diff --git a/a.log b/a.log new file mode 100644 index 00000000000..b9c4934a0a6 --- /dev/null +++ b/a.log @@ -0,0 +1,435 @@ +mkdir -p /home/vce/antrea_oct_2022/antrea/.coverage + +==> Running unit tests <== +go test -race -coverpkg=antrea.io/antrea/cmd/...,antrea.io/antrea/pkg/...,antrea.io/antrea/multicluster/cmd/...,antrea.io/antrea/multicluster/controllers/... \ + -coverprofile=.coverage/coverage-unit.txt -covermode=atomic \ + antrea.io/antrea/cmd/... antrea.io/antrea/pkg/... antrea.io/antrea/multicluster/cmd/... antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/cmd/antctl [no test files] +? antrea.io/antrea/cmd/antrea-agent [no test files] +? antrea.io/antrea/cmd/antrea-agent-simulator [no test files] +? antrea.io/antrea/cmd/antrea-cni [no test files] +? antrea.io/antrea/cmd/antrea-controller [no test files] +? antrea.io/antrea/cmd/flow-aggregator [no test files] +ok antrea.io/antrea/pkg/agent 1.252s coverage: 1.4% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/agent/apiserver [no test files] +? antrea.io/antrea/pkg/agent/apiserver/handlers [no test files] +? antrea.io/antrea/pkg/agent/apiserver/handlers/addressgroup [no test files] +? antrea.io/antrea/pkg/agent/apiserver/handlers/agentinfo [no test files] +? antrea.io/antrea/pkg/agent/apiserver/handlers/appliedtogroup [no test files] +? antrea.io/antrea/pkg/agent/apiserver/handlers/featuregates [no test files] +ok antrea.io/antrea/pkg/agent/apiserver/handlers/multicast 1.231s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/agent/apiserver/handlers/networkpolicy [no test files] +ok antrea.io/antrea/pkg/agent/apiserver/handlers/ovsflows 1.332s coverage: 1.3% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/agent/apiserver/handlers/ovstracing 1.361s coverage: 1.3% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/agent/apiserver/handlers/podinterface 1.243s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/agent/apiserver/handlers/serviceexternalip [no test files] +ok antrea.io/antrea/pkg/agent/cniserver 1.332s coverage: 1.8% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/agent/cniserver/ipam 4.799s coverage: 1.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/agent/cniserver/ipam/testing [no test files] +? antrea.io/antrea/pkg/agent/cniserver/testing [no test files] +? antrea.io/antrea/pkg/agent/cniserver/types [no test files] +ok antrea.io/antrea/pkg/agent/config 1.034s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/agent/consistenthash 1.017s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/agent/controller/egress 2.680s coverage: 1.8% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/agent/controller/ipseccertificate 14.807s coverage: 1.2% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/agent/controller/networkpolicy 26.422s coverage: 4.3% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/agent/controller/noderoute 3.254s coverage: 1.4% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/agent/controller/serviceexternalip 2.594s coverage: 1.0% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/agent/controller/traceflow 1.425s coverage: 1.0% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/agent/controller/trafficcontrol 11.675s coverage: 2.2% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/agent/externalnode [no test files] +ok antrea.io/antrea/pkg/agent/flowexporter 1.148s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/agent/flowexporter/connections 1.448s coverage: 1.8% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/agent/flowexporter/connections/testing [no test files] +ok antrea.io/antrea/pkg/agent/flowexporter/exporter 1.331s coverage: 1.5% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/agent/flowexporter/priorityqueue 1.286s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/agent/interfacestore 1.440s coverage: 1.1% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/agent/interfacestore/testing [no test files] +? antrea.io/antrea/pkg/agent/ipassigner [no test files] +ok antrea.io/antrea/pkg/agent/ipassigner/responder 1.356s coverage: 1.0% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/agent/ipassigner/testing [no test files] +ok antrea.io/antrea/pkg/agent/memberlist 4.009s coverage: 1.4% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/agent/metrics [no test files] +ok antrea.io/antrea/pkg/agent/multicast 10.589s coverage: 2.2% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/agent/multicast/testing [no test files] +ok antrea.io/antrea/pkg/agent/multicluster 1.589s coverage: 1.1% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/agent/nodeportlocal 39.759s coverage: 1.7% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/agent/nodeportlocal/k8s 1.086s coverage: 0.8% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... [no tests to run] +ok antrea.io/antrea/pkg/agent/nodeportlocal/portcache 1.405s coverage: 1.0% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/agent/nodeportlocal/portcache/testing [no test files] +? antrea.io/antrea/pkg/agent/nodeportlocal/rules [no test files] +? antrea.io/antrea/pkg/agent/nodeportlocal/rules/testing [no test files] +? antrea.io/antrea/pkg/agent/nodeportlocal/testing [no test files] +? antrea.io/antrea/pkg/agent/nodeportlocal/types [no test files] +? antrea.io/antrea/pkg/agent/nodeportlocal/util [no test files] +ok antrea.io/antrea/pkg/agent/openflow 1.270s coverage: 4.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/agent/openflow/cookie 2.678s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/agent/openflow/testing [no test files] +ok antrea.io/antrea/pkg/agent/proxy 1.341s coverage: 1.7% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/agent/proxy/metrics [no test files] +? antrea.io/antrea/pkg/agent/proxy/testing [no test files] +? antrea.io/antrea/pkg/agent/proxy/types [no test files] +ok antrea.io/antrea/pkg/agent/querier 1.439s coverage: 1.1% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/agent/querier/testing [no test files] +? antrea.io/antrea/pkg/agent/route [no test files] +? antrea.io/antrea/pkg/agent/route/testing [no test files] +? antrea.io/antrea/pkg/agent/secondarynetwork/cnipodcache [no test files] +? antrea.io/antrea/pkg/agent/secondarynetwork/ipam [no test files] +? antrea.io/antrea/pkg/agent/secondarynetwork/ipam/testing [no test files] +ok antrea.io/antrea/pkg/agent/secondarynetwork/podwatch 1.451s coverage: 1.3% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/agent/secondarynetwork/podwatch/testing [no test files] +ok antrea.io/antrea/pkg/agent/stats 1.445s coverage: 1.0% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/agent/types [no test files] +? antrea.io/antrea/pkg/agent/types/testing [no test files] +ok antrea.io/antrea/pkg/agent/util 1.298s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/agent/util/arping 1.507s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/agent/util/ethtool [no test files] +? antrea.io/antrea/pkg/agent/util/ipset [no test files] +ok antrea.io/antrea/pkg/agent/util/iptables 3.690s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/agent/util/ndp 1.370s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/agent/util/syscall [no test files] +? antrea.io/antrea/pkg/agent/util/sysctl [no test files] +? antrea.io/antrea/pkg/agent/util/winfirewall [no test files] +ok antrea.io/antrea/pkg/agent/wireguard 1.475s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/antctl 1.316s coverage: 1.6% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/antctl/fallback/version [no test files] +? antrea.io/antrea/pkg/antctl/output [no test files] +? antrea.io/antrea/pkg/antctl/raw [no test files] +? antrea.io/antrea/pkg/antctl/raw/featuregates [no test files] +ok antrea.io/antrea/pkg/antctl/raw/multicluster 1.406s coverage: 1.4% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/antctl/raw/multicluster/common 1.469s coverage: 1.1% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/antctl/raw/multicluster/create 1.353s coverage: 1.0% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/antctl/raw/multicluster/deploy 1.385s coverage: 1.0% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/antctl/raw/multicluster/get 1.445s coverage: 1.4% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/antctl/raw/multicluster/scheme [no test files] +? antrea.io/antrea/pkg/antctl/raw/proxy [no test files] +? antrea.io/antrea/pkg/antctl/raw/set [no test files] +? antrea.io/antrea/pkg/antctl/raw/set/flow-aggregator [no test files] +? antrea.io/antrea/pkg/antctl/raw/supportbundle [no test files] +ok antrea.io/antrea/pkg/antctl/raw/traceflow 1.411s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/antctl/runtime [no test files] +? antrea.io/antrea/pkg/antctl/transform [no test files] +? antrea.io/antrea/pkg/antctl/transform/addressgroup [no test files] +? antrea.io/antrea/pkg/antctl/transform/appliedtogroup [no test files] +? antrea.io/antrea/pkg/antctl/transform/clusterset [no test files] +? antrea.io/antrea/pkg/antctl/transform/common [no test files] +? antrea.io/antrea/pkg/antctl/transform/controllerinfo [no test files] +? antrea.io/antrea/pkg/antctl/transform/networkpolicy [no test files] +? antrea.io/antrea/pkg/antctl/transform/ovstracing [no test files] +? antrea.io/antrea/pkg/antctl/transform/resourceexport [no test files] +? antrea.io/antrea/pkg/antctl/transform/resourceimport [no test files] +? antrea.io/antrea/pkg/antctl/transform/rule [no test files] +? antrea.io/antrea/pkg/antctl/transform/version [no test files] +? antrea.io/antrea/pkg/apis [no test files] +? antrea.io/antrea/pkg/apis/cni/v1beta1 [no test files] +ok antrea.io/antrea/pkg/apis/controlplane 1.082s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/apis/controlplane/install [no test files] +? antrea.io/antrea/pkg/apis/controlplane/v1beta2 [no test files] +? antrea.io/antrea/pkg/apis/crd [no test files] +? antrea.io/antrea/pkg/apis/crd/v1alpha1 [no test files] +? antrea.io/antrea/pkg/apis/crd/v1alpha2 [no test files] +? antrea.io/antrea/pkg/apis/crd/v1alpha3 [no test files] +? antrea.io/antrea/pkg/apis/crd/v1beta1 [no test files] +? antrea.io/antrea/pkg/apis/stats [no test files] +? antrea.io/antrea/pkg/apis/stats/install [no test files] +? antrea.io/antrea/pkg/apis/stats/v1alpha1 [no test files] +? antrea.io/antrea/pkg/apis/system [no test files] +? antrea.io/antrea/pkg/apis/system/install [no test files] +? antrea.io/antrea/pkg/apis/system/v1beta1 [no test files] +? antrea.io/antrea/pkg/apiserver [no test files] +ok antrea.io/antrea/pkg/apiserver/certificate 9.854s coverage: 1.2% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/apiserver/handlers/endpoint 1.376s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/apiserver/handlers/featuregates 1.120s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/apiserver/handlers/loglevel [no test files] +ok antrea.io/antrea/pkg/apiserver/handlers/webhook 1.466s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/apiserver/openapi [no test files] +ok antrea.io/antrea/pkg/apiserver/registry/controlplane/egressgroup 1.356s coverage: 1.0% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/apiserver/registry/controlplane/nodestatssummary [no test files] +? antrea.io/antrea/pkg/apiserver/registry/networkpolicy [no test files] +ok antrea.io/antrea/pkg/apiserver/registry/networkpolicy/addressgroup 1.394s coverage: 1.0% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/apiserver/registry/networkpolicy/appliedtogroup 1.413s coverage: 1.0% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/apiserver/registry/networkpolicy/clustergroupmember 1.186s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/apiserver/registry/networkpolicy/groupassociation 1.424s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/apiserver/registry/networkpolicy/networkpolicy 1.327s coverage: 