \"LeaderElection\",\n            \"message\": \"ip-172-20-45-192_c71709ac-3113-40ae-ba1d-ce081f77d7a0 became leader\",\n            \"source\": {\n                \"component\": \"kube-controller-manager\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:07Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:07Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-dns.167d780468a29feb\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"4acef3db-7e23-442e-b465-2d9fbe566b7f\",\n                \"resourceVersion\": \"42\",\n                \"creationTimestamp\": \"2021-05-09T18:03:21Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"PodDisruptionBudget\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-dns\",\n                \"uid\": \"3c8e6492-cb72-4ed1-b2a9-068acbe9985b\",\n                \"apiVersion\": \"policy/v1\",\n                \"resourceVersion\": \"248\"\n            },\n            \"reason\": \"NoPods\",\n            \"message\": \"No matching pods found\",\n            \"source\": {\n                \"component\": \"controllermanager\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:21Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:21Z\",\n            \"count\": 2,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-proxy-ip-172-20-33-176.ap-south-1.compute.internal.167d7817df996e48\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"6eefdc49-258a-49fb-8f5b-b354380c6b2e\",\n                \"resourceVersion\": \"179\",\n                \"creationTimestamp\": \"2021-05-09T18:04:48Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-proxy-ip-172-20-33-176.ap-south-1.compute.internal\",\n                \"uid\": \"af69d9f2546ebb187fb45228cbf65c3b\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{kube-proxy}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Container image \\\"k8s.gcr.io/kube-proxy-amd64:v1.21.0\\\" already present on machine\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-176.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:44Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:44Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-proxy-ip-172-20-33-176.ap-south-1.compute.internal.167d7817e2bba1a3\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"7a236e0b-d1c9-4eba-8b4b-f1771695d6ad\",\n                \"resourceVersion\": \"181\",\n                \"creationTimestamp\": \"2021-05-09T18:04:48Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-proxy-ip-172-20-33-176.ap-south-1.compute.internal\",\n                \"uid\": \"af69d9f2546ebb187fb45228cbf65c3b\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{kube-proxy}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container kube-proxy\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-176.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:44Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:44Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-proxy-ip-172-20-33-176.ap-south-1.compute.internal.167d7817f030c5f9\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"58735191-2ae3-4839-a0e1-f662e4851d6e\",\n                \"resourceVersion\": \"185\",\n                \"creationTimestamp\": \"2021-05-09T18:04:48Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-proxy-ip-172-20-33-176.ap-south-1.compute.internal\",\n                \"uid\": \"af69d9f2546ebb187fb45228cbf65c3b\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{kube-proxy}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container kube-proxy\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-176.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:45Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:45Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-proxy-ip-172-20-33-8.ap-south-1.compute.internal.167d78190a14e54b\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"1f5a9533-f910-4405-8f86-320c0a3042b1\",\n                \"resourceVersion\": \"215\",\n                \"creationTimestamp\": \"2021-05-09T18:04:54Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-proxy-ip-172-20-33-8.ap-south-1.compute.internal\",\n                \"uid\": \"03142d1c763ec5c8d3881acdd5b9949c\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{kube-proxy}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Container image \\\"k8s.gcr.io/kube-proxy-amd64:v1.21.0\\\" already present on machine\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-8.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:49Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:49Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-proxy-ip-172-20-33-8.ap-south-1.compute.internal.167d78190c78596c\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"1344ee67-ed36-4a90-8f0a-b3cad0af79d0\",\n                \"resourceVersion\": \"216\",\n                \"creationTimestamp\": \"2021-05-09T18:04:54Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-proxy-ip-172-20-33-8.ap-south-1.compute.internal\",\n                \"uid\": \"03142d1c763ec5c8d3881acdd5b9949c\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{kube-proxy}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container kube-proxy\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-8.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:49Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:49Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-proxy-ip-172-20-33-8.ap-south-1.compute.internal.167d78191449f2c2\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"bc1dc24a-de36-4d0d-9549-2f6007e00073\",\n                \"resourceVersion\": \"217\",\n                \"creationTimestamp\": \"2021-05-09T18:04:54Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-proxy-ip-172-20-33-8.ap-south-1.compute.internal\",\n                \"uid\": \"03142d1c763ec5c8d3881acdd5b9949c\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{kube-proxy}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container kube-proxy\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-33-8.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:50Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:50Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-proxy-ip-172-20-45-192.ap-south-1.compute.internal.167d77f2bc74cbe0\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"c081cad4-439f-4f9b-a781-421a05b1bf44\",\n                \"resourceVersion\": \"21\",\n                \"creationTimestamp\": \"2021-05-09T18:03:09Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-proxy-ip-172-20-45-192.ap-south-1.compute.internal\",\n                \"uid\": \"9b5b40d983620519095b77a4124baa41\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{kube-proxy}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Container image \\\"k8s.gcr.io/kube-proxy-amd64:v1.21.0\\\" already present on machine\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:02:05Z\",\n            \"lastTimestamp\": \"2021-05-09T18:02:05Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-proxy-ip-172-20-45-192.ap-south-1.compute.internal.167d77f2bee30829\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"f40880c1-f352-4b5b-abfe-672ada01c66f\",\n                \"resourceVersion\": \"22\",\n                \"creationTimestamp\": \"2021-05-09T18:03:09Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-proxy-ip-172-20-45-192.ap-south-1.compute.internal\",\n                \"uid\": \"9b5b40d983620519095b77a4124baa41\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{kube-proxy}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container kube-proxy\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:02:05Z\",\n            \"lastTimestamp\": \"2021-05-09T18:02:05Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-proxy-ip-172-20-45-192.ap-south-1.compute.internal.167d77f2c5698c4c\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"558a09a5-e950-4a43-9971-d6624a31ea4d\",\n                \"resourceVersion\": \"23\",\n                \"creationTimestamp\": \"2021-05-09T18:03:09Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-proxy-ip-172-20-45-192.ap-south-1.compute.internal\",\n                \"uid\": \"9b5b40d983620519095b77a4124baa41\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{kube-proxy}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container kube-proxy\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:02:05Z\",\n            \"lastTimestamp\": \"2021-05-09T18:02:05Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-proxy-ip-172-20-57-119.ap-south-1.compute.internal.167d781b546c5990\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"f48fc957-9a6f-4f9e-99f5-90041f1ec9aa\",\n                \"resourceVersion\": \"255\",\n                \"creationTimestamp\": \"2021-05-09T18:04:59Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-proxy-ip-172-20-57-119.ap-south-1.compute.internal\",\n                \"uid\": \"8d2c391e923019e878e9debe040426bf\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{kube-proxy}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Container image \\\"k8s.gcr.io/kube-proxy-amd64:v1.21.0\\\" already present on machine\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-57-119.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:59Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:59Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-proxy-ip-172-20-57-119.ap-south-1.compute.internal.167d781b58e79be2\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"35698530-4422-4a7e-bf75-2dd10c048ff6\",\n                \"resourceVersion\": \"260\",\n                \"creationTimestamp\": \"2021-05-09T18:04:59Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-proxy-ip-172-20-57-119.ap-south-1.compute.internal\",\n                \"uid\": \"8d2c391e923019e878e9debe040426bf\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{kube-proxy}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container kube-proxy\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-57-119.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:59Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:59Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-proxy-ip-172-20-57-119.ap-south-1.compute.internal.167d781b6020f9fb\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"e7aa150f-63dc-4816-9fd5-d90d1807de08\",\n                \"resourceVersion\": \"262\",\n                \"creationTimestamp\": \"2021-05-09T18:05:00Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-proxy-ip-172-20-57-119.ap-south-1.compute.internal\",\n                \"uid\": \"8d2c391e923019e878e9debe040426bf\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{kube-proxy}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container kube-proxy\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-57-119.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:59Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:59Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-proxy-ip-172-20-61-172.ap-south-1.compute.internal.167d781909cd4773\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"cf5e4763-55fd-46d3-8395-113a75393950\",\n                \"resourceVersion\": \"187\",\n                \"creationTimestamp\": \"2021-05-09T18:04:49Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-proxy-ip-172-20-61-172.ap-south-1.compute.internal\",\n                \"uid\": \"ae54c5942fc6ccfbd20fc2b27b176d0f\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{kube-proxy}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Container image \\\"k8s.gcr.io/kube-proxy-amd64:v1.21.0\\\" already present on machine\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-61-172.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:49Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:49Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-proxy-ip-172-20-61-172.ap-south-1.compute.internal.167d78190d14ca0e\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"50746489-f82a-4a62-83ea-6bca11fd101d\",\n                \"resourceVersion\": \"188\",\n                \"creationTimestamp\": \"2021-05-09T18:04:49Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-proxy-ip-172-20-61-172.ap-south-1.compute.internal\",\n                \"uid\": \"ae54c5942fc6ccfbd20fc2b27b176d0f\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{kube-proxy}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container kube-proxy\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-61-172.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:49Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:49Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-proxy-ip-172-20-61-172.ap-south-1.compute.internal.167d7819148bdf9a\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"6b057fe8-1339-4789-b3f1-95fda4bf5c26\",\n                \"resourceVersion\": \"189\",\n                \"creationTimestamp\": \"2021-05-09T18:04:50Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-proxy-ip-172-20-61-172.ap-south-1.compute.internal\",\n                \"uid\": \"ae54c5942fc6ccfbd20fc2b27b176d0f\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{kube-proxy}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container kube-proxy\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-61-172.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:04:50Z\",\n            \"lastTimestamp\": \"2021-05-09T18:04:50Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-scheduler-ip-172-20-45-192.ap-south-1.compute.internal.167d77f511f8bb2d\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"001fba91-9ab5-4884-8dc7-c1ddc94f3bca\",\n                \"resourceVersion\": \"24\",\n                \"creationTimestamp\": \"2021-05-09T18:03:10Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-scheduler-ip-172-20-45-192.ap-south-1.compute.internal\",\n                \"uid\": \"10e19e2de3725ec42af16ae0dffcdc02\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{kube-scheduler}\"\n            },\n            \"reason\": \"Pulled\",\n            \"message\": \"Container image \\\"k8s.gcr.io/kube-scheduler-amd64:v1.21.0\\\" already present on machine\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:02:15Z\",\n            \"lastTimestamp\": \"2021-05-09T18:02:15Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-scheduler-ip-172-20-45-192.ap-south-1.compute.internal.167d77f51489e2ef\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"bed92a0c-2a25-4a57-bd7b-9cea1c3217b8\",\n                \"resourceVersion\": \"25\",\n                \"creationTimestamp\": \"2021-05-09T18:03:10Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-scheduler-ip-172-20-45-192.ap-south-1.compute.internal\",\n                \"uid\": \"10e19e2de3725ec42af16ae0dffcdc02\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{kube-scheduler}\"\n            },\n            \"reason\": \"Created\",\n            \"message\": \"Created container kube-scheduler\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:02:15Z\",\n            \"lastTimestamp\": \"2021-05-09T18:02:15Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-scheduler-ip-172-20-45-192.ap-south-1.compute.internal.167d77f51a03b26d\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"4582e7ea-f92d-44ee-9164-d51726293260\",\n                \"resourceVersion\": \"26\",\n                \"creationTimestamp\": \"2021-05-09T18:03:10Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Pod\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-scheduler-ip-172-20-45-192.ap-south-1.compute.internal\",\n                \"uid\": \"10e19e2de3725ec42af16ae0dffcdc02\",\n                \"apiVersion\": \"v1\",\n                \"fieldPath\": \"spec.containers{kube-scheduler}\"\n            },\n            \"reason\": \"Started\",\n            \"message\": \"Started container kube-scheduler\",\n            \"source\": {\n                \"component\": \"kubelet\",\n                \"host\": \"ip-172-20-45-192.ap-south-1.compute.internal\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:02:15Z\",\n            \"lastTimestamp\": \"2021-05-09T18:02:15Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kube-scheduler.167d780ab8394868\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"9a4b22f3-d56e-4f4f-a9b5-935f6acce34e\",\n                \"resourceVersion\": \"54\",\n                \"creationTimestamp\": \"2021-05-09T18:03:48Z\"\n            },\n            \"involvedObject\": {\n                \"kind\": \"Lease\",\n                \"namespace\": \"kube-system\",\n                \"name\": \"kube-scheduler\",\n                \"uid\": \"3641e080-ff73-4151-849a-a8b6f030c265\",\n                \"apiVersion\": \"coordination.k8s.io/v1\",\n                \"resourceVersion\": \"470\"\n            },\n            \"reason\": \"LeaderElection\",\n            \"message\": \"ip-172-20-45-192_206d41cf-7a98-42a1-8e55-d66517e57834 became leader\",\n            \"source\": {\n                \"component\": \"default-scheduler\"\n            },\n            \"firstTimestamp\": \"2021-05-09T18:03:48Z\",\n            \"lastTimestamp\": \"2021-05-09T18:03:48Z\",\n            \"count\": 1,\n            \"type\": \"Normal\",\n            \"eventTime\": null,\n            \"reportingComponent\": \"\",\n            \"reportingInstance\": \"\"\n        }\n    ]\n}\n{\n    \"kind\": \"ReplicationControllerList\",\n    \"apiVersion\": \"v1\",\n    \"metadata\": {\n        \"resourceVersion\": \"12331\"\n    },\n    \"items\": []\n}\n{\n    \"kind\": \"ServiceList\",\n    \"apiVersion\": \"v1\",\n    \"metadata\": {\n        \"resourceVersion\": \"12342\"\n    },\n    \"items\": [\n        {\n            \"metadata\": {\n                \"name\": \"kube-dns\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"a007be78-8341-41a0-a93c-c80f080b2ef4\",\n                \"resourceVersion\": \"242\",\n                \"creationTimestamp\": \"2021-05-09T18:03:11Z\",\n                \"labels\": {\n                    \"addon.kops.k8s.io/name\": \"coredns.addons.k8s.io\",\n                    \"addon.kops.k8s.io/version\": \"1.7.0-kops.3\",\n                    \"app.kubernetes.io/managed-by\": \"kops\",\n                    \"k8s-addon\": \"coredns.addons.k8s.io\",\n                    \"k8s-app\": \"kube-dns\",\n                    \"kubernetes.io/cluster-service\": \"true\",\n                    \"kubernetes.io/name\": \"CoreDNS\"\n                },\n                \"annotations\": {\n                    \"kubectl.kubernetes.io/last-applied-configuration\": \"{\\\"apiVersion\\\":\\\"v1\\\",\\\"kind\\\":\\\"Service\\\",\\\"metadata\\\":{\\\"annotations\\\":{\\\"prometheus.io/port\\\":\\\"9153\\\",\\\"prometheus.io/scrape\\\":\\\"true\\\"},\\\"creationTimestamp\\\":null,\\\"labels\\\":{\\\"addon.kops.k8s.io/name\\\":\\\"coredns.addons.k8s.io\\\",\\\"addon.kops.k8s.io/version\\\":\\\"1.7.0-kops.3\\\",\\\"app.kubernetes.io/managed-by\\\":\\\"kops\\\",\\\"k8s-addon\\\":\\\"coredns.addons.k8s.io\\\",\\\"k8s-app\\\":\\\"kube-dns\\\",\\\"kubernetes.io/cluster-service\\\":\\\"true\\\",\\\"kubernetes.io/name\\\":\\\"CoreDNS\\\"},\\\"name\\\":\\\"kube-dns\\\",\\\"namespace\\\":\\\"kube-system\\\",\\\"resourceVersion\\\":\\\"0\\\"},\\\"spec\\\":{\\\"clusterIP\\\":\\\"100.64.0.10\\\",\\\"ports\\\":[{\\\"name\\\":\\\"dns\\\",\\\"port\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"dns-tcp\\\",\\\"port\\\":53,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"metrics\\\",\\\"port\\\":9153,\\\"protocol\\\":\\\"TCP\\\"}],\\\"selector\\\":{\\\"k8s-app\\\":\\\"kube-dns\\\"}}}\\n\",\n                    \"prometheus.io/port\": \"9153\",\n                    \"prometheus.io/scrape\": \"true\"\n                }\n            },\n            \"spec\": {\n                \"ports\": [\n                    {\n                        \"name\": \"dns\",\n                        \"protocol\": \"UDP\",\n                        \"port\": 53,\n                        \"targetPort\": 53\n                    },\n                    {\n                        \"name\": \"dns-tcp\",\n                        \"protocol\": \"TCP\",\n                        \"port\": 53,\n                        \"targetPort\": 53\n                    },\n                    {\n                        \"name\": \"metrics\",\n                        \"protocol\": \"TCP\",\n                        \"port\": 9153,\n                        \"targetPort\": 9153\n                    }\n                ],\n                \"selector\": {\n                    \"k8s-app\": \"kube-dns\"\n                },\n                \"clusterIP\": \"100.64.0.10\",\n                \"clusterIPs\": [\n                    \"100.64.0.10\"\n                ],\n                \"type\": \"ClusterIP\",\n                \"sessionAffinity\": \"None\",\n                \"ipFamilies\": [\n                    \"IPv4\"\n                ],\n                \"ipFamilyPolicy\": \"SingleStack\"\n            },\n            \"status\": {\n                \"loadBalancer\": {}\n            }\n        }\n    ]\n}\n{\n    \"kind\": \"DaemonSetList\",\n    \"apiVersion\": \"apps/v1\",\n    \"metadata\": {\n        \"resourceVersion\": \"12356\"\n    },\n    \"items\": [\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-node\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"1f232e7d-aab5-44d1-81f7-51c2bfe90426\",\n                \"resourceVersion\": \"887\",\n                \"generation\": 1,\n                \"creationTimestamp\": \"2021-05-09T18:03:14Z\",\n                \"labels\": {\n                    \"addon.kops.k8s.io/name\": \"aws-ebs-csi-driver.addons.k8s.io\",\n                    \"addon.kops.k8s.io/version\": \"0.10.1-kops.2\",\n                    \"app.kubernetes.io/instance\": \"aws-ebs-csi-driver\",\n                    \"app.kubernetes.io/managed-by\": \"kops\",\n                    \"app.kubernetes.io/name\": \"aws-ebs-csi-driver\",\n                    \"app.kubernetes.io/version\": \"v1.0.0\",\n                    \"k8s-addon\": \"aws-ebs-csi-driver.addons.k8s.io\"\n                },\n                \"annotations\": {\n                    \"deprecated.daemonset.template.generation\": \"1\",\n                    \"kubectl.kubernetes.io/last-applied-configuration\": \"{\\\"apiVersion\\\":\\\"apps/v1\\\",\\\"kind\\\":\\\"DaemonSet\\\",\\\"metadata\\\":{\\\"annotations\\\":{},\\\"creationTimestamp\\\":null,\\\"labels\\\":{\\\"addon.kops.k8s.io/name\\\":\\\"aws-ebs-csi-driver.addons.k8s.io\\\",\\\"addon.kops.k8s.io/version\\\":\\\"0.10.1-kops.2\\\",\\\"app.kubernetes.io/instance\\\":\\\"aws-ebs-csi-driver\\\",\\\"app.kubernetes.io/managed-by\\\":\\\"kops\\\",\\\"app.kubernetes.io/name\\\":\\\"aws-ebs-csi-driver\\\",\\\"app.kubernetes.io/version\\\":\\\"v1.0.0\\\",\\\"k8s-addon\\\":\\\"aws-ebs-csi-driver.addons.k8s.io\\\"},\\\"name\\\":\\\"ebs-csi-node\\\",\\\"namespace\\\":\\\"kube-system\\\"},\\\"spec\\\":{\\\"selector\\\":{\\\"matchLabels\\\":{\\\"app\\\":\\\"ebs-csi-node\\\",\\\"app.kubernetes.io/instance\\\":\\\"aws-ebs-csi-driver\\\",\\\"app.kubernetes.io/name\\\":\\\"aws-ebs-csi-driver\\\"}},\\\"template\\\":{\\\"metadata\\\":{\\\"labels\\\":{\\\"app\\\":\\\"ebs-csi-node\\\",\\\"app.kubernetes.io/instance\\\":\\\"aws-ebs-csi-driver\\\",\\\"app.kubernetes.io/name\\\":\\\"aws-ebs-csi-driver\\\",\\\"app.kubernetes.io/version\\\":\\\"v1.0.0\\\"}},\\\"spec\\\":{\\\"containers\\\":[{\\\"args\\\":[\\\"node\\\",\\\"--endpoint=$(CSI_ENDPOINT)\\\",\\\"--logtostderr\\\",\\\"--v=5\\\"],\\\"env\\\":[{\\\"name\\\":\\\"CSI_ENDPOINT\\\",\\\"value\\\":\\\"unix:/csi/csi.sock\\\"},{\\\"name\\\":\\\"CSI_NODE_NAME\\\",\\\"valueFrom\\\":{\\\"fieldRef\\\":{\\\"fieldPath\\\":\\\"spec.nodeName\\\"}}}],\\\"image\\\":\\\"k8s.gcr.io/provider-aws/aws-ebs-csi-driver:v1.0.0\\\",\\\"livenessProbe\\\":{\\\"failureThreshold\\\":5,\\\"httpGet\\\":{\\\"path\\\":\\\"/healthz\\\",\\\"port\\\":\\\"healthz\\\"},\\\"initialDelaySeconds\\\":10,\\\"periodSeconds\\\":10,\\\"timeoutSeconds\\\":3},\\\"name\\\":\\\"ebs-plugin\\\",\\\"ports\\\":[{\\\"containerPort\\\":9808,\\\"name\\\":\\\"healthz\\\",\\\"protocol\\\":\\\"TCP\\\"}],\\\"securityContext\\\":{\\\"privileged\\\":true},\\\"volumeMounts\\\":[{\\\"mountPath\\\":\\\"/var/lib/kubelet\\\",\\\"mountPropagation\\\":\\\"Bidirectional\\\",\\\"name\\\":\\\"kubelet-dir\\\"},{\\\"mountPath\\\":\\\"/csi\\\",\\\"name\\\":\\\"plugin-dir\\\"},{\\\"mountPath\\\":\\\"/dev\\\",\\\"name\\\":\\\"device-dir\\\"}]},{\\\"args\\\":[\\\"--csi-address=$(ADDRESS)\\\",\\\"--kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)\\\",\\\"--v=5\\\"],\\\"env\\\":[{\\\"name\\\":\\\"ADDRESS\\\",\\\"value\\\":\\\"/csi/csi.sock\\\"},{\\\"name\\\":\\\"DRIVER_REG_SOCK_PATH\\\",\\\"value\\\":\\\"/var/lib/kubelet/plugins/ebs.csi.aws.com/csi.sock\\\"}],\\\"image\\\":\\\"k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.1.0\\\",\\\"lifecycle\\\":{\\\"preStop\\\":{\\\"exec\\\":{\\\"command\\\":[\\\"/bin/sh\\\",\\\"-c\\\",\\\"rm -rf /registration/ebs.csi.aws.com-reg.sock /csi/csi.sock\\\"]}}},\\\"name\\\":\\\"node-driver-registrar\\\",\\\"volumeMounts\\\":[{\\\"mountPath\\\":\\\"/csi\\\",\\\"name\\\":\\\"plugin-dir\\\"},{\\\"mountPath\\\":\\\"/registration\\\",\\\"name\\\":\\\"registration-dir\\\"}]},{\\\"args\\\":[\\\"--csi-address=/csi/csi.sock\\\"],\\\"image\\\":\\\"quay.io/k8scsi/livenessprobe:v2.2.0\\\",\\\"name\\\":\\\"liveness-probe\\\",\\\"volumeMounts\\\":[{\\\"mountPath\\\":\\\"/csi\\\",\\\"name\\\":\\\"plugin-dir\\\"}]}],\\\"hostNetwork\\\":true,\\\"nodeSelector\\\":{\\\"kubernetes.io/os\\\":\\\"linux\\\"},\\\"priorityClassName\\\":\\\"system-node-critical\\\",\\\"serviceAccountName\\\":\\\"ebs-csi-node-sa\\\",\\\"tolerations\\\":[{\\\"operator\\\":\\\"Exists\\\"}],\\\"volumes\\\":[{\\\"hostPath\\\":{\\\"path\\\":\\\"/var/lib/kubelet\\\",\\\"type\\\":\\\"Directory\\\"},\\\"name\\\":\\\"kubelet-dir\\\"},{\\\"hostPath\\\":{\\\"path\\\":\\\"/var/lib/kubelet/plugins/ebs.csi.aws.com/\\\",\\\"type\\\":\\\"DirectoryOrCreate\\\"},\\\"name\\\":\\\"plugin-dir\\\"},{\\\"hostPath\\\":{\\\"path\\\":\\\"/var/lib/kubelet/plugins_registry/\\\",\\\"type\\\":\\\"Directory\\\"},\\\"name\\\":\\\"registration-dir\\\"},{\\\"hostPath\\\":{\\\"path\\\":\\\"/dev\\\",\\\"type\\\":\\\"Directory\\\"},\\\"name\\\":\\\"device-dir\\\"}]}}}}\\n\"\n                }\n            },\n            \"spec\": {\n                \"selector\": {\n                    \"matchLabels\": {\n                        \"app\": \"ebs-csi-node\",\n                        \"app.kubernetes.io/instance\": \"aws-ebs-csi-driver\",\n                        \"app.kubernetes.io/name\": \"aws-ebs-csi-driver\"\n                    }\n                },\n                \"template\": {\n                    \"metadata\": {\n                        \"creationTimestamp\": null,\n                        \"labels\": {\n                            \"app\": \"ebs-csi-node\",\n                            \"app.kubernetes.io/instance\": \"aws-ebs-csi-driver\",\n                            \"app.kubernetes.io/name\": \"aws-ebs-csi-driver\",\n                            \"app.kubernetes.io/version\": \"v1.0.0\"\n                        }\n                    },\n                    \"spec\": {\n                        \"volumes\": [\n                            {\n                                \"name\": \"kubelet-dir\",\n                                \"hostPath\": {\n                                    \"path\": \"/var/lib/kubelet\",\n                                    \"type\": \"Directory\"\n                                }\n                            },\n                            {\n                                \"name\": \"plugin-dir\",\n                                \"hostPath\": {\n                                    \"path\": \"/var/lib/kubelet/plugins/ebs.csi.aws.com/\",\n                                    \"type\": \"DirectoryOrCreate\"\n                                }\n                            },\n                            {\n                                \"name\": \"registration-dir\",\n                                \"hostPath\": {\n                                    \"path\": \"/var/lib/kubelet/plugins_registry/\",\n                                    \"type\": \"Directory\"\n                                }\n                            },\n                            {\n                                \"name\": \"device-dir\",\n                                \"hostPath\": {\n                                    \"path\": \"/dev\",\n                                    \"type\": \"Directory\"\n                                }\n                            }\n                        ],\n                        \"containers\": [\n                            {\n                                \"name\": \"ebs-plugin\",\n                                \"image\": \"k8s.gcr.io/provider-aws/aws-ebs-csi-driver:v1.0.0\",\n                                \"args\": [\n                                    \"node\",\n                                    \"--endpoint=$(CSI_ENDPOINT)\",\n                                    \"--logtostderr\",\n                                    \"--v=5\"\n                                ],\n                                \"ports\": [\n                                    {\n                                        \"name\": \"healthz\",\n                                        \"hostPort\": 9808,\n                                        \"containerPort\": 9808,\n                                        \"protocol\": \"TCP\"\n                                    }\n                                ],\n                                \"env\": [\n                                    {\n                                        \"name\": \"CSI_ENDPOINT\",\n                                        \"value\": \"unix:/csi/csi.sock\"\n                                    },\n                                    {\n                                        \"name\": \"CSI_NODE_NAME\",\n                                        \"valueFrom\": {\n                                            \"fieldRef\": {\n                                                \"apiVersion\": \"v1\",\n                                                \"fieldPath\": \"spec.nodeName\"\n                                            }\n                                        }\n                                    }\n                                ],\n                                \"resources\": {},\n                                \"volumeMounts\": [\n                                    {\n                                        \"name\": \"kubelet-dir\",\n                                        \"mountPath\": \"/var/lib/kubelet\",\n                                        \"mountPropagation\": \"Bidirectional\"\n                                    },\n                                    {\n                                        \"name\": \"plugin-dir\",\n                                        \"mountPath\": \"/csi\"\n                                    },\n                                    {\n                                        \"name\": \"device-dir\",\n                                        \"mountPath\": \"/dev\"\n                                    }\n                                ],\n                                \"livenessProbe\": {\n                                    \"httpGet\": {\n                                        \"path\": \"/healthz\",\n                                        \"port\": \"healthz\",\n                                        \"scheme\": \"HTTP\"\n                                    },\n                                    \"initialDelaySeconds\": 10,\n                                    \"timeoutSeconds\": 3,\n                                    \"periodSeconds\": 10,\n                                    \"successThreshold\": 1,\n                                    \"failureThreshold\": 5\n                                },\n                                \"terminationMessagePath\": \"/dev/termination-log\",\n                                \"terminationMessagePolicy\": \"File\",\n                                \"imagePullPolicy\": \"IfNotPresent\",\n                                \"securityContext\": {\n                                    \"privileged\": true\n                                }\n                            },\n                            {\n                                \"name\": \"node-driver-registrar\",\n                                \"image\": \"k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.1.0\",\n                                \"args\": [\n                                    \"--csi-address=$(ADDRESS)\",\n                                    \"--kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)\",\n                                    \"--v=5\"\n                                ],\n                                \"env\": [\n                                    {\n                                        \"name\": \"ADDRESS\",\n                                        \"value\": \"/csi/csi.sock\"\n                                    },\n                                    {\n                                        \"name\": \"DRIVER_REG_SOCK_PATH\",\n                                        \"value\": \"/var/lib/kubelet/plugins/ebs.csi.aws.com/csi.sock\"\n                                    }\n                                ],\n                                \"resources\": {},\n                                \"volumeMounts\": [\n                                    {\n                                        \"name\": \"plugin-dir\",\n                                        \"mountPath\": \"/csi\"\n                                    },\n                                    {\n                                        \"name\": \"registration-dir\",\n                                        \"mountPath\": \"/registration\"\n                                    }\n                                ],\n                                \"lifecycle\": {\n                                    \"preStop\": {\n                                        \"exec\": {\n                                            \"command\": [\n                                                \"/bin/sh\",\n                                                \"-c\",\n                                                \"rm -rf /registration/ebs.csi.aws.com-reg.sock /csi/csi.sock\"\n                                            ]\n                                        }\n                                    }\n                                },\n                                \"terminationMessagePath\": \"/dev/termination-log\",\n                                \"terminationMessagePolicy\": \"File\",\n                                \"imagePullPolicy\": \"IfNotPresent\"\n                            },\n                            {\n                                \"name\": \"liveness-probe\",\n                                \"image\": \"quay.io/k8scsi/livenessprobe:v2.2.0\",\n                                \"args\": [\n                                    \"--csi-address=/csi/csi.sock\"\n                                ],\n                                \"resources\": {},\n                                \"volumeMounts\": [\n                                    {\n                                        \"name\": \"plugin-dir\",\n                                        \"mountPath\": \"/csi\"\n                                    }\n                                ],\n                                \"terminationMessagePath\": \"/dev/termination-log\",\n                                \"terminationMessagePolicy\": \"File\",\n                                \"imagePullPolicy\": \"IfNotPresent\"\n                            }\n                        ],\n                        \"restartPolicy\": \"Always\",\n                        \"terminationGracePeriodSeconds\": 30,\n                        \"dnsPolicy\": \"ClusterFirst\",\n                        \"nodeSelector\": {\n                            \"kubernetes.io/os\": \"linux\"\n                        },\n                        \"serviceAccountName\": \"ebs-csi-node-sa\",\n                        \"serviceAccount\": \"ebs-csi-node-sa\",\n                        \"hostNetwork\": true,\n                        \"securityContext\": {},\n                        \"schedulerName\": \"default-scheduler\",\n                        \"tolerations\": [\n                            {\n                                \"operator\": \"Exists\"\n                            }\n                        ],\n                        \"priorityClassName\": \"system-node-critical\"\n                    }\n                },\n                \"updateStrategy\": {\n                    \"type\": \"RollingUpdate\",\n                    \"rollingUpdate\": {\n                        \"maxUnavailable\": 1,\n                        \"maxSurge\": 0\n                    }\n                },\n                \"revisionHistoryLimit\": 10\n            },\n            \"status\": {\n                \"currentNumberScheduled\": 5,\n                \"numberMisscheduled\": 0,\n                \"desiredNumberScheduled\": 5,\n                \"numberReady\": 5,\n                \"observedGeneration\": 1,\n                \"updatedNumberScheduled\": 5,\n                \"numberAvailable\": 5\n            }\n        },\n        {\n            \"metadata\": {\n                \"name\": \"kops-controller\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"cf976bbc-518c-43a6-87e5-06033c99244c\",\n                \"resourceVersion\": \"496\",\n                \"generation\": 1,\n                \"creationTimestamp\": \"2021-05-09T18:03:14Z\",\n                \"labels\": {\n                    \"addon.kops.k8s.io/name\": \"kops-controller.addons.k8s.io\",\n                    \"addon.kops.k8s.io/version\": \"1.22.0-alpha.1\",\n                    \"app.kubernetes.io/managed-by\": \"kops\",\n                    \"k8s-addon\": \"kops-controller.addons.k8s.io\",\n                    \"k8s-app\": \"kops-controller\",\n                    \"version\": \"v1.22.0-alpha.1\"\n                },\n                \"annotations\": {\n                    \"deprecated.daemonset.template.generation\": \"1\",\n                    \"kubectl.kubernetes.io/last-applied-configuration\": \"{\\\"apiVersion\\\":\\\"apps/v1\\\",\\\"kind\\\":\\\"DaemonSet\\\",\\\"metadata\\\":{\\\"annotations\\\":{},\\\"creationTimestamp\\\":null,\\\"labels\\\":{\\\"addon.kops.k8s.io/name\\\":\\\"kops-controller.addons.k8s.io\\\",\\\"addon.kops.k8s.io/version\\\":\\\"1.22.0-alpha.1\\\",\\\"app.kubernetes.io/managed-by\\\":\\\"kops\\\",\\\"k8s-addon\\\":\\\"kops-controller.addons.k8s.io\\\",\\\"k8s-app\\\":\\\"kops-controller\\\",\\\"version\\\":\\\"v1.22.0-alpha.1\\\"},\\\"name\\\":\\\"kops-controller\\\",\\\"namespace\\\":\\\"kube-system\\\"},\\\"spec\\\":{\\\"selector\\\":{\\\"matchLabels\\\":{\\\"k8s-app\\\":\\\"kops-controller\\\"}},\\\"template\\\":{\\\"metadata\\\":{\\\"annotations\\\":{\\\"dns.alpha.kubernetes.io/internal\\\":\\\"kops-controller.internal.e2e-394a1565f9-8b358.test-cncf-aws.k8s.io\\\"},\\\"labels\\\":{\\\"k8s-addon\\\":\\\"kops-controller.addons.k8s.io\\\",\\\"k8s-app\\\":\\\"kops-controller\\\",\\\"version\\\":\\\"v1.22.0-alpha.1\\\"}},\\\"spec\\\":{\\\"containers\\\":[{\\\"command\\\":[\\\"/kops-controller\\\",\\\"--v=2\\\",\\\"--conf=/etc/kubernetes/kops-controller/config/config.yaml\\\"],\\\"env\\\":[{\\\"name\\\":\\\"KUBERNETES_SERVICE_HOST\\\",\\\"value\\\":\\\"127.0.0.1\\\"}],\\\"image\\\":\\\"k8s.gcr.io/kops/kops-controller:1.22.0-alpha.1\\\",\\\"name\\\":\\\"kops-controller\\\",\\\"resources\\\":{\\\"requests\\\":{\\\"cpu\\\":\\\"50m\\\",\\\"memory\\\":\\\"50Mi\\\"}},\\\"securityContext\\\":{\\\"runAsNonRoot\\\":true},\\\"volumeMounts\\\":[{\\\"mountPath\\\":\\\"/etc/kubernetes/kops-controller/config/\\\",\\\"name\\\":\\\"kops-controller-config\\\"},{\\\"mountPath\\\":\\\"/etc/kubernetes/kops-controller/pki/\\\",\\\"name\\\":\\\"kops-controller-pki\\\"}]}],\\\"dnsPolicy\\\":\\\"Default\\\",\\\"hostNetwork\\\":true,\\\"nodeSelector\\\":{\\\"kops.k8s.io/kops-controller-pki\\\":\\\"\\\",\\\"node-role.kubernetes.io/master\\\":\\\"\\\"},\\\"priorityClassName\\\":\\\"system-node-critical\\\",\\\"serviceAccount\\\":\\\"kops-controller\\\",\\\"tolerations\\\":[{\\\"key\\\":\\\"node-role.kubernetes.io/master\\\",\\\"operator\\\":\\\"Exists\\\"}],\\\"volumes\\\":[{\\\"configMap\\\":{\\\"name\\\":\\\"kops-controller\\\"},\\\"name\\\":\\\"kops-controller-config\\\"},{\\\"hostPath\\\":{\\\"path\\\":\\\"/etc/kubernetes/kops-controller/\\\",\\\"type\\\":\\\"Directory\\\"},\\\"name\\\":\\\"kops-controller-pki\\\"}]}},\\\"updateStrategy\\\":{\\\"type\\\":\\\"OnDelete\\\"}}}\\n\"\n                }\n            },\n            \"spec\": {\n                \"selector\": {\n                    \"matchLabels\": {\n                        \"k8s-app\": \"kops-controller\"\n                    }\n                },\n                \"template\": {\n                    \"metadata\": {\n                        \"creationTimestamp\": null,\n                        \"labels\": {\n                            \"k8s-addon\": \"kops-controller.addons.k8s.io\",\n                            \"k8s-app\": \"kops-controller\",\n                            \"version\": \"v1.22.0-alpha.1\"\n                        },\n                        \"annotations\": {\n                            \"dns.alpha.kubernetes.io/internal\": \"kops-controller.internal.e2e-394a1565f9-8b358.test-cncf-aws.k8s.io\"\n                        }\n                    },\n                    \"spec\": {\n                        \"volumes\": [\n                            {\n                                \"name\": \"kops-controller-config\",\n                                \"configMap\": {\n                                    \"name\": \"kops-controller\",\n                                    \"defaultMode\": 420\n                                }\n                            },\n                            {\n                                \"name\": \"kops-controller-pki\",\n                                \"hostPath\": {\n                                    \"path\": \"/etc/kubernetes/kops-controller/\",\n                                    \"type\": \"Directory\"\n                                }\n                            }\n                        ],\n                        \"containers\": [\n                            {\n                                \"name\": \"kops-controller\",\n                                \"image\": \"k8s.gcr.io/kops/kops-controller:1.22.0-alpha.1\",\n                                \"command\": [\n                                    \"/kops-controller\",\n                                    \"--v=2\",\n                                    \"--conf=/etc/kubernetes/kops-controller/config/config.yaml\"\n                                ],\n                                \"env\": [\n                                    {\n                                        \"name\": \"KUBERNETES_SERVICE_HOST\",\n                                        \"value\": \"127.0.0.1\"\n                                    }\n                                ],\n                                \"resources\": {\n                                    \"requests\": {\n                                        \"cpu\": \"50m\",\n                                        \"memory\": \"50Mi\"\n                                    }\n                                },\n                                \"volumeMounts\": [\n                                    {\n                                        \"name\": \"kops-controller-config\",\n                                        \"mountPath\": \"/etc/kubernetes/kops-controller/config/\"\n                                    },\n                                    {\n                                        \"name\": \"kops-controller-pki\",\n                                        \"mountPath\": \"/etc/kubernetes/kops-controller/pki/\"\n                                    }\n                                ],\n                                \"terminationMessagePath\": \"/dev/termination-log\",\n                                \"terminationMessagePolicy\": \"File\",\n                                \"imagePullPolicy\": \"IfNotPresent\",\n                                \"securityContext\": {\n                                    \"runAsNonRoot\": true\n                                }\n                            }\n                        ],\n                        \"restartPolicy\": \"Always\",\n                        \"terminationGracePeriodSeconds\": 30,\n                        \"dnsPolicy\": \"Default\",\n                        \"nodeSelector\": {\n                            \"kops.k8s.io/kops-controller-pki\": \"\",\n                            \"node-role.kubernetes.io/master\": \"\"\n                        },\n                        \"serviceAccountName\": \"kops-controller\",\n                        \"serviceAccount\": \"kops-controller\",\n                        \"hostNetwork\": true,\n                        \"securityContext\": {},\n                        \"schedulerName\": \"default-scheduler\",\n                        \"tolerations\": [\n                            {\n                                \"key\": \"node-role.kubernetes.io/master\",\n                                \"operator\": \"Exists\"\n                            }\n                        ],\n                        \"priorityClassName\": \"system-node-critical\"\n                    }\n                },\n                \"updateStrategy\": {\n                    \"type\": \"OnDelete\"\n                },\n                \"revisionHistoryLimit\": 10\n            },\n            \"status\": {\n                \"currentNumberScheduled\": 1,\n                \"numberMisscheduled\": 0,\n                \"desiredNumberScheduled\": 1,\n                \"numberReady\": 1,\n                \"observedGeneration\": 1,\n                \"updatedNumberScheduled\": 1,\n                \"numberAvailable\": 1\n            }\n        }\n    ]\n}\n{\n    \"kind\": \"DeploymentList\",\n    \"apiVersion\": \"apps/v1\",\n    \"metadata\": {\n        \"resourceVersion\": \"12359\"\n    },\n    \"items\": [\n        {\n            \"metadata\": {\n                \"name\": \"coredns\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"a61b575f-ac1b-42c7-a8b1-37725ddf02ff\",\n                \"resourceVersion\": \"850\",\n                \"generation\": 2,\n                \"creationTimestamp\": \"2021-05-09T18:03:11Z\",\n                \"labels\": {\n                    \"addon.kops.k8s.io/name\": \"coredns.addons.k8s.io\",\n                    \"addon.kops.k8s.io/version\": \"1.7.0-kops.3\",\n                    \"app.kubernetes.io/managed-by\": \"kops\",\n                    \"k8s-addon\": \"coredns.addons.k8s.io\",\n                    \"k8s-app\": \"kube-dns\",\n                    \"kubernetes.io/cluster-service\": \"true\"\n                },\n                \"annotations\": {\n                    \"deployment.kubernetes.io/revision\": \"1\",\n                    \"kubectl.kubernetes.io/last-applied-configuration\": \"{\\\"apiVersion\\\":\\\"apps/v1\\\",\\\"kind\\\":\\\"Deployment\\\",\\\"metadata\\\":{\\\"annotations\\\":{},\\\"creationTimestamp\\\":null,\\\"labels\\\":{\\\"addon.kops.k8s.io/name\\\":\\\"coredns.addons.k8s.io\\\",\\\"addon.kops.k8s.io/version\\\":\\\"1.7.0-kops.3\\\",\\\"app.kubernetes.io/managed-by\\\":\\\"kops\\\",\\\"k8s-addon\\\":\\\"coredns.addons.k8s.io\\\",\\\"k8s-app\\\":\\\"kube-dns\\\",\\\"kubernetes.io/cluster-service\\\":\\\"true\\\"},\\\"name\\\":\\\"coredns\\\",\\\"namespace\\\":\\\"kube-system\\\"},\\\"spec\\\":{\\\"selector\\\":{\\\"matchLabels\\\":{\\\"k8s-app\\\":\\\"kube-dns\\\"}},\\\"strategy\\\":{\\\"rollingUpdate\\\":{\\\"maxSurge\\\":\\\"10%\\\",\\\"maxUnavailable\\\":1},\\\"type\\\":\\\"RollingUpdate\\\"},\\\"template\\\":{\\\"metadata\\\":{\\\"labels\\\":{\\\"k8s-app\\\":\\\"kube-dns\\\"}},\\\"spec\\\":{\\\"affinity\\\":{\\\"podAntiAffinity\\\":{\\\"preferredDuringSchedulingIgnoredDuringExecution\\\":[{\\\"podAffinityTerm\\\":{\\\"labelSelector\\\":{\\\"matchExpressions\\\":[{\\\"key\\\":\\\"k8s-app\\\",\\\"operator\\\":\\\"In\\\",\\\"values\\\":[\\\"kube-dns\\\"]}]},\\\"topologyKey\\\":\\\"kubernetes.io/hostname\\\"},\\\"weight\\\":1}]}},\\\"containers\\\":[{\\\"args\\\":[\\\"-conf\\\",\\\"/etc/coredns/Corefile\\\"],\\\"image\\\":\\\"k8s.gcr.io/coredns:1.7.0\\\",\\\"imagePullPolicy\\\":\\\"IfNotPresent\\\",\\\"livenessProbe\\\":{\\\"failureThreshold\\\":5,\\\"httpGet\\\":{\\\"path\\\":\\\"/health\\\",\\\"port\\\":8080,\\\"scheme\\\":\\\"HTTP\\\"},\\\"initialDelaySeconds\\\":60,\\\"successThreshold\\\":1,\\\"timeoutSeconds\\\":5},\\\"name\\\":\\\"coredns\\\",\\\"ports\\\":[{\\\"containerPort\\\":53,\\\"name\\\":\\\"dns\\\",\\\"protocol\\\":\\\"UDP\\\"},{\\\"containerPort\\\":53,\\\"name\\\":\\\"dns-tcp\\\",\\\"protocol\\\":\\\"TCP\\\"},{\\\"containerPort\\\":9153,\\\"name\\\":\\\"metrics\\\",\\\"protocol\\\":\\\"TCP\\\"}],\\\"readinessProbe\\\":{\\\"httpGet\\\":{\\\"path\\\":\\\"/health\\\",\\\"port\\\":8080,\\\"scheme\\\":\\\"HTTP\\\"}},\\\"resources\\\":{\\\"limits\\\":{\\\"memory\\\":\\\"170Mi\\\"},\\\"requests\\\":{\\\"cpu\\\":\\\"100m\\\",\\\"memory\\\":\\\"70Mi\\\"}},\\\"securityContext\\\":{\\\"allowPrivilegeEscalation\\\":false,\\\"capabilities\\\":{\\\"add\\\":[\\\"NET_BIND_SERVICE\\\"],\\\"drop\\\":[\\\"all\\\"]},\\\"readOnlyRootFilesystem\\\":true},\\\"volumeMounts\\\":[{\\\"mountPath\\\":\\\"/etc/coredns\\\",\\\"name\\\":\\\"config-volume\\\",\\\"readOnly\\\":true}]}],\\\"dnsPolicy\\\":\\\"Default\\\",\\\"nodeSelector\\\":{\\\"beta.kubernetes.io/os\\\":\\\"linux\\\"},\\\"priorityClassName\\\":\\\"system-cluster-critical\\\",\\\"serviceAccountName\\\":\\\"coredns\\\",\\\"tolerations\\\":[{\\\"key\\\":\\\"CriticalAddonsOnly\\\",\\\"operator\\\":\\\"Exists\\\"}],\\\"volumes\\\":[{\\\"configMap\\\":{\\\"items\\\":[{\\\"key\\\":\\\"Corefile\\\",\\\"path\\\":\\\"Corefile\\\"}],\\\"name\\\":\\\"coredns\\\"},\\\"name\\\":\\\"config-volume\\\"}]}}}}\\n\"\n                }\n            },\n            \"spec\": {\n                \"replicas\": 2,\n                \"selector\": {\n                    \"matchLabels\": {\n                        \"k8s-app\": \"kube-dns\"\n                    }\n                },\n                \"template\": {\n                    \"metadata\": {\n                        \"creationTimestamp\": null,\n                        \"labels\": {\n                            \"k8s-app\": \"kube-dns\"\n                        }\n                    },\n                    \"spec\": {\n                        \"volumes\": [\n                            {\n                                \"name\": \"config-volume\",\n                                \"configMap\": {\n                                    \"name\": \"coredns\",\n                                    \"items\": [\n                                        {\n                                            \"key\": \"Corefile\",\n                                            \"path\": \"Corefile\"\n                                        }\n                                    ],\n                                    \"defaultMode\": 420\n                                }\n                            }\n                        ],\n                        \"containers\": [\n                            {\n                                \"name\": \"coredns\",\n                                \"image\": \"k8s.gcr.io/coredns:1.7.0\",\n                                \"args\": [\n                                    \"-conf\",\n                                    \"/etc/coredns/Corefile\"\n                                ],\n                                \"ports\": [\n                                    {\n                                        \"name\": \"dns\",\n                                        \"containerPort\": 53,\n                                        \"protocol\": \"UDP\"\n                                    },\n                                    {\n                                        \"name\": \"dns-tcp\",\n                                        \"containerPort\": 53,\n                                        \"protocol\": \"TCP\"\n                                    },\n                                    {\n                                        \"name\": \"metrics\",\n                                        \"containerPort\": 9153,\n                                        \"protocol\": \"TCP\"\n                                    }\n                                ],\n                                \"resources\": {\n                                    \"limits\": {\n                                        \"memory\": \"170Mi\"\n                                    },\n                                    \"requests\": {\n                                        \"cpu\": \"100m\",\n                                        \"memory\": \"70Mi\"\n                                    }\n                                },\n                                \"volumeMounts\": [\n                                    {\n                                        \"name\": \"config-volume\",\n                                        \"readOnly\": true,\n                                        \"mountPath\": \"/etc/coredns\"\n                                    }\n                                ],\n                                \"livenessProbe\": {\n                                    \"httpGet\": {\n                                        \"path\": \"/health\",\n                                        \"port\": 8080,\n                                        \"scheme\": \"HTTP\"\n                                    },\n                                    \"initialDelaySeconds\": 60,\n                                    \"timeoutSeconds\": 5,\n                                    \"periodSeconds\": 10,\n                                    \"successThreshold\": 1,\n                                    \"failureThreshold\": 5\n                                },\n                                \"readinessProbe\": {\n                                    \"httpGet\": {\n                                        \"path\": \"/health\",\n                                        \"port\": 8080,\n                                        \"scheme\": \"HTTP\"\n                                    },\n                                    \"timeoutSeconds\": 1,\n                                    \"periodSeconds\": 10,\n                                    \"successThreshold\": 1,\n                                    \"failureThreshold\": 3\n                                },\n                                \"terminationMessagePath\": \"/dev/termination-log\",\n                                \"terminationMessagePolicy\": \"File\",\n                                \"imagePullPolicy\": \"IfNotPresent\",\n                                \"securityContext\": {\n                                    \"capabilities\": {\n                                        \"add\": [\n                                            \"NET_BIND_SERVICE\"\n                                        ],\n                                        \"drop\": [\n                                            \"all\"\n                                        ]\n                                    },\n                                    \"readOnlyRootFilesystem\": true,\n                                    \"allowPrivilegeEscalation\": false\n                                }\n                            }\n                        ],\n                        \"restartPolicy\": \"Always\",\n                        \"terminationGracePeriodSeconds\": 30,\n                        \"dnsPolicy\": \"Default\",\n                        \"nodeSelector\": {\n                            \"beta.kubernetes.io/os\": \"linux\"\n                        },\n                        \"serviceAccountName\": \"coredns\",\n                        \"serviceAccount\": \"coredns\",\n                        \"securityContext\": {},\n                        \"affinity\": {\n                            \"podAntiAffinity\": {\n                                \"preferredDuringSchedulingIgnoredDuringExecution\": [\n                                    {\n                                        \"weight\": 1,\n                                        \"podAffinityTerm\": {\n                                            \"labelSelector\": {\n                                                \"matchExpressions\": [\n                                                    {\n                                                        \"key\": \"k8s-app\",\n                                                        \"operator\": \"In\",\n                                                        \"values\": [\n                                                            \"kube-dns\"\n                                                        ]\n                                                    }\n                                                ]\n                                            },\n                                            \"topologyKey\": \"kubernetes.io/hostname\"\n                                        }\n                                    }\n                                ]\n                            }\n                        },\n                        \"schedulerName\": \"default-scheduler\",\n                        \"tolerations\": [\n                            {\n                                \"key\": \"CriticalAddonsOnly\",\n                                \"operator\": \"Exists\"\n                            }\n                        ],\n                        \"priorityClassName\": \"system-cluster-critical\"\n                    }\n                },\n                \"strategy\": {\n                    \"type\": \"RollingUpdate\",\n                    \"rollingUpdate\": {\n                        \"maxUnavailable\": 1,\n                        \"maxSurge\": \"10%\"\n                    }\n                },\n                \"revisionHistoryLimit\": 10,\n                \"progressDeadlineSeconds\": 600\n            },\n            \"status\": {\n                \"observedGeneration\": 2,\n                \"replicas\": 2,\n                \"updatedReplicas\": 2,\n                \"readyReplicas\": 2,\n                \"availableReplicas\": 2,\n                \"conditions\": [\n                    {\n                        \"type\": \"Available\",\n                        \"status\": \"True\",\n                        \"lastUpdateTime\": \"2021-05-09T18:05:01Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:05:01Z\",\n                        \"reason\": \"MinimumReplicasAvailable\",\n                        \"message\": \"Deployment has minimum availability.\"\n                    },\n                    {\n                        \"type\": \"Progressing\",\n                        \"status\": \"True\",\n                        \"lastUpdateTime\": \"2021-05-09T18:05:09Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:03:21Z\",\n                        \"reason\": \"NewReplicaSetAvailable\",\n                        \"message\": \"ReplicaSet \\\"coredns-66cbffdd77\\\" has successfully progressed.\"\n                    }\n                ]\n            }\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-autoscaler\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"67ce1e3d-2f80-473c-be38-e143ca4b7fbc\",\n                \"resourceVersion\": \"778\",\n                \"generation\": 1,\n                \"creationTimestamp\": \"2021-05-09T18:03:11Z\",\n                \"labels\": {\n                    \"addon.kops.k8s.io/name\": \"coredns.addons.k8s.io\",\n                    \"addon.kops.k8s.io/version\": \"1.7.0-kops.3\",\n                    \"app.kubernetes.io/managed-by\": \"kops\",\n                    \"k8s-addon\": \"coredns.addons.k8s.io\",\n                    \"k8s-app\": \"coredns-autoscaler\",\n                    \"kubernetes.io/cluster-service\": \"true\"\n                },\n                \"annotations\": {\n                    \"deployment.kubernetes.io/revision\": \"1\",\n                    \"kubectl.kubernetes.io/last-applied-configuration\": \"{\\\"apiVersion\\\":\\\"apps/v1\\\",\\\"kind\\\":\\\"Deployment\\\",\\\"metadata\\\":{\\\"annotations\\\":{},\\\"creationTimestamp\\\":null,\\\"labels\\\":{\\\"addon.kops.k8s.io/name\\\":\\\"coredns.addons.k8s.io\\\",\\\"addon.kops.k8s.io/version\\\":\\\"1.7.0-kops.3\\\",\\\"app.kubernetes.io/managed-by\\\":\\\"kops\\\",\\\"k8s-addon\\\":\\\"coredns.addons.k8s.io\\\",\\\"k8s-app\\\":\\\"coredns-autoscaler\\\",\\\"kubernetes.io/cluster-service\\\":\\\"true\\\"},\\\"name\\\":\\\"coredns-autoscaler\\\",\\\"namespace\\\":\\\"kube-system\\\"},\\\"spec\\\":{\\\"selector\\\":{\\\"matchLabels\\\":{\\\"k8s-app\\\":\\\"coredns-autoscaler\\\"}},\\\"template\\\":{\\\"metadata\\\":{\\\"annotations\\\":{\\\"scheduler.alpha.kubernetes.io/critical-pod\\\":\\\"\\\"},\\\"labels\\\":{\\\"k8s-app\\\":\\\"coredns-autoscaler\\\"}},\\\"spec\\\":{\\\"containers\\\":[{\\\"command\\\":[\\\"/cluster-proportional-autoscaler\\\",\\\"--namespace=kube-system\\\",\\\"--configmap=coredns-autoscaler\\\",\\\"--target=Deployment/coredns\\\",\\\"--default-params={\\\\\\\"linear\\\\\\\":{\\\\\\\"coresPerReplica\\\\\\\":256,\\\\\\\"nodesPerReplica\\\\\\\":16,\\\\\\\"preventSinglePointFailure\\\\\\\":true}}\\\",\\\"--logtostderr=true\\\",\\\"--v=2\\\"],\\\"image\\\":\\\"k8s.gcr.io/cpa/cluster-proportional-autoscaler:1.8.3\\\",\\\"name\\\":\\\"autoscaler\\\",\\\"resources\\\":{\\\"requests\\\":{\\\"cpu\\\":\\\"20m\\\",\\\"memory\\\":\\\"10Mi\\\"}}}],\\\"priorityClassName\\\":\\\"system-cluster-critical\\\",\\\"serviceAccountName\\\":\\\"coredns-autoscaler\\\",\\\"tolerations\\\":[{\\\"key\\\":\\\"CriticalAddonsOnly\\\",\\\"operator\\\":\\\"Exists\\\"}]}}}}\\n\"\n                }\n            },\n            \"spec\": {\n                \"replicas\": 1,\n                \"selector\": {\n                    \"matchLabels\": {\n                        \"k8s-app\": \"coredns-autoscaler\"\n                    }\n                },\n                \"template\": {\n                    \"metadata\": {\n                        \"creationTimestamp\": null,\n                        \"labels\": {\n                            \"k8s-app\": \"coredns-autoscaler\"\n                        },\n                        \"annotations\": {\n                            \"scheduler.alpha.kubernetes.io/critical-pod\": \"\"\n                        }\n                    },\n                    \"spec\": {\n                        \"containers\": [\n                            {\n                                \"name\": \"autoscaler\",\n                                \"image\": \"k8s.gcr.io/cpa/cluster-proportional-autoscaler:1.8.3\",\n                                \"command\": [\n                                    \"/cluster-proportional-autoscaler\",\n                                    \"--namespace=kube-system\",\n                                    \"--configmap=coredns-autoscaler\",\n                                    \"--target=Deployment/coredns\",\n                                    \"--default-params={\\\"linear\\\":{\\\"coresPerReplica\\\":256,\\\"nodesPerReplica\\\":16,\\\"preventSinglePointFailure\\\":true}}\",\n                                    \"--logtostderr=true\",\n                                    \"--v=2\"\n                                ],\n                                \"resources\": {\n                                    \"requests\": {\n                                        \"cpu\": \"20m\",\n                                        \"memory\": \"10Mi\"\n                                    }\n                                },\n                                \"terminationMessagePath\": \"/dev/termination-log\",\n                                \"terminationMessagePolicy\": \"File\",\n                                \"imagePullPolicy\": \"IfNotPresent\"\n                            }\n                        ],\n                        \"restartPolicy\": \"Always\",\n                        \"terminationGracePeriodSeconds\": 30,\n                        \"dnsPolicy\": \"ClusterFirst\",\n                        \"serviceAccountName\": \"coredns-autoscaler\",\n                        \"serviceAccount\": \"coredns-autoscaler\",\n                        \"securityContext\": {},\n                        \"schedulerName\": \"default-scheduler\",\n                        \"tolerations\": [\n                            {\n                                \"key\": \"CriticalAddonsOnly\",\n                                \"operator\": \"Exists\"\n                            }\n                        ],\n                        \"priorityClassName\": \"system-cluster-critical\"\n                    }\n                },\n                \"strategy\": {\n                    \"type\": \"RollingUpdate\",\n                    \"rollingUpdate\": {\n                        \"maxUnavailable\": \"25%\",\n                        \"maxSurge\": \"25%\"\n                    }\n                },\n                \"revisionHistoryLimit\": 10,\n                \"progressDeadlineSeconds\": 600\n            },\n            \"status\": {\n                \"observedGeneration\": 1,\n                \"replicas\": 1,\n                \"updatedReplicas\": 1,\n                \"readyReplicas\": 1,\n                \"availableReplicas\": 1,\n                \"conditions\": [\n                    {\n                        \"type\": \"Available\",\n                        \"status\": \"True\",\n                        \"lastUpdateTime\": \"2021-05-09T18:04:59Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:04:59Z\",\n                        \"reason\": \"MinimumReplicasAvailable\",\n                        \"message\": \"Deployment has minimum availability.