1.0% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/apiserver/registry/stats/antreaclusternetworkpolicystats 1.127s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/apiserver/registry/stats/antreanetworkpolicystats 1.207s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/apiserver/registry/stats/multicastgroup [no test files] +ok antrea.io/antrea/pkg/apiserver/registry/stats/networkpolicystats 1.224s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/apiserver/registry/system/controllerinfo 1.525s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/apiserver/registry/system/supportbundle 1.684s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/apiserver/storage [no test files] +ok antrea.io/antrea/pkg/apiserver/storage/ram 1.635s coverage: 1.1% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/client/clientset/versioned [no test files] +? antrea.io/antrea/pkg/client/clientset/versioned/fake [no test files] +? antrea.io/antrea/pkg/client/clientset/versioned/scheme [no test files] +? antrea.io/antrea/pkg/client/clientset/versioned/typed/controlplane/v1beta2 [no test files] +? antrea.io/antrea/pkg/client/clientset/versioned/typed/controlplane/v1beta2/fake [no test files] +? antrea.io/antrea/pkg/client/clientset/versioned/typed/crd/v1alpha1 [no test files] +? antrea.io/antrea/pkg/client/clientset/versioned/typed/crd/v1alpha1/fake [no test files] +? antrea.io/antrea/pkg/client/clientset/versioned/typed/crd/v1alpha2 [no test files] +? antrea.io/antrea/pkg/client/clientset/versioned/typed/crd/v1alpha2/fake [no test files] +? antrea.io/antrea/pkg/client/clientset/versioned/typed/crd/v1alpha3 [no test files] +? antrea.io/antrea/pkg/client/clientset/versioned/typed/crd/v1alpha3/fake [no test files] +? antrea.io/antrea/pkg/client/clientset/versioned/typed/crd/v1beta1 [no test files] +? antrea.io/antrea/pkg/client/clientset/versioned/typed/crd/v1beta1/fake [no test files] +? antrea.io/antrea/pkg/client/clientset/versioned/typed/stats/v1alpha1 [no test files] +? antrea.io/antrea/pkg/client/clientset/versioned/typed/stats/v1alpha1/fake [no test files] +? antrea.io/antrea/pkg/client/clientset/versioned/typed/system/v1beta1 [no test files] +? antrea.io/antrea/pkg/client/clientset/versioned/typed/system/v1beta1/fake [no test files] +? antrea.io/antrea/pkg/client/informers/externalversions [no test files] +? antrea.io/antrea/pkg/client/informers/externalversions/crd [no test files] +? antrea.io/antrea/pkg/client/informers/externalversions/crd/v1alpha1 [no test files] +? antrea.io/antrea/pkg/client/informers/externalversions/crd/v1alpha2 [no test files] +? antrea.io/antrea/pkg/client/informers/externalversions/crd/v1alpha3 [no test files] +? antrea.io/antrea/pkg/client/informers/externalversions/crd/v1beta1 [no test files] +? antrea.io/antrea/pkg/client/informers/externalversions/internalinterfaces [no test files] +? antrea.io/antrea/pkg/client/listers/crd/v1alpha1 [no test files] +? antrea.io/antrea/pkg/client/listers/crd/v1alpha2 [no test files] +? antrea.io/antrea/pkg/client/listers/crd/v1alpha3 [no test files] +? antrea.io/antrea/pkg/client/listers/crd/v1beta1 [no test files] +ok antrea.io/antrea/pkg/clusteridentity 1.483s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/cni 1.308s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/config/agent [no test files] +? antrea.io/antrea/pkg/config/controller [no test files] +? antrea.io/antrea/pkg/config/flowaggregator [no test files] +? antrea.io/antrea/pkg/controller [no test files] +ok antrea.io/antrea/pkg/controller/certificatesigningrequest 7.306s coverage: 1.4% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/controller/egress 7.591s coverage: 3.0% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/controller/egress/store 1.398s coverage: 1.2% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/controller/externalippool 4.701s coverage: 1.6% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/controller/externalnode [no test files] +ok antrea.io/antrea/pkg/controller/grouping 1.703s coverage: 1.7% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/controller/ipam 1.903s coverage: 1.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/controller/metrics [no test files] +ok antrea.io/antrea/pkg/controller/networkpolicy 9.465s coverage: 6.2% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/controller/networkpolicy/store 1.285s coverage: 1.4% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/controller/networkpolicy/testing [no test files] +? antrea.io/antrea/pkg/controller/querier [no test files] +? antrea.io/antrea/pkg/controller/querier/testing [no test files] +ok antrea.io/antrea/pkg/controller/serviceexternalip 4.889s coverage: 1.7% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/controller/stats 1.692s coverage: 1.5% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/controller/traceflow 4.027s coverage: 1.4% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/controller/types [no test files] +? antrea.io/antrea/pkg/features [no test files] +ok antrea.io/antrea/pkg/flowaggregator 0.989s coverage: 1.4% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/flowaggregator/apiserver [no test files] +ok antrea.io/antrea/pkg/flowaggregator/apiserver/handlers/flowrecords 1.436s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/flowaggregator/apiserver/handlers/recordmetrics 1.439s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/flowaggregator/clickhouseclient 2.314s coverage: 1.6% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/flowaggregator/exporter 1.180s coverage: 1.5% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/flowaggregator/exporter/testing [no test files] +ok antrea.io/antrea/pkg/flowaggregator/flowrecord 1.356s coverage: 1.4% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/flowaggregator/flowrecord/testing [no test files] +? antrea.io/antrea/pkg/flowaggregator/infoelements [no test files] +? antrea.io/antrea/pkg/flowaggregator/options [no test files] +? antrea.io/antrea/pkg/flowaggregator/querier [no test files] +? antrea.io/antrea/pkg/flowaggregator/querier/testing [no test files] +ok antrea.io/antrea/pkg/flowaggregator/s3uploader 6.094s coverage: 1.8% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/flowaggregator/testing [no test files] +ok antrea.io/antrea/pkg/graphviz 1.136s coverage: 1.2% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/ipam [no test files] +ok antrea.io/antrea/pkg/ipam/ipallocator 1.387s coverage: 1.1% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/ipam/poolallocator 1.500s coverage: 1.6% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/ipam/poolallocator/testing [no test files] +? antrea.io/antrea/pkg/ipfix [no test files] +? antrea.io/antrea/pkg/ipfix/testing [no test files] +ok antrea.io/antrea/pkg/log 5.235s coverage: 1.0% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/monitor [no test files] +? antrea.io/antrea/pkg/ovs [no test files] +ok antrea.io/antrea/pkg/ovs/openflow 0.513s coverage: 1.4% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/ovs/openflow/testing [no test files] +ok antrea.io/antrea/pkg/ovs/ovsconfig 0.552s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/ovs/ovsconfig/testing [no test files] +ok antrea.io/antrea/pkg/ovs/ovsctl 0.504s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/ovs/ovsctl/testing [no test files] +? antrea.io/antrea/pkg/querier [no test files] +? antrea.io/antrea/pkg/querier/testing [no test files] +? antrea.io/antrea/pkg/signals [no test files] +ok antrea.io/antrea/pkg/support 0.608s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/util/channel 1.722s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/util/cipher 0.564s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/util/env 0.569s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/util/externalnode [no test files] +ok antrea.io/antrea/pkg/util/flowexport 0.517s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/util/ip 0.527s coverage: 1.0% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/util/k8s 0.537s coverage: 1.0% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/util/logdir [no test files] +ok antrea.io/antrea/pkg/util/runtime 0.537s coverage: 0.8% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/pkg/util/sets 0.464s coverage: 0.9% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +? antrea.io/antrea/pkg/version [no test files] +ok antrea.io/antrea/multicluster/cmd/multicluster-controller 0.586s coverage: 1.1% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +W1018 11:09:42.221164 617076 env.go:88] Environment variable POD_NAMESPACE not found +W1018 11:09:42.221238 617076 env.go:126] Failed to get Pod Namespace from environment. Using "kube-system" as the Antrea Service Namespace +I1018 11:09:42.238946 617076 gateway_controller.go:196] "Created a ClusterInfo kind of ResourceExport" clusterinfo="default/cluster-a-clusterinfo" +================== +WARNING: DATA RACE +Read at 0x00c00001a570 by goroutine 234: + antrea.io/antrea/multicluster/controllers/multicluster.(*LabelIdentityReconciler).createLabelIdentityResExport() + /home/vce/antrea_oct_2022/antrea/multicluster/controllers/multicluster/label_identity_controller.go:265 +0x84 + antrea.io/antrea/multicluster/controllers/multicluster.(*LabelIdentityReconciler).syncLabelResourceExport() + /home/vce/antrea_oct_2022/antrea/multicluster/controllers/multicluster/label_identity_controller.go:252 +0xe6 + antrea.io/antrea/multicluster/controllers/multicluster.(*LabelIdentityReconciler).processLabelForResourceExport() + /home/vce/antrea_oct_2022/antrea/multicluster/controllers/multicluster/label_identity_controller.go:225 +0x194 + antrea.io/antrea/multicluster/controllers/multicluster.(*LabelIdentityReconciler).labelQueueWorker() + /home/vce/antrea_oct_2022/antrea/multicluster/controllers/multicluster/label_identity_controller.go:210 +0x52 + antrea.io/antrea/multicluster/controllers/multicluster.(*LabelIdentityReconciler).labelQueueWorker-fm() + :1 +0x39 + k8s.io/apimachinery/pkg/util/wait.BackoffUntil.func1() + /root/go/pkg/mod/k8s.io/apimachinery@v0.24.0/pkg/util/wait/wait.go:155 +0x48 + k8s.io/apimachinery/pkg/util/wait.BackoffUntil() + /root/go/pkg/mod/k8s.io/apimachinery@v0.24.0/pkg/util/wait/wait.go:156 +0xce + k8s.io/apimachinery/pkg/util/wait.JitterUntil() + /root/go/pkg/mod/k8s.io/apimachinery@v0.24.0/pkg/util/wait/wait.go:133 +0x10d + k8s.io/apimachinery/pkg/util/wait.Until() + /root/go/pkg/mod/k8s.io/apimachinery@v0.24.0/pkg/util/wait/wait.go:90 +0x48 + antrea.io/antrea/multicluster/controllers/multicluster.(*LabelIdentityReconciler).Run.func2() + /home/vce/antrea_oct_2022/antrea/multicluster/controllers/multicluster/label_identity_controller.go:204 +0x4c + +Previous write at 0x00c00001a570 by goroutine 231: + antrea.io/antrea/multicluster/controllers/multicluster.(*LabelIdentityReconciler).Reconcile() + /home/vce/antrea_oct_2022/antrea/multicluster/controllers/multicluster/label_identity_controller.go:92 +0x246 + antrea.io/antrea/multicluster/controllers/multicluster.TestLabelIdentityReconciler.func1() + /home/vce/antrea_oct_2022/antrea/multicluster/controllers/multicluster/label_identity_controller_test.go:186 +0x16b9 + testing.tRunner() + /usr/local/go/src/testing/testing.go:1446 +0x216 + testing.(*T).Run.func1() + /usr/local/go/src/testing/testing.go:1493 +0x47 + +Goroutine 234 (running) created at: + antrea.io/antrea/multicluster/controllers/multicluster.(*LabelIdentityReconciler).Run() + /home/vce/antrea_oct_2022/antrea/multicluster/controllers/multicluster/label_identity_controller.go:204 +0xef + antrea.io/antrea/multicluster/controllers/multicluster.TestLabelIdentityReconciler.func1.2() + /home/vce/antrea_oct_2022/antrea/multicluster/controllers/multicluster/label_identity_controller_test.go:177 +0x47 + +Goroutine 231 (running) created at: + testing.(*T).Run() + /usr/local/go/src/testing/testing.go:1493 +0x75d + antrea.io/antrea/multicluster/controllers/multicluster.TestLabelIdentityReconciler() + /home/vce/antrea_oct_2022/antrea/multicluster/controllers/multicluster/label_identity_controller_test.go:167 +0x1728 + testing.tRunner() + /usr/local/go/src/testing/testing.go:1446 +0x216 + testing.(*T).Run.func1() + /usr/local/go/src/testing/testing.go:1493 +0x47 +================== +================== +WARNING: DATA RACE +Read at 0x00c00001a528 by goroutine 234: + antrea.io/antrea/multicluster/controllers/multicluster.(*LabelIdentityReconciler).getLabelIdentityResourceExport() + /home/vce/antrea_oct_2022/antrea/multicluster/controllers/multicluster/label_identity_controller.go:292 +0x84 + antrea.io/antrea/multicluster/controllers/multicluster.(*LabelIdentityReconciler).createLabelIdentityResExport() + /home/vce/antrea_oct_2022/antrea/multicluster/controllers/multicluster/label_identity_controller.go:266 +0xcc + antrea.io/antrea/multicluster/controllers/multicluster.(*LabelIdentityReconciler).syncLabelResourceExport() + /home/vce/antrea_oct_2022/antrea/multicluster/controllers/multicluster/label_identity_controller.go:252 +0xe6 + antrea.io/antrea/multicluster/controllers/multicluster.(*LabelIdentityReconciler).processLabelForResourceExport() + /home/vce/antrea_oct_2022/antrea/multicluster/controllers/multicluster/label_identity_controller.go:225 +0x194 + antrea.io/antrea/multicluster/controllers/multicluster.(*LabelIdentityReconciler).labelQueueWorker() + /home/vce/antrea_oct_2022/antrea/multicluster/controllers/multicluster/label_identity_controller.go:210 +0x52 + antrea.io/antrea/multicluster/controllers/multicluster.(*LabelIdentityReconciler).labelQueueWorker-fm() + :1 +0x39 + k8s.io/apimachinery/pkg/util/wait.BackoffUntil.func1() + /root/go/pkg/mod/k8s.io/apimachinery@v0.24.0/pkg/util/wait/wait.go:155 +0x48 + k8s.io/apimachinery/pkg/util/wait.BackoffUntil() + /root/go/pkg/mod/k8s.io/apimachinery@v0.24.0/pkg/util/wait/wait.go:156 +0xce + k8s.io/apimachinery/pkg/util/wait.JitterUntil() + /root/go/pkg/mod/k8s.io/apimachinery@v0.24.0/pkg/util/wait/wait.go:133 +0x10d + k8s.io/apimachinery/pkg/util/wait.Until() + /root/go/pkg/mod/k8s.io/apimachinery@v0.24.0/pkg/util/wait/wait.go:90 +0x48 + antrea.io/antrea/multicluster/controllers/multicluster.(*LabelIdentityReconciler).Run.func2() + /home/vce/antrea_oct_2022/antrea/multicluster/controllers/multicluster/label_identity_controller.go:204 +0x4c + +Previous write at 0x00c00001a528 by goroutine 231: + antrea.io/antrea/multicluster/controllers/multicluster.(*LabelIdentityReconciler).Reconcile() + /home/vce/antrea_oct_2022/antrea/multicluster/controllers/multicluster/label_identity_controller.go:96 +0x2bc + antrea.io/antrea/multicluster/controllers/multicluster.TestLabelIdentityReconciler.func1() + /home/vce/antrea_oct_2022/antrea/multicluster/controllers/multicluster/label_identity_controller_test.go:186 +0x16b9 + testing.tRunner() + /usr/local/go/src/testing/testing.go:1446 +0x216 + testing.(*T).Run.func1() + /usr/local/go/src/testing/testing.go:1493 +0x47 + +Goroutine 234 (running) created at: + antrea.io/antrea/multicluster/controllers/multicluster.(*LabelIdentityReconciler).Run() + /home/vce/antrea_oct_2022/antrea/multicluster/controllers/multicluster/label_identity_controller.go:204 +0xef + antrea.io/antrea/multicluster/controllers/multicluster.TestLabelIdentityReconciler.func1.2() + /home/vce/antrea_oct_2022/antrea/multicluster/controllers/multicluster/label_identity_controller_test.go:177 +0x47 + +Goroutine 231 (running) created at: + testing.(*T).Run() + /usr/local/go/src/testing/testing.go:1493 +0x75d + antrea.io/antrea/multicluster/controllers/multicluster.TestLabelIdentityReconciler() + /home/vce/antrea_oct_2022/antrea/multicluster/controllers/multicluster/label_identity_controller_test.go:167 +0x1728 + testing.tRunner() + /usr/local/go/src/testing/testing.go:1446 +0x216 + testing.(*T).Run.func1() + /usr/local/go/src/testing/testing.go:1493 +0x47 +================== +--- FAIL: TestLabelIdentityReconciler (0.15s) + --- FAIL: TestLabelIdentityReconciler/pod_delete_event_no_stale_label (0.03s) + testing.go:1319: race detected during execution of test + testing.go:1319: race detected during execution of test +I1018 11:09:42.814764 617076 leader_clusterset_controller.go:81] "Received ClusterSet add/update" clusterset="mcs1/clusterset1" +I1018 11:09:42.814871 617076 controller_utils.go:41] "Validating ClusterClaim" namespace="mcs1" +I1018 11:09:42.816481 617076 controller_utils.go:53] "Processing ClusterClaim" name="clusterset.k8s.io" value="clusterset1" +I1018 11:09:42.816578 617076 controller_utils.go:53] "Processing ClusterClaim" name="id.k8s.io" value="leader1" +I1018 11:09:42.819158 617076 leader_clusterset_controller.go:81] "Received ClusterSet add/update" clusterset="mcs1/clusterset1" +I1018 11:09:42.819241 617076 controller_utils.go:41] "Validating ClusterClaim" namespace="mcs1" +I1018 11:09:42.819942 617076 controller_utils.go:53] "Processing ClusterClaim" name="clusterset.k8s.io" value="clusterset1" +I1018 11:09:42.820027 617076 controller_utils.go:53] "Processing ClusterClaim" name="id.k8s.io" value="leader1" +I1018 11:09:42.821473 617076 leader_clusterset_controller.go:81] "Received ClusterSet add/update" clusterset="mcs1/clusterset1" +I1018 11:09:42.823933 617076 leader_clusterset_controller.go:81] "Received ClusterSet add/update" clusterset="mcs1/clusterset1" +I1018 11:09:42.824014 617076 controller_utils.go:41] "Validating ClusterClaim" namespace="mcs1" +I1018 11:09:42.824713 617076 controller_utils.go:53] "Processing ClusterClaim" name="clusterset.k8s.io" value="clusterset1" +I1018 11:09:42.824797 617076 controller_utils.go:53] "Processing ClusterClaim" name="id.k8s.io" value="leader1" +I1018 11:09:42.825637 617076 leader_clusterset_controller.go:73] "Received ClusterSet delete" clusterset="mcs1/clusterset1" +I1018 11:09:42.827732 617076 leader_clusterset_controller.go:81] "Received ClusterSet add/update" clusterset="mcs1/clusterset1" +I1018 11:09:42.827785 617076 controller_utils.go:41] "Validating ClusterClaim" namespace="mcs1" +I1018 11:09:42.828256 617076 controller_utils.go:53] "Processing ClusterClaim" name="clusterset.k8s.io" value="clusterset1" +I1018 11:09:42.828326 617076 controller_utils.go:53] "Processing ClusterClaim" name="id.k8s.io" value="leader1" +I1018 11:09:42.830059 617076 member_clusterset_controller.go:93] "Received ClusterSet delete" clusterset="default/clusterset1" +I1018 11:09:42.833793 617076 memberclusterannounce_controller.go:281] "Removing member cluster from the ClusterSet" cluster="east" ClusterSet="mcs1/clusterset1" +I1018 11:09:42.835355 617076 memberclusterannounce_controller.go:277] "Member cluster not found in ClusterSet" ClusterSet="clusterset1" cluster="not-exist" +I1018 11:09:42.836443 617076 memberclusterannounce_controller.go:219] "Added member cluster" cluster=east +I1018 11:09:42.837369 617076 memberclusterannounce_controller.go:219] "Added member cluster" cluster=east +I1018 11:09:42.837420 617076 memberclusterannounce_controller.go:227] "Removed member cluster" cluster=east +I1018 11:09:42.838141 617076 memberclusterannounce_controller.go:219] "Added member cluster" cluster=east +I1018 11:09:42.838921 617076 memberclusterannounce_controller.go:219] "Added member cluster" cluster=east +I1018 11:09:42.839410 617076 memberclusterannounce_controller.go:111] "Adding member cluster to ClusterSet" cluster="east" +I1018 11:09:42.839748 617076 memberclusterannounce_controller.go:248] "Member cluster already exists in ClusterSet" cluster="east" ClusterSet="clusterset1" +I1018 11:09:42.839808 617076 memberclusterannounce_controller.go:116] "Adding finalizer to MemberClusterAnnounce" MemberClusterAnnounce="mcs1/member-announce-from-east" +E1018 11:09:44.859549 617076 node_controller.go:121] "There is no valid Gateway IP for Node" err="no valid IP address for Gateway Node node-1" node="node-1" +I1018 11:09:44.862593 617076 node_controller.go:253] "Found good Gateway candidate" node="node-2" +I1018 11:09:44.865104 617076 node_controller.go:253] "Found good Gateway candidate" node="node-2" +E1018 11:09:44.867278 617076 node_controller.go:121] "There is no valid Gateway IP for Node" err="the Gateway IP annotation invalid-gatewayip on Node node-4 is not a valid IP address" node="node-4" +I1018 11:09:44.867753 617076 node_controller.go:253] "Found good Gateway candidate" node="node-2" +I1018 11:09:44.873295 617076 resourceexport_controller.go:232] "Cleaning up ResourceImport" resourceimport="default/default-nginx-service" +I1018 11:09:44.894669 617076 clusterinfoexport_handler.go:81] "Updating ResourceImport" resourceimport="default/cluster-b-default-clusterinfo" +I1018 11:09:44.903415 617076 serviceexport_controller.go:207] "It's not allowed to export the multi-cluster controller auto-generated Service" service="default/antrea-mc-nginx" +I1018 11:09:44.908208 617076 serviceexport_controller.go:300] "Service has new changes, update ResourceExport" service="default/nginx1" resourceexport="default/cluster-a-default-nginx1-service" +I1018 11:09:44.908315 617076 serviceexport_controller.go:569] "Creating ResourceExport" resourceexport="default/cluster-a-default-nginx1-service" +I1018 11:09:44.908694 617076 serviceexport_controller.go:315] "Endpoints have new change, update ResourceExport" endpoints="default/nginx1" resourceexport="default/cluster-a-default-nginx1-endpoints" +I1018 11:09:44.908803 617076 serviceexport_controller.go:569] "Creating ResourceExport" resourceexport="default/cluster-a-default-nginx1-endpoints" +I1018 11:09:44.912478 617076 serviceexport_controller.go:300] "Service has new changes, update ResourceExport" service="default/nginx" resourceexport="default/cluster-a-default-nginx-service" +I1018 11:09:44.912570 617076 serviceexport_controller.go:569] "Creating ResourceExport" resourceexport="default/cluster-a-default-nginx-service" +I1018 11:09:44.912849 617076 serviceexport_controller.go:315] "Endpoints have new change, update ResourceExport" endpoints="default/nginx" resourceexport="default/cluster-a-default-nginx-endpoints" +I1018 11:09:44.912934 617076 serviceexport_controller.go:569] "Creating ResourceExport" resourceexport="default/cluster-a-default-nginx-endpoints" +I1018 11:09:44.915011 617076 serviceexport_controller.go:300] "Service has new changes, update ResourceExport" service="default/nginx" resourceexport="default/cluster-a-default-nginx-service" +I1018 11:09:44.915557 617076 serviceexport_controller.go:315] "Endpoints have new change, update ResourceExport" endpoints="default/nginx" resourceexport="default/cluster-a-default-nginx-endpoints" +I1018 11:09:44.917314 617076 serviceexport_controller.go:300] "Service has new changes, update ResourceExport" service="default/nginx" resourceexport="default/cluster-a-default-nginx-service" +I1018 11:09:44.917797 617076 serviceexport_controller.go:315] "Endpoints have new change, update ResourceExport" endpoints="default/nginx" resourceexport="default/cluster-a-default-nginx-endpoints" +I1018 11:09:44.919510 617076 serviceexport_controller.go:256] "Service has been converted into ResourceExport and no change, skip it" service="default/nginx" resourceexport="default/cluster-a-default-nginx-service" +I1018 11:09:44.919573 617076 serviceexport_controller.go:269] "Endpoints has been converted into ResourceExport and no change, skip it" endpoints="default/nginx" resourceexport="default/cluster-a-default-nginx-endpoints" +I1018 11:09:44.921810 617076 stale_controller.go:184] "Cleaning up stale imported Service" service="default/nginx" +I1018 11:09:44.921871 617076 stale_controller.go:191] "Cleaning up stale ServiceImport" serviceimport="default/nginx" +I1018 11:09:44.924849 617076 