\"\n                    },\n                    {\n                        \"type\": \"Progressing\",\n                        \"status\": \"True\",\n                        \"lastUpdateTime\": \"2021-05-09T18:04:59Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:03:21Z\",\n                        \"reason\": \"NewReplicaSetAvailable\",\n                        \"message\": \"ReplicaSet \\\"coredns-autoscaler-6f594f4c58\\\" has successfully progressed.\"\n                    }\n                ]\n            }\n        },\n        {\n            \"metadata\": {\n                \"name\": \"dns-controller\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"77ad756f-5d8d-4aad-b4c5-f1fbaa77b0c6\",\n                \"resourceVersion\": \"490\",\n                \"generation\": 1,\n                \"creationTimestamp\": \"2021-05-09T18:03:13Z\",\n                \"labels\": {\n                    \"addon.kops.k8s.io/name\": \"dns-controller.addons.k8s.io\",\n                    \"addon.kops.k8s.io/version\": \"1.22.0-alpha.1\",\n                    \"app.kubernetes.io/managed-by\": \"kops\",\n                    \"k8s-addon\": \"dns-controller.addons.k8s.io\",\n                    \"k8s-app\": \"dns-controller\",\n                    \"version\": \"v1.22.0-alpha.1\"\n                },\n                \"annotations\": {\n                    \"deployment.kubernetes.io/revision\": \"1\",\n                    \"kubectl.kubernetes.io/last-applied-configuration\": \"{\\\"apiVersion\\\":\\\"apps/v1\\\",\\\"kind\\\":\\\"Deployment\\\",\\\"metadata\\\":{\\\"annotations\\\":{},\\\"creationTimestamp\\\":null,\\\"labels\\\":{\\\"addon.kops.k8s.io/name\\\":\\\"dns-controller.addons.k8s.io\\\",\\\"addon.kops.k8s.io/version\\\":\\\"1.22.0-alpha.1\\\",\\\"app.kubernetes.io/managed-by\\\":\\\"kops\\\",\\\"k8s-addon\\\":\\\"dns-controller.addons.k8s.io\\\",\\\"k8s-app\\\":\\\"dns-controller\\\",\\\"version\\\":\\\"v1.22.0-alpha.1\\\"},\\\"name\\\":\\\"dns-controller\\\",\\\"namespace\\\":\\\"kube-system\\\"},\\\"spec\\\":{\\\"replicas\\\":1,\\\"selector\\\":{\\\"matchLabels\\\":{\\\"k8s-app\\\":\\\"dns-controller\\\"}},\\\"strategy\\\":{\\\"type\\\":\\\"Recreate\\\"},\\\"template\\\":{\\\"metadata\\\":{\\\"annotations\\\":{\\\"scheduler.alpha.kubernetes.io/critical-pod\\\":\\\"\\\"},\\\"labels\\\":{\\\"k8s-addon\\\":\\\"dns-controller.addons.k8s.io\\\",\\\"k8s-app\\\":\\\"dns-controller\\\",\\\"version\\\":\\\"v1.22.0-alpha.1\\\"}},\\\"spec\\\":{\\\"containers\\\":[{\\\"command\\\":[\\\"/dns-controller\\\",\\\"--watch-ingress=false\\\",\\\"--dns=aws-route53\\\",\\\"--zone=*/ZEMLNXIIWQ0RV\\\",\\\"--zone=*/*\\\",\\\"-v=2\\\"],\\\"env\\\":[{\\\"name\\\":\\\"KUBERNETES_SERVICE_HOST\\\",\\\"value\\\":\\\"127.0.0.1\\\"}],\\\"image\\\":\\\"k8s.gcr.io/kops/dns-controller:1.22.0-alpha.1\\\",\\\"name\\\":\\\"dns-controller\\\",\\\"resources\\\":{\\\"requests\\\":{\\\"cpu\\\":\\\"50m\\\",\\\"memory\\\":\\\"50Mi\\\"}},\\\"securityContext\\\":{\\\"runAsNonRoot\\\":true}}],\\\"dnsPolicy\\\":\\\"Default\\\",\\\"hostNetwork\\\":true,\\\"nodeSelector\\\":{\\\"node-role.kubernetes.io/master\\\":\\\"\\\"},\\\"priorityClassName\\\":\\\"system-cluster-critical\\\",\\\"serviceAccount\\\":\\\"dns-controller\\\",\\\"tolerations\\\":[{\\\"operator\\\":\\\"Exists\\\"}]}}}}\\n\"\n                }\n            },\n            \"spec\": {\n                \"replicas\": 1,\n                \"selector\": {\n                    \"matchLabels\": {\n                        \"k8s-app\": \"dns-controller\"\n                    }\n                },\n                \"template\": {\n                    \"metadata\": {\n                        \"creationTimestamp\": null,\n                        \"labels\": {\n                            \"k8s-addon\": \"dns-controller.addons.k8s.io\",\n                            \"k8s-app\": \"dns-controller\",\n                            \"version\": \"v1.22.0-alpha.1\"\n                        },\n                        \"annotations\": {\n                            \"scheduler.alpha.kubernetes.io/critical-pod\": \"\"\n                        }\n                    },\n                    \"spec\": {\n                        \"containers\": [\n                            {\n                                \"name\": \"dns-controller\",\n                                \"image\": \"k8s.gcr.io/kops/dns-controller:1.22.0-alpha.1\",\n                                \"command\": [\n                                    \"/dns-controller\",\n                                    \"--watch-ingress=false\",\n                                    \"--dns=aws-route53\",\n                                    \"--zone=*/ZEMLNXIIWQ0RV\",\n                                    \"--zone=*/*\",\n                                    \"-v=2\"\n                                ],\n                                \"env\": [\n                                    {\n                                        \"name\": \"KUBERNETES_SERVICE_HOST\",\n                                        \"value\": \"127.0.0.1\"\n                                    }\n                                ],\n                                \"resources\": {\n                                    \"requests\": {\n                                        \"cpu\": \"50m\",\n                                        \"memory\": \"50Mi\"\n                                    }\n                                },\n                                \"terminationMessagePath\": \"/dev/termination-log\",\n                                \"terminationMessagePolicy\": \"File\",\n                                \"imagePullPolicy\": \"IfNotPresent\",\n                                \"securityContext\": {\n                                    \"runAsNonRoot\": true\n                                }\n                            }\n                        ],\n                        \"restartPolicy\": \"Always\",\n                        \"terminationGracePeriodSeconds\": 30,\n                        \"dnsPolicy\": \"Default\",\n                        \"nodeSelector\": {\n                            \"node-role.kubernetes.io/master\": \"\"\n                        },\n                        \"serviceAccountName\": \"dns-controller\",\n                        \"serviceAccount\": \"dns-controller\",\n                        \"hostNetwork\": true,\n                        \"securityContext\": {},\n                        \"schedulerName\": \"default-scheduler\",\n                        \"tolerations\": [\n                            {\n                                \"operator\": \"Exists\"\n                            }\n                        ],\n                        \"priorityClassName\": \"system-cluster-critical\"\n                    }\n                },\n                \"strategy\": {\n                    \"type\": \"Recreate\"\n                },\n                \"revisionHistoryLimit\": 10,\n                \"progressDeadlineSeconds\": 600\n            },\n            \"status\": {\n                \"observedGeneration\": 1,\n                \"replicas\": 1,\n                \"updatedReplicas\": 1,\n                \"readyReplicas\": 1,\n                \"availableReplicas\": 1,\n                \"conditions\": [\n                    {\n                        \"type\": \"Available\",\n                        \"status\": \"True\",\n                        \"lastUpdateTime\": \"2021-05-09T18:03:52Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:03:52Z\",\n                        \"reason\": \"MinimumReplicasAvailable\",\n                        \"message\": \"Deployment has minimum availability.\"\n                    },\n                    {\n                        \"type\": \"Progressing\",\n                        \"status\": \"True\",\n                        \"lastUpdateTime\": \"2021-05-09T18:03:52Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:03:21Z\",\n                        \"reason\": \"NewReplicaSetAvailable\",\n                        \"message\": \"ReplicaSet \\\"dns-controller-5f98b58844\\\" has successfully progressed.\"\n                    }\n                ]\n            }\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"6c145f46-f068-4e39-992e-003776a34b5e\",\n                \"resourceVersion\": \"627\",\n                \"generation\": 1,\n                \"creationTimestamp\": \"2021-05-09T18:03:14Z\",\n                \"labels\": {\n                    \"addon.kops.k8s.io/name\": \"aws-ebs-csi-driver.addons.k8s.io\",\n                    \"addon.kops.k8s.io/version\": \"0.10.1-kops.2\",\n                    \"app.kubernetes.io/instance\": \"aws-ebs-csi-driver\",\n                    \"app.kubernetes.io/managed-by\": \"kops\",\n                    \"app.kubernetes.io/name\": \"aws-ebs-csi-driver\",\n                    \"app.kubernetes.io/version\": \"v1.0.0\",\n                    \"k8s-addon\": \"aws-ebs-csi-driver.addons.k8s.io\"\n                },\n                \"annotations\": {\n                    \"deployment.kubernetes.io/revision\": \"1\",\n                    \"kubectl.kubernetes.io/last-applied-configuration\": \"{\\\"apiVersion\\\":\\\"apps/v1\\\",\\\"kind\\\":\\\"Deployment\\\",\\\"metadata\\\":{\\\"annotations\\\":{},\\\"creationTimestamp\\\":null,\\\"labels\\\":{\\\"addon.kops.k8s.io/name\\\":\\\"aws-ebs-csi-driver.addons.k8s.io\\\",\\\"addon.kops.k8s.io/version\\\":\\\"0.10.1-kops.2\\\",\\\"app.kubernetes.io/instance\\\":\\\"aws-ebs-csi-driver\\\",\\\"app.kubernetes.io/managed-by\\\":\\\"kops\\\",\\\"app.kubernetes.io/name\\\":\\\"aws-ebs-csi-driver\\\",\\\"app.kubernetes.io/version\\\":\\\"v1.0.0\\\",\\\"k8s-addon\\\":\\\"aws-ebs-csi-driver.addons.k8s.io\\\"},\\\"name\\\":\\\"ebs-csi-controller\\\",\\\"namespace\\\":\\\"kube-system\\\"},\\\"spec\\\":{\\\"replicas\\\":2,\\\"selector\\\":{\\\"matchLabels\\\":{\\\"app\\\":\\\"ebs-csi-controller\\\",\\\"app.kubernetes.io/instance\\\":\\\"aws-ebs-csi-driver\\\",\\\"app.kubernetes.io/name\\\":\\\"aws-ebs-csi-driver\\\"}},\\\"template\\\":{\\\"metadata\\\":{\\\"labels\\\":{\\\"app\\\":\\\"ebs-csi-controller\\\",\\\"app.kubernetes.io/instance\\\":\\\"aws-ebs-csi-driver\\\",\\\"app.kubernetes.io/name\\\":\\\"aws-ebs-csi-driver\\\",\\\"app.kubernetes.io/version\\\":\\\"v1.0.0\\\"}},\\\"spec\\\":{\\\"containers\\\":[{\\\"args\\\":[\\\"controller\\\",\\\"--endpoint=$(CSI_ENDPOINT)\\\",\\\"--logtostderr\\\",\\\"--k8s-tag-cluster-id=e2e-394a1565f9-8b358.test-cncf-aws.k8s.io\\\",\\\"--extra-tags=KubernetesCluster=e2e-394a1565f9-8b358.test-cncf-aws.k8s.io\\\",\\\"--v=5\\\"],\\\"env\\\":[{\\\"name\\\":\\\"CSI_ENDPOINT\\\",\\\"value\\\":\\\"unix:///var/lib/csi/sockets/pluginproxy/csi.sock\\\"},{\\\"name\\\":\\\"AWS_ACCESS_KEY_ID\\\",\\\"valueFrom\\\":{\\\"secretKeyRef\\\":{\\\"key\\\":\\\"key_id\\\",\\\"name\\\":\\\"aws-secret\\\",\\\"optional\\\":true}}},{\\\"name\\\":\\\"AWS_SECRET_ACCESS_KEY\\\",\\\"valueFrom\\\":{\\\"secretKeyRef\\\":{\\\"key\\\":\\\"access_key\\\",\\\"name\\\":\\\"aws-secret\\\",\\\"optional\\\":true}}}],\\\"image\\\":\\\"k8s.gcr.io/provider-aws/aws-ebs-csi-driver:v1.0.0\\\",\\\"imagePullPolicy\\\":\\\"IfNotPresent\\\",\\\"livenessProbe\\\":{\\\"failureThreshold\\\":5,\\\"httpGet\\\":{\\\"path\\\":\\\"/healthz\\\",\\\"port\\\":\\\"healthz\\\"},\\\"initialDelaySeconds\\\":10,\\\"periodSeconds\\\":10,\\\"timeoutSeconds\\\":3},\\\"name\\\":\\\"ebs-plugin\\\",\\\"ports\\\":[{\\\"containerPort\\\":9808,\\\"name\\\":\\\"healthz\\\",\\\"protocol\\\":\\\"TCP\\\"}],\\\"volumeMounts\\\":[{\\\"mountPath\\\":\\\"/var/lib/csi/sockets/pluginproxy/\\\",\\\"name\\\":\\\"socket-dir\\\"}]},{\\\"args\\\":[\\\"--csi-address=$(ADDRESS)\\\",\\\"--v=5\\\",\\\"--feature-gates=Topology=true\\\",\\\"--leader-election=true\\\",\\\"--extra-create-metadata=true\\\"],\\\"env\\\":[{\\\"name\\\":\\\"ADDRESS\\\",\\\"value\\\":\\\"/var/lib/csi/sockets/pluginproxy/csi.sock\\\"}],\\\"image\\\":\\\"k8s.gcr.io/sig-storage/csi-provisioner:v2.2.0\\\",\\\"name\\\":\\\"csi-provisioner\\\",\\\"volumeMounts\\\":[{\\\"mountPath\\\":\\\"/var/lib/csi/sockets/pluginproxy/\\\",\\\"name\\\":\\\"socket-dir\\\"}]},{\\\"args\\\":[\\\"--csi-address=$(ADDRESS)\\\",\\\"--v=5\\\",\\\"--leader-election=true\\\"],\\\"env\\\":[{\\\"name\\\":\\\"ADDRESS\\\",\\\"value\\\":\\\"/var/lib/csi/sockets/pluginproxy/csi.sock\\\"}],\\\"image\\\":\\\"k8s.gcr.io/sig-storage/csi-attacher:v3.2.0\\\",\\\"name\\\":\\\"csi-attacher\\\",\\\"volumeMounts\\\":[{\\\"mountPath\\\":\\\"/var/lib/csi/sockets/pluginproxy/\\\",\\\"name\\\":\\\"socket-dir\\\"}]},{\\\"args\\\":[\\\"--csi-address=$(ADDRESS)\\\",\\\"--leader-election=true\\\"],\\\"env\\\":[{\\\"name\\\":\\\"ADDRESS\\\",\\\"value\\\":\\\"/var/lib/csi/sockets/pluginproxy/csi.sock\\\"}],\\\"image\\\":\\\"k8s.gcr.io/sig-storage/csi-snapshotter:v4.0.0\\\",\\\"name\\\":\\\"csi-snapshotter\\\",\\\"volumeMounts\\\":[{\\\"mountPath\\\":\\\"/var/lib/csi/sockets/pluginproxy/\\\",\\\"name\\\":\\\"socket-dir\\\"}]},{\\\"args\\\":[\\\"--csi-address=$(ADDRESS)\\\",\\\"--v=5\\\"],\\\"env\\\":[{\\\"name\\\":\\\"ADDRESS\\\",\\\"value\\\":\\\"/var/lib/csi/sockets/pluginproxy/csi.sock\\\"}],\\\"image\\\":\\\"k8s.gcr.io/sig-storage/csi-resizer:v1.1.0\\\",\\\"imagePullPolicy\\\":\\\"Always\\\",\\\"name\\\":\\\"csi-resizer\\\",\\\"volumeMounts\\\":[{\\\"mountPath\\\":\\\"/var/lib/csi/sockets/pluginproxy/\\\",\\\"name\\\":\\\"socket-dir\\\"}]},{\\\"args\\\":[\\\"--csi-address=/csi/csi.sock\\\"],\\\"image\\\":\\\"k8s.gcr.io/sig-storage/livenessprobe:v2.2.0\\\",\\\"name\\\":\\\"liveness-probe\\\",\\\"volumeMounts\\\":[{\\\"mountPath\\\":\\\"/csi\\\",\\\"name\\\":\\\"socket-dir\\\"}]}],\\\"nodeSelector\\\":{\\\"kubernetes.io/os\\\":\\\"linux\\\",\\\"node-role.kubernetes.io/master\\\":\\\"\\\"},\\\"priorityClassName\\\":\\\"system-cluster-critical\\\",\\\"serviceAccountName\\\":\\\"ebs-csi-controller-sa\\\",\\\"tolerations\\\":[{\\\"operator\\\":\\\"Exists\\\"}],\\\"volumes\\\":[{\\\"emptyDir\\\":{},\\\"name\\\":\\\"socket-dir\\\"}]}}}}\\n\"\n                }\n            },\n            \"spec\": {\n                \"replicas\": 2,\n                \"selector\": {\n                    \"matchLabels\": {\n                        \"app\": \"ebs-csi-controller\",\n                        \"app.kubernetes.io/instance\": \"aws-ebs-csi-driver\",\n                        \"app.kubernetes.io/name\": \"aws-ebs-csi-driver\"\n                    }\n                },\n                \"template\": {\n                    \"metadata\": {\n                        \"creationTimestamp\": null,\n                        \"labels\": {\n                            \"app\": \"ebs-csi-controller\",\n                            \"app.kubernetes.io/instance\": \"aws-ebs-csi-driver\",\n                            \"app.kubernetes.io/name\": \"aws-ebs-csi-driver\",\n                            \"app.kubernetes.io/version\": \"v1.0.0\"\n                        }\n                    },\n                    \"spec\": {\n                        \"volumes\": [\n                            {\n                                \"name\": \"socket-dir\",\n                                \"emptyDir\": {}\n                            }\n                        ],\n                        \"containers\": [\n                            {\n                                \"name\": \"ebs-plugin\",\n                                \"image\": \"k8s.gcr.io/provider-aws/aws-ebs-csi-driver:v1.0.0\",\n                                \"args\": [\n                                    \"controller\",\n                                    \"--endpoint=$(CSI_ENDPOINT)\",\n                                    \"--logtostderr\",\n                                    \"--k8s-tag-cluster-id=e2e-394a1565f9-8b358.test-cncf-aws.k8s.io\",\n                                    \"--extra-tags=KubernetesCluster=e2e-394a1565f9-8b358.test-cncf-aws.k8s.io\",\n                                    \"--v=5\"\n                                ],\n                                \"ports\": [\n                                    {\n                                        \"name\": \"healthz\",\n                                        \"containerPort\": 9808,\n                                        \"protocol\": \"TCP\"\n                                    }\n                                ],\n                                \"env\": [\n                                    {\n                                        \"name\": \"CSI_ENDPOINT\",\n                                        \"value\": \"unix:///var/lib/csi/sockets/pluginproxy/csi.sock\"\n                                    },\n                                    {\n                                        \"name\": \"AWS_ACCESS_KEY_ID\",\n                                        \"valueFrom\": {\n                                            \"secretKeyRef\": {\n                                                \"name\": \"aws-secret\",\n                                                \"key\": \"key_id\",\n                                                \"optional\": true\n                                            }\n                                        }\n                                    },\n                                    {\n                                        \"name\": \"AWS_SECRET_ACCESS_KEY\",\n                                        \"valueFrom\": {\n                                            \"secretKeyRef\": {\n                                                \"name\": \"aws-secret\",\n                                                \"key\": \"access_key\",\n                                                \"optional\": true\n                                            }\n                                        }\n                                    }\n                                ],\n                                \"resources\": {},\n                                \"volumeMounts\": [\n                                    {\n                                        \"name\": \"socket-dir\",\n                                        \"mountPath\": \"/var/lib/csi/sockets/pluginproxy/\"\n                                    }\n                                ],\n                                \"livenessProbe\": {\n                                    \"httpGet\": {\n                                        \"path\": \"/healthz\",\n                                        \"port\": \"healthz\",\n                                        \"scheme\": \"HTTP\"\n                                    },\n                                    \"initialDelaySeconds\": 10,\n                                    \"timeoutSeconds\": 3,\n                                    \"periodSeconds\": 10,\n                                    \"successThreshold\": 1,\n                                    \"failureThreshold\": 