stale_controller.go:218] "Cleaning up stale imported ACNP" acnp="antrea-mc-some-deleted-resimp" +I1018 11:09:44.931224 617076 stale_controller.go:301] "Cleaning up stale ResourceExport" ResourceExport="default/cluster-a-default-nginx-service" +I1018 11:09:44.931444 617076 stale_controller.go:301] "Cleaning up stale ResourceExport" ResourceExport="default/cluster-a-default-nginx-endpoint" +I1018 11:09:44.931882 617076 stale_controller.go:368] "Cleaning up stale ClusterInfo kind of ResourceExport" resourceexport="default/cluster-a-clusterinfo" +I1018 11:09:44.933888 617076 stale_controller.go:344] "Cleaning up stale ResourceExport" ResourceExport="default/cluster-a-fe2634b306c51bd3" +I1018 11:09:44.937613 617076 stale_controller.go:243] "Cleaning up stale ClusterInfoImport" clusterinfoimport="default/cluster-b-default-clusterinfo" +I1018 11:09:44.942626 617076 stale_controller.go:389] "Cleaning up stale MemberClusterAnnounce. It has not been updated within the agreed period" MemberClusterAnnounce="default/member-cluster-from-cluster-outdated" agreedPeriod="5m0s" +FAIL +coverage: 3.2% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +FAIL antrea.io/antrea/multicluster/controllers/multicluster 3.125s +ok antrea.io/antrea/multicluster/controllers/multicluster/common 0.506s coverage: 0.8% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +ok antrea.io/antrea/multicluster/controllers/multicluster/commonarea 1.486s coverage: 1.5% of statements in antrea.io/antrea/cmd/..., antrea.io/antrea/pkg/..., antrea.io/antrea/multicluster/cmd/..., antrea.io/antrea/multicluster/controllers/... +FAIL diff --git a/a.logs b/a.logs new file mode 100644 index 00000000000..1ce4206ba13 --- /dev/null +++ b/a.logs @@ -0,0 +1,305 @@ +I1011 13:52:55.006469 1 log_file.go:93] Set log file max size to 104857600 +I1011 13:52:55.007453 1 agent.go:96] Starting Antrea agent (version v1.9.0-dev-0dceb752.dirty) +I1011 13:52:55.007486 1 client.go:87] No kubeconfig file was specified. Falling back to in-cluster config +I1011 13:52:55.008079 1 prometheus.go:171] Initializing prometheus metrics +I1011 13:52:55.008224 1 ovs_client.go:70] Connecting to OVSDB at address /var/run/openvswitch/db.sock +I1011 13:52:55.008536 1 agent.go:361] Setting up node network +I1011 13:52:55.029978 1 agent.go:950] "Setting Node MTU" MTU=1450 +I1011 13:52:55.030617 1 ovs_client.go:113] Bridge exists: 0f59126c-82e4-45cf-bac0-0696844bdb40 +I1011 13:52:55.047975 1 agent.go:1091] Using round number 16 +I1011 13:52:55.048516 1 ofctrl.go:172] Initialize connection or re-connect to /var/run/openvswitch/br-int.mgmt. +I1011 13:52:55.136975 1 route_linux.go:163] Initialized iptables +I1011 13:52:56.049944 1 ofctrl.go:187] Connected to socket /var/run/openvswitch/br-int.mgmt +I1011 13:52:56.050399 1 ofctrl.go:249] New connection.. +I1011 13:52:56.050458 1 ofctrl.go:257] Sent hello with OF version: 6 +I1011 13:52:56.050556 1 ofctrl.go:269] Received Openflow 1.5 Hello message +I1011 13:52:56.051274 1 ofctrl.go:289] Received ofp1.5 Switch feature response: {Header:{Version:6 Type:6 Length:32 Xid:3} DPID:00:00:6e:12:59:0f:cf:45 Buffers:0 NumTables:254 AuxilaryId:0 pad:[0 0] Capabilities:591 Reserved:0} +I1011 13:52:56.053258 1 ofSwitch.go:85] Openflow Connection for new switch: 00:00:6e:12:59:0f:cf:45 +I1011 13:52:56.054983 1 ofctrl_bridge.go:325] OFSwitch is connected: 00:00:6e:12:59:0f:cf:45 +I1011 13:52:56.178354 1 agent.go:452] Agent initialized NodeConfig=NodeName: vcesd2, OVSBridge: br-int, PodIPv4CIDR: 172.25.0.0/24, PodIPv6CIDR: , NodeIPv4: 172.25.55.29/24, NodeIPv6: , TransportIPv4: 172.25.55.29/24, TransportIPv6: , Gateway: Name antrea-gw0: IPv4 172.25.0.1, IPv6 , MAC 62:3d:8d:a2:1b:bf, NetworkConfig=&{encap geneve 0 None {psk } [] true false} +I1011 13:52:56.178786 1 metrics.go:138] Registering Antrea Proxy prometheus metrics +I1011 13:52:56.185938 1 fqdn.go:186] "Using kube-dns Service for DNS requests" dnsServer="10.96.0.10:53" +I1011 13:52:56.186071 1 audit_logging.go:177] "Initialized Antrea-native Policy Logger for audit logging" logFile="/var/log/antrea/networkpolicy/np.log" +I1011 13:52:56.194266 1 server.go:743] Reconciliation for CNI server +W1011 13:52:56.239485 1 agent.go:589] flow-restore-wait was not true before the delete call was made, will retry +W1011 13:52:56.440398 1 agent.go:589] flow-restore-wait was not true before the delete call was made, will retry +W1011 13:52:56.640334 1 agent.go:589] flow-restore-wait was not true before the delete call was made, will retry +W1011 13:52:56.841354 1 agent.go:589] flow-restore-wait was not true before the delete call was made, will retry +W1011 13:52:57.041357 1 agent.go:589] flow-restore-wait was not true before the delete call was made, will retry +W1011 13:52:57.241266 1 agent.go:589] flow-restore-wait was not true before the delete call was made, will retry +W1011 13:52:57.440902 1 agent.go:589] flow-restore-wait was not true before the delete call was made, will retry +W1011 13:52:57.640986 1 agent.go:589] flow-restore-wait was not true before the delete call was made, will retry +W1011 13:52:57.840852 1 agent.go:589] flow-restore-wait was not true before the delete call was made, will retry +W1011 13:52:58.040963 1 agent.go:589] flow-restore-wait was not true before the delete call was made, will retry +W1011 13:52:58.240626 1 agent.go:589] flow-restore-wait was not true before the delete call was made, will retry +W1011 13:52:58.240904 1 agent.go:589] flow-restore-wait was not true before the delete call was made, will retry +I1011 13:52:58.240936 1 agent.go:597] flow-restore-wait was not true, skip cleaning it up +I1011 13:52:58.240950 1 client.go:105] No antrea kubeconfig file was specified. Falling back to in-cluster config +I1011 13:52:58.240969 1 client.go:108] Didn't get CA certificate, skip updating Antrea Client +I1011 13:52:58.241046 1 client.go:87] No kubeconfig file was specified. Falling back to in-cluster config +I1011 13:52:58.241096 1 channel.go:83] "Starting SubscribableChannel" name="PodUpdate" +I1011 13:52:58.241117 1 log_file.go:121] Starting log file monitoring. Maximum log file number is 4 +I1011 13:52:58.241140 1 route_linux.go:197] Starting iptables sync, with sync interval 1m0s +I1011 13:52:58.241234 1 node_route_controller.go:362] Starting AntreaAgentNodeRouteController +I1011 13:52:58.241289 1 server.go:677] Starting CNI server +I1011 13:52:58.241308 1 shared_informer.go:255] Waiting for caches to sync for AntreaAgentNodeRouteController +I1011 13:52:58.241437 1 configmap_cafile_content.go:202] "Starting controller" name="antrea-ca::kube-system::antrea-ca::ca.crt" +I1011 13:52:58.241479 1 networkpolicy_controller.go:447] Waiting for Antrea client to be ready +I1011 13:52:58.241491 1 shared_informer.go:255] Waiting for caches to sync for antrea-ca::kube-system::antrea-ca::ca.crt +I1011 13:52:58.241570 1 server.go:687] CNI server is listening ... +I1011 13:52:58.241647 1 controller.go:443] "Starting " controller="SecondaryNetworkController" +I1011 13:52:58.241700 1 shared_informer.go:255] Waiting for caches to sync for SecondaryNetworkController +I1011 13:52:58.241819 1 log_file.go:182] Deleted log file antrea-agent.vcesd2.root.log.INFO.20221011-104429.1 +I1011 13:52:58.241817 1 controller.go:168] Starting ExternalIPPoolController +I1011 13:52:58.241848 1 config.go:132] Starting endpoints config controller +I1011 13:52:58.241861 1 shared_informer.go:255] Waiting for caches to sync for endpoints config +I1011 13:52:58.241862 1 shared_informer.go:255] Waiting for caches to sync for ExternalIPPoolController +I1011 13:52:58.241894 1 log_file.go:182] Deleted log file antrea-agent.vcesd2.root.log.WARNING.20221011-104433.1 +I1011 13:52:58.241890 1 traceflow_controller.go:170] Starting AntreaAgentTraceflowController +I1011 13:52:58.241925 1 config.go:223] Starting service config controller +I1011 13:52:58.241936 1 shared_informer.go:255] Waiting for caches to sync for service config +I1011 13:52:58.241953 1 log_file.go:182] Deleted log file antrea-agent.vcesd2.root.log.WARNING.20221010-112031.1 +I1011 13:52:58.241947 1 shared_informer.go:255] Waiting for caches to sync for AntreaAgentTraceflowController +I1011 13:52:58.241980 1 cluster.go:323] "Starting" controllerName="MemberListCluster" +I1011 13:52:58.242008 1 collector.go:86] Start collecting metrics +I1011 13:52:58.242015 1 log_file.go:182] Deleted log file antrea-agent.vcesd2.root.log.ERROR.20221010-010855.1 +I1011 13:52:58.242023 1 shared_informer.go:255] Waiting for caches to sync for MemberListCluster +I1011 13:52:58.242040 1 egress_controller.go:307] Starting AntreaAgentEgressController +I1011 13:52:58.242253 1 local_ip_detector_linux.go:59] Starting localIPDetector +I1011 13:52:58.242249 1 shared_informer.go:255] Waiting for caches to sync for AntreaAgentEgressController +I1011 13:52:58.242307 1 agent.go:49] Starting Antrea Agent Monitor +I1011 13:52:58.342504 1 shared_informer.go:262] Caches are synced for SecondaryNetworkController +I1011 13:52:58.342582 1 shared_informer.go:262] Caches are synced for service config +I1011 13:52:58.342629 1 shared_informer.go:262] Caches are synced for endpoints config +I1011 13:52:58.342636 1 controller.go:248] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-controller-manager-vcesd2" +I1011 13:52:58.342660 1 shared_informer.go:262] Caches are synced for antrea-ca::kube-system::antrea-ca::ca.crt +I1011 13:52:58.342717 1 controller.go:248] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-sriov-device-plugin-amd64-k4ng7" +I1011 13:52:58.342671 1 controller.go:248] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-scheduler-vcesd2" +I1011 13:52:58.342800 1 controller.go:248] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/coredns-64897985d-2m558" +I1011 13:52:58.342800 1 controller.go:248] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-proxy-cstz7" +I1011 13:52:58.342820 1 controller.go:248] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/coredns-64897985d-gsc8n" +I1011 13:52:58.342833 1 controller.go:248] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/antrea-agent-29c5m" +I1011 13:52:58.342850 1 controller.go:248] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/antrea-controller-59cbc8f559-gtsfl" +I1011 13:52:58.342762 1 controller.go:248] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/etcd-vcesd2" +I1011 13:52:58.342878 1 controller.go:248] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-apiserver-vcesd2" +I1011 13:52:58.342925 1 shared_informer.go:262] Caches are synced for AntreaAgentTraceflowController +I1011 13:52:58.342934 1 shared_informer.go:262] Caches are synced for ExternalIPPoolController +I1011 13:52:58.342936 1 shared_informer.go:262] Caches are synced for AntreaAgentEgressController +I1011 13:52:58.343025 1 shared_informer.go:262] Caches are synced for AntreaAgentNodeRouteController +I1011 13:52:58.343061 1 node_route_controller.go:315] Reconciliation for AntreaAgentNodeRouteController +I1011 13:52:58.342927 1 shared_informer.go:262] Caches are synced for MemberListCluster +I1011 13:52:58.343150 1 client.go:105] No antrea kubeconfig file was specified. Falling back to in-cluster config +I1011 13:52:58.343306 1 egress_controller.go:766] Starting watch for EgressGroup +W1011 13:52:58.343326 1 egress_controller.go:769] Failed to get antrea client: Antrea client is not ready +I1011 13:52:58.343446 1 client.go:130] Updating Antrea client with the new CA bundle +I1011 13:52:58.344052 1 cluster.go:461] "Processed Node event" eventType=Join nodeName="vcesd2" affectedExternalIPPoolNum=0 +I1011 13:52:58.442345 1 networkpolicy_controller.go:458] Antrea client is ready +I1011 13:52:58.442386 1 networkpolicy_controller.go:473] Waiting for all watchers to complete full sync +I1011 13:52:58.442441 1 networkpolicy_controller.go:711] Starting watch for NetworkPolicy +I1011 13:52:58.442513 1 networkpolicy_controller.go:711] Starting watch for AddressGroup +I1011 13:52:58.442519 1 networkpolicy_controller.go:711] Starting watch for AppliedToGroup +I1011 13:52:58.463210 1 networkpolicy_controller.go:724] Started watch for AddressGroup +I1011 13:52:58.463327 1 networkpolicy_controller.go:754] Received 0 init events for AddressGroup +I1011 13:52:58.463571 1 networkpolicy_controller.go:724] Started watch for AppliedToGroup +I1011 13:52:58.463606 1 networkpolicy_controller.go:724] Started watch for NetworkPolicy +I1011 13:52:58.463640 1 networkpolicy_controller.go:754] Received 0 init events for AppliedToGroup +I1011 13:52:58.463703 1 networkpolicy_controller.go:754] Received 0 init events for NetworkPolicy +I1011 13:52:58.463734 1 networkpolicy_controller.go:475] All watchers have completed full sync, installing flows for init events +I1011 13:52:58.464534 1 networkpolicy_controller.go:479] Starting NetworkPolicy workers now +I1011 13:52:58.464563 1 networkpolicy_controller.go:485] Starting IDAllocator worker to maintain the async rule cache +I1011 13:52:58.464589 1 status_controller.go:209] Starting NetworkPolicy StatusController +I1011 13:52:58.507698 1 serving.go:348] Generated self-signed cert in-memory +I1011 13:52:58.932532 1 requestheader_controller.go:169] Starting RequestHeaderAuthRequestController +I1011 13:52:58.932562 1 shared_informer.go:255] Waiting for caches to sync for RequestHeaderAuthRequestController +I1011 13:52:58.932570 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" +I1011 13:52:58.932576 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" +I1011 13:52:58.932597 1 shared_informer.go:255] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file +I1011 13:52:58.932588 1 shared_informer.go:255] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file +I1011 13:52:58.932997 1 secure_serving.go:210] Serving securely on [::]:10350 +I1011 13:52:58.933114 1 tlsconfig.go:240] "Starting DynamicServingCertificateController" +I1011 13:52:59.033620 1 shared_informer.go:262] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file +I1011 13:52:59.033577 1 shared_informer.go:262] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file +I1011 13:52:59.033774 1 shared_informer.go:262] Caches are synced for RequestHeaderAuthRequestController +I1011 13:53:03.343854 1 egress_controller.go:766] Starting watch for EgressGroup +I1011 13:53:03.355746 1 egress_controller.go:787] Started watch for EgressGroup +I1011 13:53:03.355866 1 egress_controller.go:815] Received 0 init events for EgressGroup +I1011 13:53:05.934439 1 controller.go:248] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/antrea-agent-29c5m" +I1011 13:53:06.178518 1 agent.go:527] Deleting stale flows from previous round if any +I1011 13:53:06.178565 1 agent.go:459] Persisting round number 16 to OVSDB +I1011 13:53:06.179466 1 agent.go:464] Round number 16 was persisted to OVSDB +I1011 13:59:08.067886 1 server.go:425] Received CmdAdd request cni_args:{container_id:"cb62ff12c9b7bc3cf6979b44b9ecc88fe58492edf64a5e38e815680c4c018e15" netns:"/proc/2017966/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec1;K8S_POD_INFRA_CONTAINER_ID=cb62ff12c9b7bc3cf6979b44b9ecc88fe58492edf64a5e38e815680c4c018e15" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1011 13:59:08.068654 1 server.go:425] Received CmdAdd request cni_args:{container_id:"d721930ef4107f7568379c624f01c8c643fade1de9000caacbc58f1547c43b40" netns:"/proc/2017938/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec3;K8S_POD_INFRA_CONTAINER_ID=d721930ef4107f7568379c624f01c8c643fade1de9000caacbc58f1547c43b40" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1011 13:59:08.074071 1 server.go:495] "Allocated IP addresses" container="cb62ff12c9b7bc3cf6979b44b9ecc88fe58492edf64a5e38e815680c4c018e15" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.54 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1011 13:59:08.074595 1 server.go:495] "Allocated IP addresses" container="d721930ef4107f7568379c624f01c8c643fade1de9000caacbc58f1547c43b40" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.55 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1011 13:59:08.079207 1 server.go:425] Received CmdAdd request cni_args:{container_id:"7cb7ef158891124955d12800d1136a9a0588976116582cfa6b759bcfd6bc3e27" netns:"/proc/2017950/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec2;K8S_POD_INFRA_CONTAINER_ID=7cb7ef158891124955d12800d1136a9a0588976116582cfa6b759bcfd6bc3e27" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1011 13:59:08.085058 1 server.go:495] "Allocated IP addresses" container="7cb7ef158891124955d12800d1136a9a0588976116582cfa6b759bcfd6bc3e27" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.56 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1011 13:59:08.255094 1 pod_configuration.go:265] Configured interfaces for container d721930ef4107f7568379c624f01c8c643fade1de9000caacbc58f1547c43b40 +I1011 13:59:08.255150 1 server.go:522] CmdAdd for container d721930ef4107f7568379c624f01c8c643fade1de9000caacbc58f1547c43b40 succeeded +I1011 13:59:08.255207 1 pod_configuration.go:265] Configured interfaces for container cb62ff12c9b7bc3cf6979b44b9ecc88fe58492edf64a5e38e815680c4c018e15 +I1011 13:59:08.255236 1 server.go:522] CmdAdd for container cb62ff12c9b7bc3cf6979b44b9ecc88fe58492edf64a5e38e815680c4c018e15 succeeded +I1011 13:59:08.255312 1 pod_configuration.go:265] Configured interfaces for container 7cb7ef158891124955d12800d1136a9a0588976116582cfa6b759bcfd6bc3e27 +I1011 13:59:08.255445 1 server.go:522] CmdAdd for container 7cb7ef158891124955d12800d1136a9a0588976116582cfa6b759bcfd6bc3e27 succeeded +I1011 13:59:09.120331 1 controller.go:395] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1011 13:59:09.130996 1 controller.go:395] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1011 13:59:09.133188 1 controller.go:397] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:a30314d2-6a37-4b52-b1de-2f57af14c31c ResourceVersion:21443 Generation:1 CreationTimestamp:2022-10-10 08:19:55 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-10 08:19:55 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec1" +I1011 13:59:09.133283 1 controller.go:403] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:a30314d2-6a37-4b52-b1de-2f57af14c31c ResourceVersion:21443 Generation:1 CreationTimestamp:2022-10-10 08:19:55 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-10 08:19:55 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1011 13:59:09.133375 1 controller.go:409] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1011 13:59:09.133493 1 controller.go:420] "INTEL - networkConfig.Type IS ANTREA" +I1011 13:59:09.133515 1 controller.go:426] "INTEL - networkConfig.NetworkType IS SRIOV" +I1011 13:59:09.134535 1 controller.go:397] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:a30314d2-6a37-4b52-b1de-2f57af14c31c ResourceVersion:21443 Generation:1 CreationTimestamp:2022-10-10 08:19:55 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-10 08:19:55 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec2" +I1011 13:59:09.134626 1 controller.go:403] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:a30314d2-6a37-4b52-b1de-2f57af14c31c ResourceVersion:21443 Generation:1 CreationTimestamp:2022-10-10 08:19:55 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-10 08:19:55 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1011 13:59:09.134715 1 controller.go:409] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1011 13:59:09.134758 1 controller.go:420] "INTEL - networkConfig.Type IS ANTREA" +I1011 13:59:09.134775 1 controller.go:426] "INTEL - networkConfig.NetworkType IS SRIOV" +I1011 13:59:09.145634 1 controller.go:395] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1011 13:59:09.149559 1 controller.go:397] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:a30314d2-6a37-4b52-b1de-2f57af14c31c ResourceVersion:21443 Generation:1 CreationTimestamp:2022-10-10 08:19:55 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-10 08:19:55 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec3" +I1011 13:59:09.149655 1 controller.go:403] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:a30314d2-6a37-4b52-b1de-2f57af14c31c ResourceVersion:21443 Generation:1 CreationTimestamp:2022-10-10 08:19:55 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-10 08:19:55 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1011 13:59:09.149739 1 controller.go:409] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1011 13:59:09.149784 1 controller.go:420] "INTEL - networkConfig.Type IS ANTREA" +I1011 13:59:09.149802 1 controller.go:426] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-11T13:59:09Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-11T13:59:09Z [debug] Beginning IPAM for ContainerID: 7cb7ef158891124955d12800d1136a9a0588976116582cfa6b759bcfd6bc3e27 +2022-10-11T13:59:09Z [debug] Started leader election +I1011 13:59:09.223414 513 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1011 13:59:09.235035 513 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-11T13:59:09Z [debug] OnStartedLeading() called +2022-10-11T13:59:09Z [debug] Elected as leader, do processing +2022-10-11T13:59:09Z [debug] IPManagement -- mode: 0 / containerID: 7cb7ef158891124955d12800d1136a9a0588976116582cfa6b759bcfd6bc3e27 / podRef: kube-system/testpodsec2 +2022-10-11T13:59:09Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-11T13:59:09Z [debug] Reserving IP: |148.14.24.5 7cb7ef158891124955d12800d1136a9a0588976116582cfa6b759bcfd6bc3e27| +2022-10-11T13:59:09Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.5 +2022-10-11T13:59:09Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.5 GenerateName: Namespace:kube-system SelfLink: UID:650c0fa1-e751-4346-b916-b564b10da83c ResourceVersion:172965 Generation:1 CreationTimestamp:2022-10-11 13:59:09 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-11 13:59:09 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:7cb7ef158891124955d12800d1136a9a0588976116582cfa6b759bcfd6bc3e27 PodRef:kube-system/testpodsec2}} +2022-10-11T13:59:09Z [debug] OnStoppedLeading() called +2022-10-11T13:59:09Z [debug] Finished leader election +2022-10-11T13:59:09Z [debug] IPManagement: {148.14.24.5 ffffff00}, +I1011 13:59:09.356335 1 sriov.go:118] Configured interfaces for container 7cb7ef158891124955d12800d1136a9a0588976116582cfa6b759bcfd6bc3e27; hostIface: {Name:dev172 Mac:6e:1c:6d:84:57:02 Sandbox:}, containerIface: {Name:eth2 Mac:6e:1c:6d:84:57:02 Sandbox:/host/proc/2017950/ns/net} +I1011 13:59:09.356415 1 controller.go:433] "INTEL - networklist ITERATED" +I1011 13:59:09.356456 1 controller.go:395] "Secondary Network attached to Pod" network=&{Name:virtual-net2 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth3 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1011 13:59:09.361110 1 controller.go:397] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:89ae225e-c198-432e-800c-d3e8e78abb9a ResourceVersion:21444 Generation:1 CreationTimestamp:2022-10-10 08:19:55 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-10 08:19:55 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > Pod="kube-system/testpodsec2" +I1011 13:59:09.361209 1 controller.go:403] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:89ae225e-c198-432e-800c-d3e8e78abb9a ResourceVersion:21444 Generation:1 CreationTimestamp:2022-10-10 08:19:55 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-10 08:19:55 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > +I1011 13:59:09.361301 1 controller.go:409] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.25.