5\n                                },\n                                \"terminationMessagePath\": \"/dev/termination-log\",\n                                \"terminationMessagePolicy\": \"File\",\n                                \"imagePullPolicy\": \"IfNotPresent\"\n                            },\n                            {\n                                \"name\": \"csi-provisioner\",\n                                \"image\": \"k8s.gcr.io/sig-storage/csi-provisioner:v2.2.0\",\n                                \"args\": [\n                                    \"--csi-address=$(ADDRESS)\",\n                                    \"--v=5\",\n                                    \"--feature-gates=Topology=true\",\n                                    \"--leader-election=true\",\n                                    \"--extra-create-metadata=true\"\n                                ],\n                                \"env\": [\n                                    {\n                                        \"name\": \"ADDRESS\",\n                                        \"value\": \"/var/lib/csi/sockets/pluginproxy/csi.sock\"\n                                    }\n                                ],\n                                \"resources\": {},\n                                \"volumeMounts\": [\n                                    {\n                                        \"name\": \"socket-dir\",\n                                        \"mountPath\": \"/var/lib/csi/sockets/pluginproxy/\"\n                                    }\n                                ],\n                                \"terminationMessagePath\": \"/dev/termination-log\",\n                                \"terminationMessagePolicy\": \"File\",\n                                \"imagePullPolicy\": \"IfNotPresent\"\n                            },\n                            {\n                                \"name\": \"csi-attacher\",\n                                \"image\": \"k8s.gcr.io/sig-storage/csi-attacher:v3.2.0\",\n                                \"args\": [\n                                    \"--csi-address=$(ADDRESS)\",\n                                    \"--v=5\",\n                                    \"--leader-election=true\"\n                                ],\n                                \"env\": [\n                                    {\n                                        \"name\": \"ADDRESS\",\n                                        \"value\": \"/var/lib/csi/sockets/pluginproxy/csi.sock\"\n                                    }\n                                ],\n                                \"resources\": {},\n                                \"volumeMounts\": [\n                                    {\n                                        \"name\": \"socket-dir\",\n                                        \"mountPath\": \"/var/lib/csi/sockets/pluginproxy/\"\n                                    }\n                                ],\n                                \"terminationMessagePath\": \"/dev/termination-log\",\n                                \"terminationMessagePolicy\": \"File\",\n                                \"imagePullPolicy\": \"IfNotPresent\"\n                            },\n                            {\n                                \"name\": \"csi-snapshotter\",\n                                \"image\": \"k8s.gcr.io/sig-storage/csi-snapshotter:v4.0.0\",\n                                \"args\": [\n                                    \"--csi-address=$(ADDRESS)\",\n                                    \"--leader-election=true\"\n                                ],\n                                \"env\": [\n                                    {\n                                        \"name\": \"ADDRESS\",\n                                        \"value\": \"/var/lib/csi/sockets/pluginproxy/csi.sock\"\n                                    }\n                                ],\n                                \"resources\": {},\n                                \"volumeMounts\": [\n                                    {\n                                        \"name\": \"socket-dir\",\n                                        \"mountPath\": \"/var/lib/csi/sockets/pluginproxy/\"\n                                    }\n                                ],\n                                \"terminationMessagePath\": \"/dev/termination-log\",\n                                \"terminationMessagePolicy\": \"File\",\n                                \"imagePullPolicy\": \"IfNotPresent\"\n                            },\n                            {\n                                \"name\": \"csi-resizer\",\n                                \"image\": \"k8s.gcr.io/sig-storage/csi-resizer:v1.1.0\",\n                                \"args\": [\n                                    \"--csi-address=$(ADDRESS)\",\n                                    \"--v=5\"\n                                ],\n                                \"env\": [\n                                    {\n                                        \"name\": \"ADDRESS\",\n                                        \"value\": \"/var/lib/csi/sockets/pluginproxy/csi.sock\"\n                                    }\n                                ],\n                                \"resources\": {},\n                                \"volumeMounts\": [\n                                    {\n                                        \"name\": \"socket-dir\",\n                                        \"mountPath\": \"/var/lib/csi/sockets/pluginproxy/\"\n                                    }\n                                ],\n                                \"terminationMessagePath\": \"/dev/termination-log\",\n                                \"terminationMessagePolicy\": \"File\",\n                                \"imagePullPolicy\": \"Always\"\n                            },\n                            {\n                                \"name\": \"liveness-probe\",\n                                \"image\": \"k8s.gcr.io/sig-storage/livenessprobe:v2.2.0\",\n                                \"args\": [\n                                    \"--csi-address=/csi/csi.sock\"\n                                ],\n                                \"resources\": {},\n                                \"volumeMounts\": [\n                                    {\n                                        \"name\": \"socket-dir\",\n                                        \"mountPath\": \"/csi\"\n                                    }\n                                ],\n                                \"terminationMessagePath\": \"/dev/termination-log\",\n                                \"terminationMessagePolicy\": \"File\",\n                                \"imagePullPolicy\": \"IfNotPresent\"\n                            }\n                        ],\n                        \"restartPolicy\": \"Always\",\n                        \"terminationGracePeriodSeconds\": 30,\n                        \"dnsPolicy\": \"ClusterFirst\",\n                        \"nodeSelector\": {\n                            \"kubernetes.io/os\": \"linux\",\n                            \"node-role.kubernetes.io/master\": \"\"\n                        },\n                        \"serviceAccountName\": \"ebs-csi-controller-sa\",\n                        \"serviceAccount\": \"ebs-csi-controller-sa\",\n                        \"securityContext\": {},\n                        \"schedulerName\": \"default-scheduler\",\n                        \"tolerations\": [\n                            {\n                                \"operator\": \"Exists\"\n                            }\n                        ],\n                        \"priorityClassName\": \"system-cluster-critical\"\n                    }\n                },\n                \"strategy\": {\n                    \"type\": \"RollingUpdate\",\n                    \"rollingUpdate\": {\n                        \"maxUnavailable\": \"25%\",\n                        \"maxSurge\": \"25%\"\n                    }\n                },\n                \"revisionHistoryLimit\": 10,\n                \"progressDeadlineSeconds\": 600\n            },\n            \"status\": {\n                \"observedGeneration\": 1,\n                \"replicas\": 2,\n                \"updatedReplicas\": 2,\n                \"readyReplicas\": 2,\n                \"availableReplicas\": 2,\n                \"conditions\": [\n                    {\n                        \"type\": \"Available\",\n                        \"status\": \"True\",\n                        \"lastUpdateTime\": \"2021-05-09T18:04:34Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:04:34Z\",\n                        \"reason\": \"MinimumReplicasAvailable\",\n                        \"message\": \"Deployment has minimum availability.\"\n                    },\n                    {\n                        \"type\": \"Progressing\",\n                        \"status\": \"True\",\n                        \"lastUpdateTime\": \"2021-05-09T18:04:34Z\",\n                        \"lastTransitionTime\": \"2021-05-09T18:03:21Z\",\n                        \"reason\": \"NewReplicaSetAvailable\",\n                        \"message\": \"ReplicaSet \\\"ebs-csi-controller-79fb985c8d\\\" has successfully progressed.\"\n                    }\n                ]\n            }\n        }\n    ]\n}\n{\n    \"kind\": \"ReplicaSetList\",\n    \"apiVersion\": \"apps/v1\",\n    \"metadata\": {\n        \"resourceVersion\": \"12366\"\n    },\n    \"items\": [\n        {\n            \"metadata\": {\n                \"name\": \"coredns-66cbffdd77\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"61f4e213-1b0d-4447-b2a5-824feaaa3472\",\n                \"resourceVersion\": \"849\",\n                \"generation\": 2,\n                \"creationTimestamp\": \"2021-05-09T18:03:21Z\",\n                \"labels\": {\n                    \"k8s-app\": \"kube-dns\",\n                    \"pod-template-hash\": \"66cbffdd77\"\n                },\n                \"annotations\": {\n                    \"deployment.kubernetes.io/desired-replicas\": \"2\",\n                    \"deployment.kubernetes.io/max-replicas\": \"3\",\n                    \"deployment.kubernetes.io/revision\": \"1\"\n                },\n                \"ownerReferences\": [\n                    {\n                        \"apiVersion\": \"apps/v1\",\n                        \"kind\": \"Deployment\",\n                        \"name\": \"coredns\",\n                        \"uid\": \"a61b575f-ac1b-42c7-a8b1-37725ddf02ff\",\n                        \"controller\": true,\n                        \"blockOwnerDeletion\": true\n                    }\n                ]\n            },\n            \"spec\": {\n                \"replicas\": 2,\n                \"selector\": {\n                    \"matchLabels\": {\n                        \"k8s-app\": \"kube-dns\",\n                        \"pod-template-hash\": \"66cbffdd77\"\n                    }\n                },\n                \"template\": {\n                    \"metadata\": {\n                        \"creationTimestamp\": null,\n                        \"labels\": {\n                            \"k8s-app\": \"kube-dns\",\n                            \"pod-template-hash\": \"66cbffdd77\"\n                        }\n                    },\n                    \"spec\": {\n                        \"volumes\": [\n                            {\n                                \"name\": \"config-volume\",\n                                \"configMap\": {\n                                    \"name\": \"coredns\",\n                                    \"items\": [\n                                        {\n                                            \"key\": \"Corefile\",\n                                            \"path\": \"Corefile\"\n                                        }\n                                    ],\n                                    \"defaultMode\": 420\n                                }\n                            }\n                        ],\n                        \"containers\": [\n                            {\n                                \"name\": \"coredns\",\n                                \"image\": \"k8s.gcr.io/coredns:1.7.0\",\n                                \"args\": [\n                                    \"-conf\",\n                                    \"/etc/coredns/Corefile\"\n                                ],\n                                \"ports\": [\n                                    {\n                                        \"name\": \"dns\",\n                                        \"containerPort\": 53,\n                                        \"protocol\": \"UDP\"\n                                    },\n                                    {\n                                        \"name\": \"dns-tcp\",\n                                        \"containerPort\": 53,\n                                        \"protocol\": \"TCP\"\n                                    },\n                                    {\n                                        \"name\": \"metrics\",\n                                        \"containerPort\": 9153,\n                                        \"protocol\": \"TCP\"\n                                    }\n                                ],\n                                \"resources\": {\n                                    \"limits\": {\n                                        \"memory\": \"170Mi\"\n                                    },\n                                    \"requests\": {\n                                        \"cpu\": \"100m\",\n                                        \"memory\": \"70Mi\"\n                                    }\n                                },\n                                \"volumeMounts\": [\n                                    {\n                                        \"name\": \"config-volume\",\n                                        \"readOnly\": true,\n                                        \"mountPath\": \"/etc/coredns\"\n                                    }\n                                ],\n                                \"livenessProbe\": {\n                                    \"httpGet\": {\n                                        \"path\": \"/health\",\n                                        \"port\": 8080,\n                                        \"scheme\": \"HTTP\"\n                                    },\n                                    \"initialDelaySeconds\": 60,\n                                    \"timeoutSeconds\": 5,\n                                    \"periodSeconds\": 10,\n                                    \"successThreshold\": 1,\n                                    \"failureThreshold\": 5\n                                },\n                                \"readinessProbe\": {\n                                    \"httpGet\": {\n                                        \"path\": \"/health\",\n                                        \"port\": 8080,\n                                        \"scheme\": \"HTTP\"\n                                    },\n                                    \"timeoutSeconds\": 1,\n                                    \"periodSeconds\": 10,\n                                    \"successThreshold\": 1,\n                                    \"failureThreshold\": 3\n                                },\n                                \"terminationMessagePath\": \"/dev/termination-log\",\n                                \"terminationMessagePolicy\": \"File\",\n                                \"imagePullPolicy\": \"IfNotPresent\",\n                                \"securityContext\": {\n                                    \"capabilities\": {\n                                        \"add\": [\n                                            \"NET_BIND_SERVICE\"\n                                        ],\n                                        \"drop\": [\n                                            \"all\"\n                                        ]\n                                    },\n                                    \"readOnlyRootFilesystem\": true,\n                                    \"allowPrivilegeEscalation\": false\n                                }\n                            }\n                        ],\n                        \"restartPolicy\": \"Always\",\n                        \"terminationGracePeriodSeconds\": 30,\n                        \"dnsPolicy\": \"Default\",\n                        \"nodeSelector\": {\n                            \"beta.kubernetes.io/os\": \"linux\"\n                        },\n                        \"serviceAccountName\": \"coredns\",\n                        \"serviceAccount\": \"coredns\",\n                        \"securityContext\": {},\n                        \"affinity\": {\n                            \"podAntiAffinity\": {\n                                \"preferredDuringSchedulingIgnoredDuringExecution\": [\n                                    {\n                                        \"weight\": 1,\n                                        \"podAffinityTerm\": {\n                                            \"labelSelector\": {\n                                                \"matchExpressions\": [\n                                                    {\n                                                        \"key\": \"k8s-app\",\n                                                        \"operator\": \"In\",\n                                                        \"values\": [\n                                                            \"kube-dns\"\n                                                        ]\n                                                    }\n                                                ]\n                                            },\n                                            \"topologyKey\": \"kubernetes.io/hostname\"\n                                        }\n                                    }\n                                ]\n                            }\n                        },\n                        \"schedulerName\": \"default-scheduler\",\n                        \"tolerations\": [\n                            {\n                                \"key\": \"CriticalAddonsOnly\",\n                                \"operator\": \"Exists\"\n                            }\n                        ],\n                        \"priorityClassName\": \"system-cluster-critical\"\n                    }\n                }\n            },\n            \"status\": {\n                \"replicas\": 2,\n                \"fullyLabeledReplicas\": 2,\n                \"readyReplicas\": 2,\n                \"availableReplicas\": 2,\n                \"observedGeneration\": 2\n            }\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-autoscaler-6f594f4c58\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"1599663f-9877-4ad4-9198-cd85df0bdc07\",\n                \"resourceVersion\": \"777\",\n                \"generation\": 1,\n                \"creationTimestamp\": \"2021-05-09T18:03:21Z\",\n                \"labels\": {\n                    \"k8s-app\": \"coredns-autoscaler\",\n                    \"pod-template-hash\": \"6f594f4c58\"\n                },\n                \"annotations\": {\n                    \"deployment.kubernetes.io/desired-replicas\": \"1\",\n                    \"deployment.kubernetes.io/max-replicas\": \"2\",\n                    \"deployment.kubernetes.io/revision\": \"1\"\n                },\n                \"ownerReferences\": [\n                    {\n                        \"apiVersion\": \"apps/v1\",\n                        \"kind\": \"Deployment\",\n                        \"name\": \"coredns-autoscaler\",\n                        \"uid\": \"67ce1e3d-2f80-473c-be38-e143ca4b7fbc\",\n                        \"controller\": true,\n                        \"blockOwnerDeletion\": true\n                    }\n                ]\n            },\n            \"spec\": {\n                \"replicas\": 1,\n                \"selector\": {\n                    \"matchLabels\": {\n                        \"k8s-app\": \"coredns-autoscaler\",\n                        \"pod-template-hash\": \"6f594f4c58\"\n                    }\n                },\n                \"template\": {\n                    \"metadata\": {\n                        \"creationTimestamp\": null,\n                        \"labels\": {\n                            \"k8s-app\": \"coredns-autoscaler\",\n                            \"pod-template-hash\": \"6f594f4c58\"\n                        },\n                        \"annotations\": {\n                            \"scheduler.alpha.kubernetes.io/critical-pod\": \"\"\n                        }\n                    },\n                    \"spec\": {\n                        \"containers\": [\n                            {\n                                \"name\": \"autoscaler\",\n                                \"image\": \"k8s.gcr.io/cpa/cluster-proportional-autoscaler:1.8.3\",\n                                \"command\": [\n                                    \"/cluster-proportional-autoscaler\",\n                                    \"--namespace=kube-system\",\n                                    \"--configmap=coredns-autoscaler\",\n                                    \"--target=Deployment/coredns\",\n                                    \"--default-params={\\\"linear\\\":{\\\"coresPerReplica\\\":256,\\\"nodesPerReplica\\\":16,\\\"preventSinglePointFailure\\\":true}}\",\n                                    \"--logtostderr=true\",\n                                    \"--v=2\"\n                                ],\n                                \"resources\": {\n                                    \"requests\": {\n                                        \"cpu\": \"20m\",\n                                        \"memory\": \"10Mi\"\n                                    }\n                                },\n                                \"terminationMessagePath\": \"/dev/termination-log\",\n                                \"terminationMessagePolicy\": \"File\",\n                                \"imagePullPolicy\": \"IfNotPresent\"\n                            }\n                        ],\n                        \"restartPolicy\": \"Always\",\n                        \"terminationGracePeriodSeconds\": 30,\n                        \"dnsPolicy\": \"ClusterFirst\",\n                        \"serviceAccountName\": \"coredns-autoscaler\",\n                        \"serviceAccount\": \"coredns-autoscaler\",\n                        \"securityContext\": {},\n                        \"schedulerName\": \"default-scheduler\",\n                        \"tolerations\": [\n                            {\n                                \"key\": \"CriticalAddonsOnly\",\n                                \"operator\": \"Exists\"\n                            }\n                        ],\n                        \"priorityClassName\": \"system-cluster-critical\"\n                    }\n                }\n            },\n            \"status\": {\n                \"replicas\": 1,\n                \"fullyLabeledReplicas\": 1,\n                \"readyReplicas\": 1,\n                \"availableReplicas\": 1,\n                \"observedGeneration\": 1\n            }\n        },\n        {\n            \"metadata\": {\n                \"name\": \"dns-controller-5f98b58844\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"bf1b4cc8-6542-40f7-a008-0973a92fc819\",\n                \"resourceVersion\": \"489\",\n                \"generation\": 1,\n                \"creationTimestamp\": \"2021-05-09T18:03:21Z\",\n                \"labels\": {\n                    \"k8s-addon\": \"dns-controller.addons.k8s.io\",\n                    \"k8s-app\": \"dns-controller\",\n                    \"pod-template-hash\": \"5f98b58844\",\n                    \"version\": \"v1.22.0-alpha.1\"\n                },\n                \"annotations\": {\n                    \"deployment.kubernetes.io/desired-replicas\": \"1\",\n                    \"deployment.kubernetes.io/max-replicas\": \"1\",\n                    \"deployment.kubernetes.io/revision\": \"1\"\n                },\n                \"ownerReferences\": [\n                    {\n                        \"apiVersion\": \"apps/v1\",\n                        \"kind\": \"Deployment\",\n                        \"name\": \"dns-controller\",\n                        \"uid\": \"77ad756f-5d8d-4aad-b4c5-f1fbaa77b0c6\",\n                        \"controller\": true,\n                        \"blockOwnerDeletion\": true\n                    }\n                ]\n            },\n            \"spec\": {\n                \"replicas\": 1,\n                \"selector\": {\n                    \"matchLabels\": {\n                        \"k8s-app\": \"dns-controller\",\n                        \"pod-template-hash\": \"5f98b58844\"\n                    }\n                },\n                \"template\": {\n                    \"metadata\": {\n                        \"creationTimestamp\": null,\n                        \"labels\": {\n                            \"k8s-addon\": \"dns-controller.addons.k8s.io\",\n                            \"k8s-app\": \"dns-controller\",\n                            \"pod-template-hash\": \"5f98b58844\",\n                            \"version\": \"v1.22.0-alpha.1\"\n                        },\n                        \"annotations\": {\n                            \"scheduler.alpha.kubernetes.io/critical-pod\": \"\"\n                        }\n                    },\n                    \"spec\": {\n                        \"containers\": [\n                            {\n                                \"name\": \"dns-controller\",\n                                \"image\": \"k8s.gcr.io/kops/dns-controller:1.22.0-alpha.1\",\n                                \"command\": [\n                                    \"/dns-controller\",\n                                    \"--watch-ingress=false\",\n                                    \"--dns=aws-route53\",\n                                    \"--zone=*/ZEMLNXIIWQ0RV\",\n                                    \"--zone=*/*\",\n                                    \"-v=2\"\n                                ],\n                                \"env\": [\n                                    {\n                                        \"name\": \"KUBERNETES_SERVICE_HOST\",\n                                        \"value\": \"127.0.0.1\"\n                                    }\n                                ],\n                                \"resources\": {\n                                    \"requests\": {\n                                        \"cpu\": \"50m\",\n                                        \"memory\": \"50Mi\"\n                                    }\n                                },\n                                \"terminationMessagePath\": \"/dev/termination-log\",\n                                \"terminationMessagePolicy\": \"File\",\n                                \"imagePullPolicy\": \"IfNotPresent\",\n                                \"securityContext\": {\n                                    \"runAsNonRoot\": true\n                                }\n                            }\n                        ],\n                        \"restartPolicy\": \"Always\",\n                        \"terminationGracePeriodSeconds\": 30,\n                        \"dnsPolicy\": \"Default\",\n                        \"nodeSelector\": {\n                            \"node-role.kubernetes.io/master\": \"\"\n                        },\n                        \"serviceAccountName\": \"dns-controller\",\n                        \"serviceAccount\": \"dns-controller\",\n                        \"hostNetwork\": true,\n                        \"securityContext\": {},\n                        \"schedulerName\": \"default-scheduler\",\n                        \"tolerations\": [\n                            {\n                                \"operator\": \"Exists\"\n                            }\n                        ],\n                        \"priorityClassName\": \"system-cluster-critical\"\n                    }\n                }\n            },\n            \"status\": {\n                \"replicas\": 1,\n                \"fullyLabeledReplicas\": 1,\n                \"readyReplicas\": 1,\n                \"availableReplicas\": 1,\n                \"observedGeneration\": 1\n            }\n        },\n        {\n            \"metadata\": {\n                \"name\": \"ebs-csi-controller-79fb985c8d\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"2f9a36f4-6290-46f3-a081-f903f741a6f4\",\n                \"resourceVersion\": \"626\",\n                \"generation\": 1,\n                \"creationTimestamp\": \"2021-05-09T18:03:21Z\",\n                \"labels\": {\n                    \"app\": \"ebs-csi-controller\",\n                    \"app.kubernetes.io/instance\": \"aws-ebs-csi-driver\",\n                    \"app.kubernetes.io/name\": \"aws-ebs-csi-driver\",\n                    \"app.kubernetes.io/version\": \"v1.0.0\",\n                    \"pod-template-hash\": \"79fb985c8d\"\n                },\n                \"annotations\": {\n                    \"deployment.kubernetes.io/desired-replicas\": \"2\",\n                    \"deployment.kubernetes.io/max-replicas\": \"3\",\n                    \"deployment.kubernetes.io/revision\": \"1\"\n                },\n                \"ownerReferences\": [\n                    {\n                        \"apiVersion\": \"apps/v1\",\n                        \"kind\": \"Deployment\",\n                        \"name\": \"ebs-csi-controller\",\n                        \"uid\": \"6c145f46-f068-4e39-992e-003776a34b5e\",\n                        \"controller\": true,\n                        \"blockOwnerDeletion\": true\n                    }\n                ]\n            },\n            \"spec\": {\n                \"replicas\": 2,\n                \"selector\": {\n                    \"matchLabels\": {\n                        \"app\": \"ebs-csi-controller\",\n                        \"app.kubernetes.io/instance\": \"aws-ebs-csi-driver\",\n                        \"app.kubernetes.io/name\": \"aws-ebs-csi-driver\",\n                        \"pod-template-hash\": \"79fb985c8d\"\n                    }\n                },\n                \"template\": {\n                    \"metadata\": {\n                        \"creationTimestamp\": null,\n                        \"labels\": {\n                            \"app\": \"ebs-csi-controller\",\n                            \"app.kubernetes.io/instance\": \"aws-ebs-csi-driver\",\n                            \"app.kubernetes.io/name\": \"aws-ebs-csi-driver\",\n                            \"app.kubernetes.io/version\": \"v1.0.0\",\n                            \"pod-template-hash\": \"79fb985c8d\"\n                        }\n                    },\n                    \"spec\": {\n                        \"volumes\": [\n                            {\n                                \"name\": \"socket-dir\",\n                                \"emptyDir\": {}\n                            }\n                        ],\n                        \"containers\": [\n                            {\n                                \"name\": \"ebs-plugin\",\n                                \"image\": \"k8s.gcr.io/provider-aws/aws-ebs-csi-driver:v1.0.0\",\n                                \"args\": [\n                                    \"controller\",\n                                    \"--endpoint=$(CSI_ENDPOINT)\",\n                                    \"--logtostderr\",\n                                    \"--k8s-tag-cluster-id=e2e-394a1565f9-8b358.test-cncf-aws.k8s.io\",\n                                    \"--extra-tags=KubernetesCluster=e2e-394a1565f9-8b358.test-cncf-aws.k8s.io\",\n                                    \"--v=5\"\n                                ],\n                                \"ports\": [\n                                    {\n                                        \"name\": \"healthz\",\n                                        \"containerPort\": 9808,\n                                        \"protocol\": \"TCP\"\n                                    }\n                                ],\n                                \"env\": [\n                                    {\n                                        \"name\": \"CSI_ENDPOINT\",\n                                        \"value\": \"unix:///var/lib/csi/sockets/pluginproxy/csi.sock\"\n                                    },\n                                    {\n                                        \"name\": \"AWS_ACCESS_KEY_ID\",\n                                        \"valueFrom\": {\n                                            \"secretKeyRef\": {\n                                                \"name\": \"aws-secret\",\n                                                \"key\": \"key_id\",\n                                                \"optional\": true\n                                            }\n                                        }\n                                    },\n                                    {\n                                        \"name\": \"AWS_SECRET_ACCESS_KEY\",\n                                        \"valueFrom\": {\n                                            \"secretKeyRef\": {\n                                                \"name\": \"aws-secret\",\n                                                \"key\": \"access_key\",\n                                                \"optional\": true\n                                            }\n                                        }\n                                    }\n                                ],\n                                \"resources\": {},\n                                \"volumeMounts\": [\n                                    {\n                                        \"name\": \"socket-dir\",\n                                        \"mountPath\": \"/var/lib/csi/sockets/pluginproxy/\"\n                                    }\n                                ],\n                                \"livenessProbe\": {\n                                    \"httpGet\": {\n                                        \"path\": \"/healthz\",\n                                        \"port\": \"healthz\",\n                                        \"scheme\": \"HTTP\"\n                                    },\n                                    \"initialDelaySeconds\": 10,\n                                    \"timeoutSeconds\": 3,\n                                    \"periodSeconds\": 10,\n                                    \"successThreshold\": 1,\n                                    \"failureThreshold\": 5\n                                },\n                                \"terminationMessagePath\": \"/dev/termination-log\",\n                                \"terminationMessagePolicy\": \"File\",\n                                \"imagePullPolicy\": \"IfNotPresent\"\n                            },\n                            {\n                                \"name\": \"csi-provisioner\",\n                                \"image\": \"k8s.gcr.io/sig-storage/csi-provisioner:v2.2.0\",\n                                \"args\": [\n                                    \"--csi-address=$(ADDRESS)\",\n                                    \"--v=5\",\n                                    \"--feature-gates=Topology=true\",\n                                    \"--leader-election=true\",\n                                    \"--extra-create-metadata=true\"\n                                ],\n                                \"env\": [\n                                    {\n                                        \"name\": \"ADDRESS\",\n                                        \"value\": \"/var/lib/csi/sockets/pluginproxy/csi.sock\"\n                                    }\n                                ],\n                                \"resources\": {},\n                                \"volumeMounts\": [\n                                    {\n                                        \"name\": \"socket-dir\",\n                                        \"mountPath\": \"/var/lib/csi/sockets/pluginproxy/\"\n                                    }\n                                ],\n                                \"terminationMessagePath\": \"/dev/termination-log\",\n                                \"terminationMessagePolicy\": \"File\",\n                                \"imagePullPolicy\": \"IfNotPresent\"\n                            },\n                            {\n                                \"name\": \"csi-attacher\",\n                                \"image\": \"k8s.gcr.io/sig-storage/csi-attacher:v3.2.0\",\n                                \"args\": [\n                                    \"--csi-address=$(ADDRESS)\",\n                                    \"--v=5\",\n                                    \"--leader-election=true\"\n                                ],\n                                \"env\": [\n                                    {\n                                        \"name\": \"ADDRESS\",\n                                        \"value\": \"/var/lib/csi/sockets/pluginproxy/csi.sock\"\n                                    }\n                                ],\n                                \"resources\": {},\n                                \"volumeMounts\": [\n                                    {\n                                        \"name\": \"socket-dir\",\n                                        \"mountPath\": \"/var/lib/csi/sockets/pluginproxy/\"\n                                    }\n                                ],\n                                \"terminationMessagePath\": \"/dev/termination-log\",\n                                \"terminationMessagePolicy\": \"File\",\n                                \"imagePullPolicy\": \"IfNotPresent\"\n                            },\n                            {\n                                \"name\": \"csi-snapshotter\",\n                                \"image\": \"k8s.gcr.io/sig-storage/csi-snapshotter:v4.0.0\",\n                                \"args\": [\n                                    \"--csi-address=$(ADDRESS)\",\n                                    \"--leader-election=true\"\n                                ],\n                                \"env\": [\n                                    {\n                                        \"name\": \"ADDRESS\",\n                                        \"value\": \"/var/lib/csi/sockets/pluginproxy/csi.sock\"\n                                    }\n                                ],\n                                \"resources\": {},\n                                \"volumeMounts\": [\n                                    {\n                                        \"name\": \"socket-dir\",\n                                        \"mountPath\": \"/var/lib/csi/sockets/pluginproxy/\"\n                                    }\n                                ],\n                                \"terminationMessagePath\": \"/dev/termination-log\",\n                                \"terminationMessagePolicy\": \"File\",\n                                \"imagePullPolicy\": \"IfNotPresent\"\n                            },\n                            {\n                                \"name\": \"csi-resizer\",\n                                \"image\": \"k8s.gcr.io/sig-storage/csi-resizer:v1.1.0\",\n                                \"args\": [\n                                    \"--csi-address=$(ADDRESS)\",\n                                    \"--v=5\"\n                                ],\n                                \"env\": [\n                                    {\n                                        \"name\": \"ADDRESS\",\n                                        \"value\": \"/var/lib/csi/sockets/pluginproxy/csi.sock\"\n                                    }\n                                ],\n                                \"resources\": {},\n                                \"volumeMounts\": [\n                                    {\n                                        \"name\": \"socket-dir\",\n                                        \"mountPath\": \"/var/lib/csi/sockets/pluginproxy/\"\n                                    }\n                                ],\n                                \"terminationMessagePath\": \"/dev/termination-log\",\n                                \"terminationMessagePolicy\": \"File\",\n                                \"imagePullPolicy\": \"Always\"\n                            },\n                            {\n                                \"name\": \"liveness-probe\",\n                                \"image\": \"k8s.gcr.io/sig-storage/livenessprobe:v2.2.0\",\n                                \"args\": [\n                                    \"--csi-address=/csi/csi.sock\"\n                                ],\n                                \"resources\": {},\n                                \"volumeMounts\": [\n                                    {\n                                        \"name\": \"socket-dir\",\n                                        \"mountPath\": \"/csi\"\n                                    }\n                                ],\n                                \"terminationMessagePath\": \"/dev/termination-log\",\n                                \"terminationMessagePolicy\": \"File\",\n                                \"imagePullPolicy\": \"IfNotPresent\"\n                            }\n                        ],\n                        \"restartPolicy\": \"Always\",\n                        \"terminationGracePeriodSeconds\": 30,\n                        \"dnsPolicy\": \"ClusterFirst\",\n                        \"nodeSelector\": {\n                            \"kubernetes.io/os\": \"linux\",\n                            \"node-role.kubernetes.io/master\": \"\"\n                        },\n                        \"serviceAccountName\": \"ebs-csi-controller-sa\",\n                        \"serviceAccount\": \"ebs-csi-controller-sa\",\n                        \"securityContext\": {},\n                        \"schedulerName\": \"default-scheduler\",\n                        \"tolerations\": [\n                            {\n                                \"operator\": \"Exists\"\n                            }\n                        ],\n                        \"priorityClassName\": \"system-cluster-critical\"\n                    }\n                }\n            },\n            \"status\": {\n                \"replicas\": 2,\n                \"fullyLabeledReplicas\": 2,\n                \"readyReplicas\": 2,\n                \"availableReplicas\": 2,\n                \"observedGeneration\": 1\n            }\n        }\n    ]\n}\n{\n    \"kind\": \"PodList\",\n    \"apiVersion\": \"v1\",\n    \"metadata\": {\n        \"resourceVersion\": \"12373\"\n    },\n    \"items\": [\n        {\n            \"metadata\": {\n                \"name\": \"coredns-66cbffdd77-njn45\",\n                \"generateName\": \"coredns-66cbffdd77-\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"8ee23a12-77c0-4948-aafc-4e5692ab1250\",\n                \"resourceVersion\": \"843\",\n                \"creationTimestamp\": \"2021-05-09T18:04:59Z\",\n                \"labels\": {\n                    \"k8s-app\": \"kube-dns\",\n                    \"pod-template-hash\": \"66cbffdd77\"\n                },\n                \"ownerReferences\": [\n                    {\n                        \"apiVersion\": \"apps/v1\",\n                        \"kind\": \"ReplicaSet\",\n                        \"name\": \"coredns-66cbffdd77\",\n                        \"uid\": \"61f4e213-1b0d-4447-b2a5-824feaaa3472\",\n                        \"controller\": true,\n                        \"blockOwnerDeletion\": true\n                    }\n                ]\n            },\n            \"spec\": {\n                \"volumes\": [\n                    {\n                        \"name\": \"config-volume\",\n                        \"configMap\": {\n                            \"name\": \"coredns\",\n                            \"items\": [\n                                {\n                                    \"key\": \"Corefile\",\n                                    \"path\": \"Corefile\"\n                                }\n                            ],\n                            \"defaultMode\": 420\n                        }\n                    },\n                    {\n                        \"name\": \"kube-api-access-ls7xp\",\n                        \"projected\": {\n                            \"sources\": [\n                                {\n                                    \"serviceAccountToken\": {\n                                        \"expirationSeconds\": 3607,\n                                        \"path\": \"token\"\n                                    }\n                                },\n                                {\n                                    \"configMap\": {\n                                        \"name\": \"kube-root-ca.crt\",\n                                        \"items\": [\n                                            {\n                                                \"key\": \"ca.crt\",\n                                                \"path\": \"ca.crt\"\n                                            }\n                                        ]\n                                    }\n                                },\n                                {\n                                    \"downwardAPI\": {\n                                        \"items\": [\n                                            {\n                                                \"path\": \"namespace\",\n                                                \"fieldRef\": {\n                                                    \"apiVersion\": \"v1\",\n                                                    \"fieldPath\": \"metadata.namespace\"\n                                                }\n                                            }\n                                        ]\n                                    }\n                                }\n                            ],\n                            \"defaultMode\": 420\n                        }\n                    }\n                ],\n                \"containers\": [\n                    {\n                        \"name\": \"coredns\",\n                        \"image\": \"k8s.gcr.io/coredns:1.7.0\",\n                        \"args\": [\n                            \"-conf\",\n                            \"/etc/coredns/Corefile\"\n                        ],\n                        \"ports\": [\n                            {\n                                \"name\": \"dns\",\n                                \"containerPort\": 53,\n                                \"protocol\": \"UDP\"\n                            },\n                            {\n                                \"name\": \"dns-tcp\",\n                                \"containerPort\": 53,\n                                \"protocol\": \"TCP\"\n                            },\n                            {\n                                \"name\": \"metrics\",\n                                \"containerPort\": 9153,\n                                \"protocol\": \"TCP\"\n                            }\n                        ],\n                        \"resources\": {\n                            \"limits\": {\n                                \"memory\": \"170Mi\"\n                            },\n                            \"requests\": {\n                                \"cpu\": \"100m\",\n                                \"memory\": \"70Mi\"\n                            }\n                        },\n                        \"volumeMounts\": [\n                            {\n                                \"name\": \"config-volume\",\n                                \"readOnly\": true,\n                                \"mountPath\": \"/etc/coredns\"\n                            },\n                            {\n                                \"name\": \"kube-api-access-ls7xp\",\n                                \"readOnly\": true,\n                                \"mountPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\"\n                            }\n                        ],\n                        \"livenessProbe\": {\n                            \"httpGet\": {\n                                \"path\": \"/health\",\n                                \"port\": 8080,\n                                \"scheme\": \"HTTP\"\n                            },\n                            \"initialDelaySeconds\": 60,\n                            \"timeoutSeconds\": 5,\n                            \"periodSeconds\": 10,\n                            \"successThreshold\": 1,\n                            \"failureThreshold\": 5\n                        },\n                        \"readinessProbe\": {\n                            \"httpGet\": {\n                                \"path\": \"/health\",\n                                \"port\": 8080,\n                                \"scheme\": \"HTTP\"\n                            },\n                            \"timeoutSeconds\": 1,\n                            \"periodSeconds\": 10,\n                            \"successThreshold\": 1,\n                            \"failureThreshold\": 3\n                        },\n                        \"terminationMessagePath\": \"/dev/termination-log\",\n                        \"terminationMessagePolicy\": \"File\",\n                        \"imagePullPolicy\": \"IfNotPresent\",\n                        \"securityContext\": {\n                            \"capabilities\": {\n                                \"add\": [\n                                    \"NET_BIND_SERVICE\"\n                                ],\n                                \"drop\": [\n                                    \"all\"\n                                ]\n                            },\n                            \"readOnlyRootFilesystem\": true,\n                            \"allowPrivilegeEscalation\": false\n                        }\n                    }\n                ],\n                \"restartPolicy\": \"Always\",\n                \"terminationGracePeriodSeconds\": 30,\n                \"dnsPolicy\": \"Default\",\n                \"nodeSelector\": {\n                    \"beta.kubernetes.io/os\": \"linux\"\n                },\n                \"serviceAccountName\": \"coredns\",\n                \"serviceAccount\": \"coredns\",\n                \"nodeName\": \"ip-172-20-57-119.ap-south-1.compute.internal\",\n                \"securityContext\": {},\n                \"affinity\": {\n                    \"podAntiAffinity\": {\n                        \"preferredDuringSchedulingIgnoredDuringExecution\": [\n                            {\n                                \"weight\": 1,\n                                \"podAffinityTerm\": {\n                                    \"labelSelector\": {\n                                        \"matchExpressions\": [\n                                            {\n                                                \"key\": \"k8s-app\",\n                                                \"operator\": \"In\",\n                                                \"values\": [\n                                                    \"kube-dns\"\n                                                ]\n                                            }\n                                        ]\n                                    },\n                                    \"topologyKey\": \"kubernetes.io/hostname\"\n                                }\n                            }\n                        ]\n                    }\n                },\n                \"schedulerName\": \"default-scheduler\",\n                \"tolerations\": [\n                    {\n                        \"key\": \"CriticalAddonsOnly\",\n                        \"operator\": \"Exists\"\n                    },\n                    {\n                        \"key\": \"node.kubernetes.io/not-ready\",\n                        \"operator\": \"Exists\",\n                        \"effect\": \"NoExecute\",\n                        \"tolerationSeconds\": 300\n                    },\n                    {\n                        \"key\": \"node.kubernetes.io/unreachable\",\n                        \"operator\": \"Exists\",\n                        \"effect\": \"NoExecute\",\n                        \"tolerationSeconds\": 300\n                    }\n                ],\n                \"priorityClassName\": \"system-cluster-critical\",\n                \"priority\": 2000000000,\n                \"enableServiceLinks\": true,\n                \"preemptionPolicy\": \"PreemptLowerPriority\"\n            },\n            \"status\": {\n                \"phase\": \"Running\",\n                \"conditions\": [\n                    {\n                        \"type\": \"Initialized\",\n                        \"status\": \"True\",\n                        \"lastProbeTime\": null,\n                        \"lastTransitionTime\": \"2021-05-09T18:04:59Z\"\n                    },\n                    {\n                        \"type\": \"Ready\",\n                        \"status\": \"True\",\n                        \"lastProbeTime\": null,\n                        \"lastTransitionTime\": \"2021-05-09T18:05:09Z\"\n                    },\n                    {\n                        \"type\": \"ContainersReady\",\n                        \"status\": \"True\",\n                        \"lastProbeTime\": null,\n                        \"lastTransitionTime\": \"2021-05-09T18:05:09Z\"\n                    },\n                    {\n                        \"type\": \"PodScheduled\",\n                        \"status\": \"True\",\n                        \"lastProbeTime\": null,\n                        \"lastTransitionTime\": \"2021-05-09T18:04:59Z\"\n                    }\n                ],\n                \"hostIP\": \"172.20.57.119\",\n                \"podIP\": \"100.96.4.2\",\n                \"podIPs\": [\n                    {\n                        \"ip\": \"100.96.4.2\"\n                    }\n                ],\n                \"startTime\": \"2021-05-09T18:04:59Z\",\n                \"containerStatuses\": [\n                    {\n                        \"name\": \"coredns\",\n                        \"state\": {\n                            \"running\": {\n                                \"startedAt\": \"2021-05-09T18:05:08Z\"\n                            }\n                        },\n                        \"lastState\": {},\n                        \"ready\": true,\n                        \"restartCount\": 0,\n                        \"image\": \"k8s.gcr.io/coredns:1.7.0\",\n                        \"imageID\": \"docker-pullable://k8s.gcr.io/coredns@sha256:73ca82b4ce829766d4f1f10947c3a338888f876fbed0540dc849c89ff256e90c\",\n                        \"containerID\": \"docker://0307c46f405d56acaedc063ccc7a7baada52e5b645612c1bd21d5b5c7de5b675\",\n                        \"started\": true\n                    }\n                ],\n                \"qosClass\": \"Burstable\"\n            }\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-66cbffdd77-zkthw\",\n                \"generateName\": \"coredns-66cbffdd77-\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"9f572125-40d1-4e2f-9bd9-813500fbe120\",\n                \"resourceVersion\": \"798\",\n                \"creationTimestamp\": \"2021-05-09T18:03:22Z\",\n                \"labels\": {\n                    \"k8s-app\": \"kube-dns\",\n                    \"pod-template-hash\": \"66cbffdd77\"\n                },\n                \"ownerReferences\": [\n                    {\n                        \"apiVersion\": \"apps/v1\",\n                        \"kind\": \"ReplicaSet\",\n                        \"name\": \"coredns-66cbffdd77\",\n                        \"uid\": \"61f4e213-1b0d-4447-b2a5-824feaaa3472\",\n                        \"controller\": true,\n                        \"blockOwnerDeletion\": true\n                    }\n                ]\n            },\n            \"spec\": {\n                \"volumes\": [\n                    {\n                        \"name\": \"config-volume\",\n                        \"configMap\": {\n                            \"name\": \"coredns\",\n                            \"items\": [\n                                {\n                                    \"key\": \"Corefile\",\n                                    \"path\": \"Corefile\"\n                                }\n                            ],\n                            \"defaultMode\": 420\n                        }\n                    },\n                    {\n                        \"name\": \"kube-api-access-l6klk\",\n                        \"projected\": {\n                            \"sources\": [\n                                {\n                                    \"serviceAccountToken\": {\n                                        \"expirationSeconds\": 3607,\n                                        \"path\": \"token\"\n                                    }\n                                },\n                                {\n                                    \"configMap\": {\n                                        \"name\": \"kube-root-ca.crt\",\n                                        \"items\": [\n                                            {\n                                                \"key\": \"ca.crt\",\n                                                \"path\": \"ca.crt\"\n                                            }\n                                        ]\n                                    }\n                                },\n                                {\n                                    \"downwardAPI\": {\n                                        \"items\": [\n                                            {\n                                                \"path\": \"namespace\",\n                                                \"fieldRef\": {\n                                                    \"apiVersion\": \"v1\",\n                                                    \"fieldPath\": \"metadata.namespace\"\n                                                }\n                                            }\n                                        ]\n                                    }\n                                }\n                            ],\n                            \"defaultMode\": 420\n                        }\n                    }\n                ],\n                \"containers\": [\n                    {\n                        \"name\": \"coredns\",\n                        \"image\": \"k8s.gcr.io/coredns:1.7.0\",\n                        \"args\": [\n                            \"-conf\",\n                            \"/etc/coredns/Corefile\"\n                        ],\n                        \"ports\": [\n                            {\n                                \"name\": \"dns\",\n                                \"containerPort\": 53,\n                                \"protocol\": \"UDP\"\n                            },\n                            {\n                                \"name\": \"dns-tcp\",\n                                \"containerPort\": 53,\n                                \"protocol\": \"TCP\"\n                            },\n                            {\n                                \"name\": \"metrics\",\n                                \"containerPort\": 9153,\n                                \"protocol\": \"TCP\"\n                            }\n                        ],\n                        \"resources\": {\n                            \"limits\": {\n                                \"memory\": \"170Mi\"\n                            },\n                            \"requests\": {\n                                \"cpu\": \"100m\",\n                                \"memory\": \"70Mi\"\n                            }\n                        },\n                        \"volumeMounts\": [\n                            {\n                                \"name\": \"config-volume\",\n                                \"readOnly\": true,\n                                \"mountPath\": \"/etc/coredns\"\n                            },\n                            {\n                                \"name\": \"kube-api-access-l6klk\",\n                                \"readOnly\": true,\n                                \"mountPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\"\n                            }\n                        ],\n                        \"livenessProbe\": {\n                            \"httpGet\": {\n                                \"path\": \"/health\",\n                                \"port\": 8080,\n                                \"scheme\": \"HTTP\"\n                            },\n                            \"initialDelaySeconds\": 60,\n                            \"timeoutSeconds\": 5,\n                            \"periodSeconds\": 10,\n                            \"successThreshold\": 1,\n                            \"failureThreshold\": 5\n                        },\n                        \"readinessProbe\": {\n                            \"httpGet\": {\n                                \"path\": \"/health\",\n                                \"port\": 8080,\n                                \"scheme\": \"HTTP\"\n                            },\n                            \"timeoutSeconds\": 1,\n                            \"periodSeconds\": 10,\n                            \"successThreshold\": 1,\n                            \"failureThreshold\": 3\n                        },\n                        \"terminationMessagePath\": \"/dev/termination-log\",\n                        \"terminationMessagePolicy\": \"File\",\n                        \"imagePullPolicy\": \"IfNotPresent\",\n                        \"securityContext\": {\n                            \"capabilities\": {\n                                \"add\": [\n                                    \"NET_BIND_SERVICE\"\n                                ],\n                                \"drop\": [\n                                    \"all\"\n                                ]\n                            },\n                            \"readOnlyRootFilesystem\": true,\n                            \"allowPrivilegeEscalation\": false\n                        }\n                    }\n                ],\n                \"restartPolicy\": \"Always\",\n                \"terminationGracePeriodSeconds\": 30,\n                \"dnsPolicy\": \"Default\",\n                \"nodeSelector\": {\n                    \"beta.kubernetes.io/os\": \"linux\"\n                },\n                \"serviceAccountName\": \"coredns\",\n                \"serviceAccount\": \"coredns\",\n                \"nodeName\": \"ip-172-20-61-172.ap-south-1.compute.internal\",\n                \"securityContext\": {},\n                \"affinity\": {\n                    \"podAntiAffinity\": {\n                        \"preferredDuringSchedulingIgnoredDuringExecution\": [\n                            {\n                                \"weight\": 1,\n                                \"podAffinityTerm\": {\n                                    \"labelSelector\": {\n                                        \"matchExpressions\": [\n                                            {\n                                                \"key\": \"k8s-app\",\n                                                \"operator\": \"In\",\n                                                \"values\": [\n                                                    \"kube-dns\"\n                                                ]\n                                            }\n                                        ]\n                                    },\n                                    \"topologyKey\": \"kubernetes.io/hostname\"\n                                }\n                            }\n                        ]\n                    }\n                },\n                \"schedulerName\": \"default-scheduler\",\n                \"tolerations\": [\n                    {\n                        \"key\": \"CriticalAddonsOnly\",\n                        \"operator\": \"Exists\"\n                    },\n                    {\n                        \"key\": \"node.kubernetes.io/not-ready\",\n                        \"operator\": \"Exists\",\n                        \"effect\": \"NoExecute\",\n                        \"tolerationSeconds\": 300\n                    },\n                    {\n                        \"key\": \"node.kubernetes.io/unreachable\",\n                        \"operator\": \"Exists\",\n                        \"effect\": \"NoExecute\",\n                        \"tolerationSeconds\": 300\n                    }\n                ],\n                \"priorityClassName\": \"system-cluster-critical\",\n                \"priority\": 2000000000,\n                \"enableServiceLinks\": true,\n                \"preemptionPolicy\": \"PreemptLowerPriority\"\n            },\n            \"status\": {\n                \"phase\": \"Running\",\n                \"conditions\": [\n                    {\n                        \"type\": \"Initialized\",\n                        \"status\": \"True\",\n                        \"lastProbeTime\": null,\n                        \"lastTransitionTime\": \"2021-05-09T18:04:52Z\"\n                    },\n                    {\n                        \"type\": \"Ready\",\n                        \"status\": \"True\",\n                        \"lastProbeTime\": null,\n                        \"lastTransitionTime\": \"2021-05-09T18:05:00Z\"\n                    },\n                    {\n                        \"type\": \"ContainersReady\",\n                        \"status\": \"True\",\n                        \"lastProbeTime\": null,\n                        \"lastTransitionTime\": \"2021-05-09T18:05:00Z\"\n                    },\n                    {\n                        \"type\": \"PodScheduled\",\n                        \"status\": \"True\",\n                        \"lastProbeTime\": null,\n                        \"lastTransitionTime\": \"2021-05-09T18:04:52Z\"\n                    }\n                ],\n                \"hostIP\": \"172.20.61.172\",\n                \"podIP\": \"100.96.3.2\",\n                \"podIPs\": [\n                    {\n                        \"ip\": \"100.96.3.2\"\n                    }\n                ],\n                \"startTime\": \"2021-05-09T18:04:52Z\",\n                \"containerStatuses\": [\n                    {\n                        \"name\": \"coredns\",\n                        \"state\": {\n                            \"running\": {\n                                \"startedAt\": \"2021-05-09T18:04:59Z\"\n                            }\n                        },\n                        \"lastState\": {},\n                        \"ready\": true,\n                        \"restartCount\": 0,\n                        \"image\": \"k8s.gcr.io/coredns:1.7.0\",\n                        \"imageID\": \"docker-pullable://k8s.gcr.io/coredns@sha256:73ca82b4ce829766d4f1f10947c3a338888f876fbed0540dc849c89ff256e90c\",\n                        \"containerID\": \"docker://be8247344dd2b140459ee359b970f77298b2e8fcbaae4fcd613766394e2ea4f8\",\n                        \"started\": true\n                    }\n                ],\n                \"qosClass\": \"Burstable\"\n            }\n        },\n        {\n            \"metadata\": {\n                \"name\": \"coredns-autoscaler-6f594f4c58-jhvmb\",\n                \"generateName\": \"coredns-autoscaler-6f594f4c58-\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"d5ab454e-e9c8-49bd-86df-3f3009429476\",\n                \"resourceVersion\": \"776\",\n                \"creationTimestamp\": \"2021-05-09T18:03:22Z\",\n                \"labels\": {\n                    \"k8s-app\": \"coredns-autoscaler\",\n                    \"pod-template-hash\": \"6f594f4c58\"\n                },\n                \"annotations\": {\n                    \"scheduler.alpha.kubernetes.io/critical-pod\": \"\"\n                },\n                \"ownerReferences\": [\n                    {\n                        \"apiVersion\": \"apps/v1\",\n                        \"kind\": \"ReplicaSet\",\n                        \"name\": \"coredns-autoscaler-6f594f4c58\",\n                        \"uid\": \"1599663f-9877-4ad4-9198-cd85df0bdc07\",\n                        \"controller\": true,\n                        \"blockOwnerDeletion\": true\n                    }\n                ]\n            },\n            \"spec\": {\n                \"volumes\": [\n                    {\n                        \"name\": \"kube-api-access-7x72r\",\n                        \"projected\": {\n                            \"sources\": [\n                                {\n                                    \"serviceAccountToken\": {\n                                        \"expirationSeconds\": 3607,\n                                        \"path\": \"token\"\n                                    }\n                                },\n                                {\n                                    \"configMap\": {\n                                        \"name\": \"kube-root-ca.crt\",\n                                        \"items\": [\n                                            {\n                                                \"key\": \"ca.crt\",\n                                                \"path\": \"ca.crt\"\n                                            }\n                                        ]\n                                    }\n                                },\n                                {\n                                    \"downwardAPI\": {\n                                        \"items\": [\n                                            {\n                                                \"path\": \"namespace\",\n                                                \"fieldRef\": {\n                                                    \"apiVersion\": \"v1\",\n                                                    \"fieldPath\": \"metadata.namespace\"\n                                                }\n                                            }\n                                        ]\n                                    }\n                                }\n                            ],\n                            \"defaultMode\": 420\n                        }\n                    }\n                ],\n                \"containers\": [\n                    {\n                        \"name\": \"autoscaler\",\n                        \"image\": \"k8s.gcr.io/cpa/cluster-proportional-autoscaler:1.8.3\",\n                        \"command\": [\n                            \"/cluster-proportional-autoscaler\",\n                            \"--namespace=kube-system\",\n                            \"--configmap=coredns-autoscaler\",\n                            \"--target=Deployment/coredns\",\n                            \"--default-params={\\\"linear\\\":{\\\"coresPerReplica\\\":256,\\\"nodesPerReplica\\\":16,\\\"preventSinglePointFailure\\\":true}}\",\n                            \"--logtostderr=true\",\n                            \"--v=2\"\n                        ],\n                        \"resources\": {\n                            \"requests\": {\n                                \"cpu\": \"20m\",\n                                \"memory\": \"10Mi\"\n                            }\n                        },\n                        \"volumeMounts\": [\n                            {\n                                \"name\": \"kube-api-access-7x72r\",\n                                \"readOnly\": true,\n                                \"mountPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\"\n                            }\n                        ],\n                        \"terminationMessagePath\": \"/dev/termination-log\",\n                        \"terminationMessagePolicy\": \"File\",\n                        \"imagePullPolicy\": \"IfNotPresent\"\n                    }\n                ],\n                \"restartPolicy\": \"Always\",\n                \"terminationGracePeriodSeconds\": 30,\n                \"dnsPolicy\": \"ClusterFirst\",\n                \"serviceAccountName\": \"coredns-autoscaler\",\n                \"serviceAccount\": \"coredns-autoscaler\",\n                \"nodeName\": \"ip-172-20-33-8.ap-south-1.compute.internal\",\n                \"securityContext\": {},\n                \"schedulerName\": \"default-scheduler\",\n                \"tolerations\": [\n                    {\n                        \"key\": \"CriticalAddonsOnly\",\n                        \"operator\": \"Exists\"\n                    },\n                    {\n                        \"key\": \"node.kubernetes.io/not-ready\",\n                        \"operator\": \"Exists\",\n                        \"effect\": \"NoExecute\",\n                        \"tolerationSeconds\": 300\n                    },\n                    {\n                        \"key\": \"node.kubernetes.io/unreachable\",\n                        \"operator\": \"Exists\",\n                        \"effect\": \"NoExecute\",\n                        \"tolerationSeconds\": 300\n                    }\n                ],\n                \"priorityClassName\": \"system-cluster-critical\",\n                \"priority\": 2000000000,\n                \"enableServiceLinks\": true,\n                \"preemptionPolicy\": \"PreemptLowerPriority\"\n            },\n            \"status\": {\n                \"phase\": \"Running\",\n                \"conditions\": [\n                    {\n                        \"type\": \"Initialized\",\n                        \"status\": \"True\",\n                        \"lastProbeTime\": null,\n                        \"lastTransitionTime\": \"2021-05-09T18:04:52Z\"\n                    },\n                    {\n                        \"type\": \"Ready\",\n                        \"status\": \"True\",\n                        \"lastProbeTime\": null,\n                        \"lastTransitionTime\": \"2021-05-09T18:04:59Z\"\n                    },\n                    {\n                        \"type\": \"ContainersReady\",\n                        \"status\": \"True\",\n                        \"lastProbeTime\": null,\n                        \"lastTransitionTime\": \"2021-05-09T18:04:59Z\"\n                    },\n                    {\n                        \"type\": \"PodScheduled\",\n                        \"status\": \"True\",\n                        \"lastProbeTime\": null,\n                        \"lastTransitionTime\": \"2021-05-09T18:04:52Z\"\n                    }\n                ],\n                \"hostIP\": \"172.20.33.8\",\n                \"podIP\": \"100.96.2.2\",\n                \"podIPs\": [\n                    {\n                        \"ip\": \"100.96.2.2\"\n                    }\n                ],\n                \"startTime\": \"2021-05-09T18:04:52Z\",\n                \"containerStatuses\": [\n                    {\n                        \"name\": \"autoscaler\",\n                        \"state\": {\n                            \"running\": {\n                                \"startedAt\": \"2021-05-09T18:04:59Z\"\n                            }\n                        },\n                        \"lastState\": {},\n                        \"ready\": true,\n                        \"restartCount\": 0,\n                        \"image\": \"k8s.gcr.io/cpa/cluster-proportional-autoscaler:1.8.3\",\n                        \"imageID\": \"docker-pullable://k8s.gcr.io/cpa/cluster-proportional-autoscaler@sha256:67640771ad9fc56f109d5b01e020f0c858e7c890bb0eb15ba0ebd325df3285e7\",\n                        \"containerID\": \"docker://e106109ff1dc9a80364e851d4ed2df48b66225bd1e3db0a6632e60d6f752d10f\",\n                        \"started\": true\n                    }\n                ],\n                \"qosClass\": \"Burstable\"\n            }\n        },\n        {\n            \"metadata\": {\n                \"name\": \"dns-controller-5f98b58844-qbszv\",\n                \"generateName\": \"dns-controller-5f98b58844-\",\n                \"namespace\": \"kube-system\",\n                \"uid\": \"9ac9b338-9060-43d1-9a06-702078f66322\",\n                \"resourceVersion\": \"488\",\n                \"creationTimestamp\": \"2021-05-09T18:03:22Z\",\n                \"labels\": {\n                    \"k8s-addon\": \"dns-controller.addons.k8s.io\",\n                    \"k8s-app\": \"dns-controller\",\n                    \"pod-template-hash\": \"5f98b58844\",\n                    \"version\": \"v1.22.0-alpha.1\"\n                },\n                \"annotations\": {\n                    \"scheduler.alpha.kubernetes.io/critical-pod\": \"\"\n                },\n                \"ownerReferences\": [\n                    {\n                        \"apiVersion\": \"apps/v1\",\n                        \"kind\": \"ReplicaSet\",\n                        \"name\": \"dns-controller-5f98b58844\",\n                        \"uid\": \"bf1b4cc8-6542-40f7-a008-0973a92fc819\",\n                        \"controller\": true,\n                        \"blockOwnerDeletion\": true\n                    }\n                ]\n            },\n            \"spec\": {\n                \"volumes\": [\n                    {\n                        \"name\": \"kube-api-access-tzmt6\",\n                        \"projected\": {\n                            \"sources\": [\n                                {\n                                    \"serviceAccountToken\": {\n                                        \"expirationSeconds\": 3607,\n                                        \"path\": \"token\"\n                                    }\n                                },\n                                {\n                                    \"configMap\": {\n                                        \"name\": \"kube-root-ca.crt\",\n                                        \"items\": [\n                                            {\n                                                \"key\": \"ca.crt\",\n                                                \"path\": \"ca.crt\"\n                                            }\n                                        ]\n                                    }\n                                },\n                                {\n                                    \"downwardAPI\": {\n                                        \"items\": [\n                                            {\n                                                \"path\": \"namespace\",\n                                                \"fieldRef\": {\n                                                    \"apiVersion\": \"v1\",\n                                                    \"fieldPath\": \"metadata.namespace\"\n                                                }\n                                            }\n                                        ]\n                                    }\n                                }\n                            ],\n                            \"defaultMode\": 420\n                        }\n                    }\n                ],\n                \"containers\": [\n                    {\n                        \"name\": \"dns-controller\",\n                        \"image\": \"k8s.gcr.io/kops/dns-controller:1.22.0-alpha.1\",\n                        \"command\": [\n                            \"/dns-controller\",\n                            \"--watch-ingress=false\",\n                            \"--dns=aws-route53\",\n                            \"--zone=*/ZEMLNXIIWQ0RV\",\n                            \"--zone=*/*\",\n                            \"-v=2\"\n                        ],\n                        \"env\": [\n                            {\n                                \"name\": \"KUBERNETES_SERVICE_HOST\",\n                                \"value\": \"127.0.0.1\"\n                            }\n                        ],\n                        \"resources\": {\n                            \"requests\": {\n                                \"cpu\": \"50m\",\n                                \"memory\": \"50Mi\"\n                            }\n                        },\n                        \"volumeMounts\": [\n                            {\n                                \"name\": \"kube-api-access-tzmt6\",\n                                \"readOnly\": true,\n                                \"mountPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\"\n                            }\n                        ],\n                        \"terminationMessagePath\": \"/dev/termination-log\",\n                        \"terminationMessagePolicy\": \"File\",\n                        \"imagePullPolicy\": \"IfNotPresent\",\n                        \"securityContext\": {\n                            \"runAsNonRoot\": true\n                        }\n                    }\n                ],\n                \"restartPolicy\": \"Always\",\n                \"terminationGracePeriodSeconds\": 30,\n                \"dnsPolicy\": \"Default\",\n                \"nodeSelector\": {\n                    \"node-role.kubernetes.io/master\": \"\"\n                },\n                \"serviceAccountName\": \"dns-controller\",\n                \"serviceAccount\": \"dns-controller\",\n                \"nodeName\": \"ip-172-20-45-192.ap-south-1.compute.internal\",\n                \"hostNetwork\": true,\n                \"securityContext\": {},\n                \"schedulerName\": \"default-scheduler\",\n                \"tolerations\": [\n                    {\n                        \"operator\": \"Exists\"\n                    }\n                ],\n                \"priorityClassName\": \"system-cluster-critical\",\n                \"priority\": 2000000000,\n                \"enableServiceLinks\": true,\n                \"preemptionPolicy\": \"PreemptLowerPriority\"\n            },\n            \"status\": {\n                \"phase\": \"Running\",\n                \"conditions\": [\n                    {\n                        \"type\": \"Initialized\",\n                        \"status\": \"True\",\n                        \"lastProbeTime\": null,\n                        \"lastTransitionTime\": \"2021-05-09T18:03:50Z\"\n                    },\n                    {\n                        \"type\": \"Ready\",\n                        \"status\": \"True\",\n                        \"lastProbeTime\": null,\n                        \"lastTransitionTime\": \"2021-05-09T18:03:52Z\"\n                    },\n                    {\n                        \"type\": \"ContainersReady\",\n                        \"status\": \"True\",\n                        \"lastProbeTime\": null,\n                        \"lastTransitionTime\": \"2021-05-09T18:03:52Z\"\n                    },\n                    {\n                        \"type\": \"PodScheduled\",\n                        \"status\": \"True\",\n                        \"lastProbeTime\": null,\n                        \"lastTransitionTime\": \"2021-05-09T18:03:48Z\"\n                    }\n                ],\n                \"hostIP\": \"172.20.45.192\",\n                \"podIP\": \"172.20.45.192\",\n                \"podIPs\": [\n                    {\n                        \"ip\": \"172.20.45.192\"\n                    }\n                ],\n                \"startTime\": \"2021-05-09T18:03:50Z\",\n                \"containerStatuses\": [\n                    {\n                        \"name\": \"dns-controller\",\n                        \"state\": {\n                            \"running\": {\n                                \"startedAt\":