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net2\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1011 13:59:09.361348 1 controller.go:420] "INTEL - networkConfig.Type IS ANTREA" +I1011 13:59:09.361370 1 controller.go:426] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-11T13:59:09Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-11T13:59:09Z [debug] Beginning IPAM for ContainerID: 7cb7ef158891124955d12800d1136a9a0588976116582cfa6b759bcfd6bc3e27 +2022-10-11T13:59:09Z [debug] Started leader election +I1011 13:59:09.439040 592 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1011 13:59:09.451834 592 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-11T13:59:09Z [debug] OnStartedLeading() called +2022-10-11T13:59:09Z [debug] Elected as leader, do processing +2022-10-11T13:59:09Z [debug] IPManagement -- mode: 0 / containerID: 7cb7ef158891124955d12800d1136a9a0588976116582cfa6b759bcfd6bc3e27 / podRef: kube-system/testpodsec2 +2022-10-11T13:59:09Z [debug] IterateForAssignment input >> ip: 148.14.25.0 | ipnet: {148.14.25.0 ffffff00} | first IP: 148.14.25.1 | last IP: 148.14.25.254 +2022-10-11T13:59:09Z [debug] Reserving IP: |148.14.25.2 7cb7ef158891124955d12800d1136a9a0588976116582cfa6b759bcfd6bc3e27| +2022-10-11T13:59:09Z [debug] OverlappingRangewide allocation check for IP: 148.14.25.2 +2022-10-11T13:59:09Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.2 GenerateName: Namespace:kube-system SelfLink: UID:8662797c-9a05-411c-ae93-77c6eaff70bb ResourceVersion:172970 Generation:1 CreationTimestamp:2022-10-11 13:59:09 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-11 13:59:09 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:7cb7ef158891124955d12800d1136a9a0588976116582cfa6b759bcfd6bc3e27 PodRef:kube-system/testpodsec2}} +2022-10-11T13:59:09Z [debug] OnStoppedLeading() called +2022-10-11T13:59:09Z [debug] Finished leader election +2022-10-11T13:59:09Z [debug] IPManagement: {148.14.25.2 ffffff00}, +E1011 13:59:09.486301 1 runtime.go:79] Observed a panic: runtime.boundsError{x:0, y:0, signed:true, code:0x0} (runtime error: index out of range [0] with length 0) +goroutine 510 [running]: +k8s.io/apimachinery/pkg/util/runtime.logPanic({0x2348500?, 0xc000778138}) + /go/pkg/mod/k8s.io/apimachinery@v0.24.0/pkg/util/runtime/runtime.go:75 +0x99 +k8s.io/apimachinery/pkg/util/runtime.HandleCrash({0x0, 0x0, 0xc0012fece0?}) + /go/pkg/mod/k8s.io/apimachinery@v0.24.0/pkg/util/runtime/runtime.go:49 +0x75 +panic({0x2348500, 0xc000778138}) + /usr/local/go/src/runtime/panic.go:884 +0x212 +github.com/k8snetworkplumbingwg/sriov-cni/pkg/utils.GetVFLinkNames({0xc0018101a0, 0xc}) + /go/pkg/mod/github.com/k8snetworkplumbingwg/sriov-cni@v2.1.0+incompatible/pkg/utils/utils.go:162 +0x1f6 +antrea.io/antrea/pkg/agent/cniserver.getVFLinkName(...) + /antrea/pkg/agent/cniserver/sriov_linux.go:43 +antrea.io/antrea/pkg/agent/cniserver.(*ifConfigurator).configureContainerSriovLink(0xc0004e7010?, {0xc0009a6a20?, 0x100?}, {0x10001c00114f878?, 0xc0017dc438?}, {0xc00128c080, 0x40}, {0xc000954080, 0x19}, {0xc00099f33c, ...}, ...) + /antrea/pkg/agent/cniserver/interface_configuration_linux.go:222 +0x3ac +antrea.io/antrea/pkg/agent/cniserver.(*ifConfigurator).configureContainerLink(0xc0007c00f0, {0xc000936580, 0xb}, {0xc000936390, 0xb}, {0xc00128c080, 0x40}, {0xc000954080, 0x19}, {0xc00099f33c, ...}, ...) + /antrea/pkg/agent/cniserver/interface_configuration_linux.go:366 +0x425 +antrea.io/antrea/pkg/agent/cniserver.(*podConfigurator).ConfigureSriovSecondaryInterface(0xc0011c3f80, {0xc000936580?, 0xa0?}, {0xc000936390?, 0xb0?}, {0xc00128c080, 0x40}, {0xc000954080, 0x19}, {0xc00099f33c, ...}, ...) + /antrea/pkg/agent/cniserver/sriov.go:107 +0xdf +antrea.io/antrea/pkg/agent/secondarynetwork/podwatch.(*PodController).configureSriovAsSecondaryInterface(0xc0004e6fa0, 0xc001708d00?, 0xc0006bc0b0, 0xc000222000, 0x1?) + /antrea/pkg/agent/secondarynetwork/podwatch/controller.go:338 +0x159 +antrea.io/antrea/pkg/agent/secondarynetwork/podwatch.(*PodController).configureSecondaryInterface(0x0?, 0x0?, 0xc0006bc0b0, 0xc000222000, {0xc001708d00, 0xf9, 0x100}) + /antrea/pkg/agent/secondarynetwork/podwatch/controller.go:378 +0x594 +antrea.io/antrea/pkg/agent/secondarynetwork/podwatch.(*PodController).configureSecondaryNetwork(0xc0004e6fa0, 0x81?, {0xc0001ceae0, 0x2, 0xc00192dd28?}, 0x1437ea6?) + /antrea/pkg/agent/secondarynetwork/podwatch/controller.go:428 +0x906 +antrea.io/antrea/pkg/agent/secondarynetwork/podwatch.(*PodController).handleAddUpdatePod(0xc0004e6fa0, {0x2494660?, 0xc000f21c00}) + /antrea/pkg/agent/secondarynetwork/podwatch/controller.go:271 +0x336 +antrea.io/antrea/pkg/agent/secondarynetwork/podwatch.(*PodController).syncPod(0xc0004e6fa0, {0xc0009ac570, 0x17}) + /antrea/pkg/agent/secondarynetwork/podwatch/controller.go:304 +0x67 +antrea.io/antrea/pkg/agent/secondarynetwork/podwatch.(*PodController).processNextWorkItem(0xc0004e6fa0) + /antrea/pkg/agent/secondarynetwork/podwatch/controller.go:323 +0xde +antrea.io/antrea/pkg/agent/secondarynetwork/podwatch.(*PodController).Worker(0xc0006ac6a0?) + /antrea/pkg/agent/secondarynetwork/podwatch/controller.go:311 +0x25 +k8s.io/apimachinery/pkg/util/wait.BackoffUntil.func1(0x10000000000?) + /go/pkg/mod/k8s.io/apimachinery@v0.24.0/pkg/util/wait/wait.go:155 +0x3e +k8s.io/apimachinery/pkg/util/wait.BackoffUntil(0xc00093e1e0?, {0x28640a0, 0xc000c3e000}, 0x1, 0xc0004ba660) + /go/pkg/mod/k8s.io/apimachinery@v0.24.0/pkg/util/wait/wait.go:156 +0xb6 +k8s.io/apimachinery/pkg/util/wait.JitterUntil(0xc00093e1e0?, 0x3b9aca00, 0x0, 0x80?, 0xc0006ac7d0?) + /go/pkg/mod/k8s.io/apimachinery@v0.24.0/pkg/util/wait/wait.go:133 +0x89 +k8s.io/apimachinery/pkg/util/wait.Until(0x973400?, 0xc000841640?, 0xc0006ac7b8?) + /go/pkg/mod/k8s.io/apimachinery@v0.24.0/pkg/util/wait/wait.go:90 +0x25 +created by antrea.io/antrea/pkg/agent/secondarynetwork/podwatch.(*PodController).Run + /antrea/pkg/agent/secondarynetwork/podwatch/controller.go:448 +0x1ca +panic: runtime error: index out of range [0] with length 0 [recovered] + panic: runtime error: index out of range [0] with length 0 + +goroutine 510 [running]: +k8s.io/apimachinery/pkg/util/runtime.HandleCrash({0x0, 0x0, 0xc0012fece0?}) + /go/pkg/mod/k8s.io/apimachinery@v0.24.0/pkg/util/runtime/runtime.go:56 +0xd7 +panic({0x2348500, 0xc000778138}) + /usr/local/go/src/runtime/panic.go:884 +0x212 +github.com/k8snetworkplumbingwg/sriov-cni/pkg/utils.GetVFLinkNames({0xc0018101a0, 0xc}) + /go/pkg/mod/github.com/k8snetworkplumbingwg/sriov-cni@v2.1.0+incompatible/pkg/utils/utils.go:162 +0x1f6 +antrea.io/antrea/pkg/agent/cniserver.getVFLinkName(...) + /antrea/pkg/agent/cniserver/sriov_linux.go:43 +antrea.io/antrea/pkg/agent/cniserver.(*ifConfigurator).configureContainerSriovLink(0xc0004e7010?, {0xc0009a6a20?, 0x100?}, {0x10001c00114f878?, 0xc0017dc438?}, {0xc00128c080, 0x40}, {0xc000954080, 0x19}, {0xc00099f33c, ...}, ...) + /antrea/pkg/agent/cniserver/interface_configuration_linux.go:222 +0x3ac +antrea.io/antrea/pkg/agent/cniserver.(*ifConfigurator).configureContainerLink(0xc0007c00f0, {0xc000936580, 0xb}, {0xc000936390, 0xb}, {0xc00128c080, 0x40}, {0xc000954080, 0x19}, {0xc00099f33c, ...}, ...) + /antrea/pkg/agent/cniserver/interface_configuration_linux.go:366 +0x425 +antrea.io/antrea/pkg/agent/cniserver.(*podConfigurator).ConfigureSriovSecondaryInterface(0xc0011c3f80, {0xc000936580?, 0xa0?}, {0xc000936390?, 0xb0?}, {0xc00128c080, 0x40}, {0xc000954080, 0x19}, {0xc00099f33c, ...}, ...) + /antrea/pkg/agent/cniserver/sriov.go:107 +0xdf +antrea.io/antrea/pkg/agent/secondarynetwork/podwatch.(*PodController).configureSriovAsSecondaryInterface(0xc0004e6fa0, 0xc001708d00?, 0xc0006bc0b0, 0xc000222000, 0x1?) + /antrea/pkg/agent/secondarynetwork/podwatch/controller.go:338 +0x159 +antrea.io/antrea/pkg/agent/secondarynetwork/podwatch.(*PodController).configureSecondaryInterface(0x0?, 0x0?, 0xc0006bc0b0, 0xc000222000, {0xc001708d00, 0xf9, 0x100}) + /antrea/pkg/agent/secondarynetwork/podwatch/controller.go:378 +0x594 +antrea.io/antrea/pkg/agent/secondarynetwork/podwatch.(*PodController).configureSecondaryNetwork(0xc0004e6fa0, 0x81?, {0xc0001ceae0, 0x2, 0xc00192dd28?}, 0x1437ea6?) + /antrea/pkg/agent/secondarynetwork/podwatch/controller.go:428 +0x906 +antrea.io/antrea/pkg/agent/secondarynetwork/podwatch.(*PodController).handleAddUpdatePod(0xc0004e6fa0, {0x2494660?, 0xc000f21c00}) + /antrea/pkg/agent/secondarynetwork/podwatch/controller.go:271 +0x336 +antrea.io/antrea/pkg/agent/secondarynetwork/podwatch.(*PodController).syncPod(0xc0004e6fa0, {0xc0009ac570, 0x17}) + /antrea/pkg/agent/secondarynetwork/podwatch/controller.go:304 +0x67 +antrea.io/antrea/pkg/agent/secondarynetwork/podwatch.(*PodController).processNextWorkItem(0xc0004e6fa0) + /antrea/pkg/agent/secondarynetwork/podwatch/controller.go:323 +0xde +antrea.io/antrea/pkg/agent/secondarynetwork/podwatch.(*PodController).Worker(0xc0006ac6a0?) + /antrea/pkg/agent/secondarynetwork/podwatch/controller.go:311 +0x25 +k8s.io/apimachinery/pkg/util/wait.BackoffUntil.func1(0x10000000000?) + /go/pkg/mod/k8s.io/apimachinery@v0.24.0/pkg/util/wait/wait.go:155 +0x3e +k8s.io/apimachinery/pkg/util/wait.BackoffUntil(0xc00093e1e0?, {0x28640a0, 0xc000c3e000}, 0x1, 0xc0004ba660) + /go/pkg/mod/k8s.io/apimachinery@v0.24.0/pkg/util/wait/wait.go:156 +0xb6 +k8s.io/apimachinery/pkg/util/wait.JitterUntil(0xc00093e1e0?, 0x3b9aca00, 0x0, 0x80?, 0xc0006ac7d0?) + /go/pkg/mod/k8s.io/apimachinery@v0.24.0/pkg/util/wait/wait.go:133 +0x89 +k8s.io/apimachinery/pkg/util/wait.Until(0x973400?, 0xc000841640?, 0xc0006ac7b8?) + /go/pkg/mod/k8s.io/apimachinery@v0.24.0/pkg/util/wait/wait.go:90 +0x25 +created by antrea.io/antrea/pkg/agent/secondarynetwork/podwatch.(*PodController).Run + /antrea/pkg/agent/secondarynetwork/podwatch/controller.go:448 +0x1ca diff --git a/a.txt b/a.txt new file mode 100644 index 00000000000..c58e4b015f8 --- /dev/null +++ b/a.txt @@ -0,0 +1,209 @@ +I1012 11:10:43.223487 1 log_file.go:93] Set log file max size to 104857600 +I1012 11:10:43.225750 1 agent.go:96] Starting Antrea agent (version v1.9.0-dev-0dceb752.dirty) +I1012 11:10:43.225800 1 client.go:87] No kubeconfig file was specified. Falling back to in-cluster config +I1012 11:10:43.226952 1 prometheus.go:171] Initializing prometheus metrics +I1012 11:10:43.227510 1 ovs_client.go:70] Connecting to OVSDB at address /var/run/openvswitch/db.sock +I1012 11:10:44.228790 1 ovs_client.go:89] Not connected yet, will try again in 2s +I1012 11:10:44.229244 1 agent.go:361] Setting up node network +I1012 11:10:44.255925 1 agent.go:950] "Setting Node MTU" MTU=1450 +I1012 11:10:44.256765 1 ovs_client.go:113] Bridge exists: 0f59126c-82e4-45cf-bac0-0696844bdb40 +I1012 11:10:44.274651 1 agent.go:1091] Using round number 33 +I1012 11:10:44.275084 1 ofctrl.go:172] Initialize connection or re-connect to /var/run/openvswitch/br-int.mgmt. +I1012 11:10:44.364108 1 route_linux.go:163] Initialized iptables +I1012 11:10:45.275939 1 ofctrl.go:187] Connected to socket /var/run/openvswitch/br-int.mgmt +I1012 11:10:45.276371 1 ofctrl.go:249] New connection.. +I1012 11:10:45.276437 1 ofctrl.go:257] Sent hello with OF version: 6 +I1012 11:10:45.276552 1 ofctrl.go:269] Received Openflow 1.5 Hello message +I1012 11:10:45.277385 1 ofctrl.go:289] Received ofp1.5 Switch feature response: {Header:{Version:6 Type:6 Length:32 Xid:3} DPID:00:00:6e:12:59:0f:cf:45 Buffers:0 NumTables:254 AuxilaryId:0 pad:[0 0] Capabilities:591 Reserved:0} +I1012 11:10:45.277468 1 ofSwitch.go:85] Openflow Connection for new switch: 00:00:6e:12:59:0f:cf:45 +I1012 11:10:45.277981 1 ofctrl_bridge.go:325] OFSwitch is connected: 00:00:6e:12:59:0f:cf:45 +I1012 11:10:45.399849 1 agent.go:452] Agent initialized NodeConfig=NodeName: vcesd2, OVSBridge: br-int, PodIPv4CIDR: 172.25.0.0/24, PodIPv6CIDR: , NodeIPv4: 172.25.55.29/24, NodeIPv6: , TransportIPv4: 172.25.55.29/24, TransportIPv6: , Gateway: Name antrea-gw0: IPv4 172.25.0.1, IPv6 , MAC 62:3d:8d:a2:1b:bf, NetworkConfig=&{encap geneve 0 None {psk } [] true false} +I1012 11:10:45.402085 1 metrics.go:138] Registering Antrea Proxy prometheus metrics +I1012 11:10:45.408129 1 fqdn.go:186] "Using kube-dns Service for DNS requests" dnsServer="10.96.0.10:53" +I1012 11:10:45.408278 1 audit_logging.go:177] "Initialized Antrea-native Policy Logger for audit logging" logFile="/var/log/antrea/networkpolicy/np.log" +I1012 11:10:45.414392 1 server.go:743] Reconciliation for CNI server +I1012 11:10:45.441481 1 agent.go:609] Cleaning up flow-restore-wait config +I1012 11:10:45.442341 1 agent.go:622] Cleaned up flow-restore-wait config +I1012 11:10:45.442358 1 client.go:105] No antrea kubeconfig file was specified. Falling back to in-cluster config +I1012 11:10:45.442367 1 client.go:108] Didn't get CA certificate, skip updating Antrea Client +I1012 11:10:45.442411 1 client.go:87] No kubeconfig file was specified. Falling back to in-cluster config +I1012 11:10:45.442446 1 channel.go:83] "Starting SubscribableChannel" name="PodUpdate" +I1012 11:10:45.442493 1 log_file.go:121] Starting log file monitoring. Maximum log file number is 4 +I1012 11:10:45.442563 1 node_route_controller.go:362] Starting AntreaAgentNodeRouteController +I1012 11:10:45.442620 1 shared_informer.go:255] Waiting for caches to sync for AntreaAgentNodeRouteController +I1012 11:10:45.442669 1 route_linux.go:197] Starting iptables sync, with sync interval 1m0s +I1012 11:10:45.442692 1 server.go:677] Starting CNI server +I1012 11:10:45.442734 1 configmap_cafile_content.go:202] "Starting controller" name="antrea-ca::kube-system::antrea-ca::ca.crt" +I1012 11:10:45.442774 1 shared_informer.go:255] Waiting for caches to sync for antrea-ca::kube-system::antrea-ca::ca.crt +I1012 11:10:45.442938 1 networkpolicy_controller.go:447] Waiting for Antrea client to be ready +I1012 11:10:45.442981 1 server.go:687] CNI server is listening ... +I1012 11:10:45.442995 1 cluster.go:323] "Starting" controllerName="MemberListCluster" +I1012 11:10:45.443058 1 shared_informer.go:255] Waiting for caches to sync for MemberListCluster +I1012 11:10:45.443072 1 traceflow_controller.go:170] Starting AntreaAgentTraceflowController +I1012 11:10:45.443088 1 shared_informer.go:255] Waiting for caches to sync for AntreaAgentTraceflowController +I1012 11:10:45.443098 1 log_file.go:182] Deleted log file antrea-agent.vcesd2.root.log.INFO.20221012-104620.1 +I1012 11:10:45.443164 1 controller.go:168] Starting ExternalIPPoolController +I1012 11:10:45.443205 1 log_file.go:182] Deleted log file antrea-agent.vcesd2.root.log.WARNING.20221012-102701.1 +I1012 11:10:45.443226 1 shared_informer.go:255] Waiting for caches to sync for ExternalIPPoolController +I1012 11:10:45.443222 1 egress_controller.go:307] Starting AntreaAgentEgressController +I1012 11:10:45.443299 1 shared_informer.go:255] Waiting for caches to sync for AntreaAgentEgressController +I1012 11:10:45.443359 1 local_ip_detector_linux.go:59] Starting localIPDetector +I1012 11:10:45.443531 1 config.go:132] Starting endpoints config controller +I1012 11:10:45.443549 1 shared_informer.go:255] Waiting for caches to sync for endpoints config +I1012 11:10:45.443561 1 config.go:223] Starting service config controller +I1012 11:10:45.443619 1 shared_informer.go:255] Waiting for caches to sync for service config +I1012 11:10:45.443628 1 controller.go:454] "Starting " controller="SecondaryNetworkController" +I1012 11:10:45.443660 1 agent.go:49] Starting Antrea Agent Monitor +I1012 11:10:45.443699 1 shared_informer.go:255] Waiting for caches to sync for SecondaryNetworkController +I1012 11:10:45.443744 1 collector.go:86] Start collecting metrics +I1012 11:10:45.543192 1 shared_informer.go:262] Caches are synced for antrea-ca::kube-system::antrea-ca::ca.crt +I1012 11:10:45.543286 1 shared_informer.go:262] Caches are synced for AntreaAgentNodeRouteController +I1012 11:10:45.543330 1 node_route_controller.go:315] Reconciliation for AntreaAgentNodeRouteController +I1012 11:10:45.543338 1 shared_informer.go:262] Caches are synced for AntreaAgentTraceflowController +I1012 11:10:45.543412 1 shared_informer.go:262] Caches are synced for AntreaAgentEgressController +I1012 11:10:45.543497 1 shared_informer.go:262] Caches are synced for MemberListCluster +I1012 11:10:45.543595 1 shared_informer.go:262] Caches are synced for ExternalIPPoolController +I1012 11:10:45.543636 1 client.go:105] No antrea kubeconfig file was specified. Falling back to in-cluster config +I1012 11:10:45.543688 1 shared_informer.go:262] Caches are synced for endpoints config +I1012 11:10:45.543707 1 egress_controller.go:766] Starting watch for EgressGroup +W1012 11:10:45.543722 1 egress_controller.go:769] Failed to get antrea client: Antrea client is not ready +I1012 11:10:45.543746 1 shared_informer.go:262] Caches are synced for service config +I1012 11:10:45.543890 1 shared_informer.go:262] Caches are synced for SecondaryNetworkController +I1012 11:10:45.544014 1 client.go:130] Updating Antrea client with the new CA bundle +I1012 11:10:45.544210 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/etcd-vcesd2" +I1012 11:10:45.544231 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-controller-manager-vcesd2" +I1012 11:10:45.544264 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/coredns-64897985d-hzkht" +I1012 11:10:45.544274 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/antrea-controller-59cbc8f559-724q8" +I1012 11:10:45.544291 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-sriov-device-plugin-amd64-95srr" +I1012 11:10:45.544313 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-scheduler-vcesd2" +I1012 11:10:45.544337 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-proxy-xp5bq" +I1012 11:10:45.544345 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/coredns-64897985d-ffc47" +I1012 11:10:45.544313 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-apiserver-vcesd2" +I1012 11:10:45.544426 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/antrea-agent-tx8dr" +I1012 11:10:45.544850 1 cluster.go:461] "Processed Node event" eventType=Join nodeName="vcesd2" affectedExternalIPPoolNum=0 +I1012 11:10:45.643764 1 networkpolicy_controller.go:458] Antrea client is ready +I1012 11:10:45.643822 1 networkpolicy_controller.go:473] Waiting for all watchers to complete full sync +I1012 11:10:45.643853 1 networkpolicy_controller.go:711] Starting watch for AddressGroup +I1012 11:10:45.643893 1 networkpolicy_controller.go:711] Starting watch for AppliedToGroup +I1012 11:10:45.643864 1 networkpolicy_controller.go:711] Starting watch for NetworkPolicy +I1012 11:10:45.932310 1 serving.go:348] Generated self-signed cert in-memory +I1012 11:10:46.219530 1 requestheader_controller.go:169] Starting RequestHeaderAuthRequestController +I1012 11:10:46.219564 1 shared_informer.go:255] Waiting for caches to sync for RequestHeaderAuthRequestController +I1012 11:10:46.219574 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" +I1012 11:10:46.219601 1 shared_informer.go:255] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file +I1012 11:10:46.219619 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" +I1012 11:10:46.219665 1 shared_informer.go:255] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file +I1012 11:10:46.219948 1 secure_serving.go:210] Serving securely on [::]:10350 +I1012 11:10:46.220010 1 tlsconfig.go:240] "Starting DynamicServingCertificateController" +I1012 11:10:46.319698 1 shared_informer.go:262] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file +I1012 11:10:46.319820 1 shared_informer.go:262] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file +I1012 11:10:46.319900 1 shared_informer.go:262] Caches are synced for RequestHeaderAuthRequestController +W1012 11:10:46.675566 1 networkpolicy_controller.go:714] Failed to start watch for AddressGroup: Get "https://10.107.224.207:443/apis/controlplane.antrea.io/v1beta2/addressgroups?fieldSelector=nodeName%3Dvcesd2&watch=true": dial tcp 10.107.224.207:443: connect: connection refused +W1012 11:10:46.675595 1 networkpolicy_controller.go:714] Failed to start watch for AppliedToGroup: Get "https://10.107.224.207:443/apis/controlplane.antrea.io/v1beta2/appliedtogroups?fieldSelector=nodeName%3Dvcesd2&watch=true": dial tcp 10.107.224.207:443: connect: connection refused +W1012 11:10:46.675636 1 networkpolicy_controller.go:714] Failed to start watch for NetworkPolicy: Get "https://10.107.224.207:443/apis/controlplane.antrea.io/v1beta2/networkpolicies?fieldSelector=nodeName%3Dvcesd2&watch=true": dial tcp 10.107.224.207:443: connect: connection refused +I1012 11:10:50.544624 1 egress_controller.go:766] Starting watch for EgressGroup +I1012 11:10:50.644362 1 networkpolicy_controller.go:711] Starting watch for AddressGroup +I1012 11:10:50.644457 1 networkpolicy_controller.go:711] Starting watch for AppliedToGroup +I1012 11:10:50.644532 1 networkpolicy_controller.go:711] Starting watch for NetworkPolicy +I1012 11:10:50.842769 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/antrea-controller-59cbc8f559-724q8" +I1012 11:10:51.591038 1 egress_controller.go:787] Started watch for EgressGroup +I1012 11:10:51.591326 1 networkpolicy_controller.go:724] Started watch for AppliedToGroup +I1012 11:10:51.591337 1 egress_controller.go:815] Received 0 init events for EgressGroup +I1012 11:10:51.591424 1 networkpolicy_controller.go:754] Received 0 init events for AppliedToGroup +I1012 11:10:51.591504 1 networkpolicy_controller.go:724] Started watch for NetworkPolicy +I1012 11:10:51.591533 1 networkpolicy_controller.go:724] Started watch for AddressGroup +I1012 11:10:51.591601 1 networkpolicy_controller.go:754] Received 0 init events for AddressGroup +I1012 11:10:51.591638 1 networkpolicy_controller.go:754] Received 0 init events for NetworkPolicy +I1012 11:10:51.591691 1 networkpolicy_controller.go:475] All watchers have completed full sync, installing flows for init events +I1012 11:10:51.592612 1 networkpolicy_controller.go:479] Starting NetworkPolicy workers now +I1012 11:10:51.592647 1 networkpolicy_controller.go:485] Starting IDAllocator worker to maintain the async rule cache +I1012 11:10:51.592681 1 status_controller.go:209] Starting NetworkPolicy StatusController +I1012 11:10:55.400565 1 agent.go:527] Deleting stale flows from previous round if any +I1012 11:10:55.400614 1 agent.go:459] Persisting round number 33 to OVSDB +I1012 11:10:55.401622 1 agent.go:464] Round number 33 was persisted to OVSDB +I1012 11:11:00.851364 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/antrea-agent-tx8dr" +I1012 11:20:45.444142 1 log_file.go:182] Deleted log file antrea-agent.vcesd2.root.log.WARNING.20221012-104622.1 +I1012 12:05:40.985451 1 server.go:425] Received CmdAdd request cni_args:{container_id:"1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8" netns:"/proc/3277680/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec2;K8S_POD_INFRA_CONTAINER_ID=1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:05:40.985815 1 server.go:425] Received CmdAdd request cni_args:{container_id:"4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c" netns:"/proc/3277670/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec3;K8S_POD_INFRA_CONTAINER_ID=4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:05:40.992493 1 server.go:495] "Allocated IP addresses" container="1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.88 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 12:05:40.992858 1 server.go:495] "Allocated IP addresses" container="4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.89 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 12:05:41.094857 1 server.go:425] Received CmdAdd request cni_args:{container_id:"ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50" netns:"/proc/3277699/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec1;K8S_POD_INFRA_CONTAINER_ID=ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:05:41.103371 1 server.go:495] "Allocated IP addresses" container="ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.90 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 12:05:41.163921 1 pod_configuration.go:265] Configured interfaces for container 1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8 +I1012 12:05:41.163960 1 server.go:522] CmdAdd for container 1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8 succeeded +I1012 12:05:41.163963 1 pod_configuration.go:265] Configured interfaces for container 4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c +I1012 12:05:41.163993 1 server.go:522] CmdAdd for container 4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c succeeded +I1012 12:05:41.180512 1 pod_configuration.go:265] Configured interfaces for container ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50 +I1012 12:05:41.180555 1 server.go:522] CmdAdd for container ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50 succeeded +I1012 12:05:41.434696 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:05:41.443588 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:05:41.443642 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:05:41.446876 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:05:41.449860 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:05:41.449898 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:05:42.499240 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:05:42.505125 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:05:42.505165 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:05:43.444051 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:05:43.450463 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:05:43.453030 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:05:43.453072 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:05:43.453396 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:05:43.453446 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:05:44.505866 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:05:44.511677 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:05:44.511721 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:05:47.453850 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:05:47.453922 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:05:47.462403 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:05:47.462447 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:05:47.462646 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:05:47.462675 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:05:48.512951 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:05:48.520540 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:05:48.520583 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:05:55.462988 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:05:55.463034 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:05:55.479525 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:05:55.479569 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:05:55.479606 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:05:55.479654 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:05:56.521285 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:05:56.531969 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:05:56.532012 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:06:11.480824 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:06:11.480863 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:06:11.488517 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:06:11.488562 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:06:11.488522 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:06:11.488620 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:06:12.532187 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:06:12.542697 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:06:12.542741 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:06:43.488834 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:06:43.488874 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:06:43.497187 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:06:43.497232 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:06:43.497512 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:06:43.497555 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:06:44.543226 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:06:44.549004 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:06:44.549055 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:07:47.497784 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:07:47.497848 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:07:47.507669 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:07:47.507742 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:07:47.508017 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:07:47.508068 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:07:48.549887 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:07:48.558654 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:07:48.558695 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:09:47.508871 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:09:47.508922 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:09:47.518239 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:09:47.518286 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:09:47.518609 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:09:47.518672 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:09:48.559792 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:09:48.565655 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:09:48.565704 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" diff --git a/antrea_sec_debug.yml b/antrea_sec_debug.yml new file mode 100644 index 00000000000..8e7c0d8960a --- /dev/null +++ b/antrea_sec_debug.yml @@ -0,0 +1,4794 @@ +--- +# Source: crds/antreaagentinfo.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: antreaagentinfos.crd.antrea.io + labels: + app: antrea +spec: + group: crd.antrea.io + versions: + - name: v1beta1 + served: true + storage: true + schema: + openAPIV3Schema: + type: object + x-kubernetes-preserve-unknown-fields: true + additionalPrinterColumns: + - description: Health status of this Agent + jsonPath: ".agentConditions[?(@.type=='AgentHealthy')].status" + name: Healthy + type: string + - description: Last time the Healthy Condition was updated + jsonPath: ".agentConditions[?(@.type=='AgentHealthy')].lastHeartbeatTime" + name: Last Heartbeat + type: date + - description: Version of this Agent + jsonPath: ".version" + name: Version + type: string + priority: 1 + - description: Node on which this Agent is running + jsonPath: ".nodeRef.name" + name: Node + type: string + priority: 1 + - description: Number of local Pods managed by this Agent + jsonPath: ".localPodNum" + name: Num Pods + type: integer + priority: 2 + - description: Subnets used by this Agent for Pod IPAM + jsonPath: ".nodeSubnets" + name: Subnets + type: string + priority: 2 + scope: Cluster + names: + plural: antreaagentinfos + singular: antreaagentinfo + kind: AntreaAgentInfo + shortNames: + - aai + +--- +# Source: crds/antreacontrollerinfo.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: antreacontrollerinfos.crd.antrea.io + labels: + app: antrea +spec: + group: crd.antrea.io + versions: + - name: v1beta1 + served: true + storage: true + schema: + openAPIV3Schema: + type: object + x-kubernetes-preserve-unknown-fields: true + additionalPrinterColumns: + - description: Health status of the Controller + jsonPath: ".controllerConditions[?(@.type=='ControllerHealthy')].status" + name: Healthy + type: string + - description: Last time the Healthy Condition was updated + jsonPath: ".controllerConditions[?(@.type=='ControllerHealthy')].lastHeartbeatTime" + name: Last Heartbeat + type: date + - description: Version of the Controller + jsonPath: ".version" + name: Version + type: string + priority: 1 + - description: Number of Agents connected to the Controller + jsonPath: ".connectedAgentNum" + name: Connected Agents + type: integer + priority: 1 + - description: Node on which the Controller is running + jsonPath: ".nodeRef.name" + name: Node + type: string + priority: 1 + - description: Number of Network Policies computed by Controller + jsonPath: ".networkPolicyControllerInfo.networkPolicyNum" + name: Num Network Policies + type: integer + priority: 2 + scope: Cluster + names: + plural: antreacontrollerinfos + singular: antreacontrollerinfo + kind: AntreaControllerInfo + shortNames: + - aci + +--- +# Source: crds/clustergroup.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: clustergroups.crd.antrea.io + labels: + app: antrea +spec: + group: crd.antrea.io + versions: + - name: v1alpha2 + served: true + storage: false + schema: + openAPIV3Schema: + type: object + properties: + spec: + type: object + properties: + childGroups: + type: array + items: + type: string + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaceSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + externalEntitySelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + ipBlock: + type: object + properties: + cidr: + type: string + format: cidr + ipBlocks: + type: array + items: + type: object + properties: + cidr: + type: string + format: cidr + serviceReference: + type: object + properties: + name: + type: string + namespace: + type: string + status: + type: object + properties: + conditions: + type: array + items: + type: object + properties: + type: + type: string + status: + type: string + lastTransitionTime: + type: string + - name: v1alpha3 + served: true + storage: true + schema: + openAPIV3Schema: + type: object + properties: + spec: + type: object + properties: + childGroups: + type: array + items: + type: string + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaceSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + externalEntitySelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + ipBlocks: + type: array + items: + type: object + properties: + cidr: + type: string + format: cidr + serviceReference: + type: object + properties: + name: + type: string + namespace: + type: string + status: + type: object + properties: + conditions: + type: array + items: + type: object + properties: + type: + type: string + status: + type: string + lastTransitionTime: + type: string + subresources: + status: {} + conversion: + strategy: Webhook + webhook: + conversionReviewVersions: ["v1", "v1beta1"] + clientConfig: + service: + name: "antrea" + namespace: "kube-system" + path: "/convert/clustergroup" + scope: Cluster + names: + plural: clustergroups + singular: clustergroup + kind: ClusterGroup + shortNames: + - cg + +--- +# Source: crds/clusternetworkpolicy.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: clusternetworkpolicies.crd.antrea.io + labels: + app: antrea +spec: + group: crd.antrea.io + versions: + - name: v1alpha1 + served: true + storage: true + additionalPrinterColumns: + - name: Tier + type: string + description: The Tier to which this ClusterNetworkPolicy belongs to. + jsonPath: .spec.tier + - name: Priority + type: number + format: float + description: The Priority of this ClusterNetworkPolicy relative to other policies. + jsonPath: .spec.priority + - name: Desired Nodes + type: number + format: int32 + description: The total number of Nodes that should realize the NetworkPolicy. + jsonPath: .status.desiredNodesRealized + - name: Current Nodes + type: number + format: int32 + description: The number of Nodes that have realized the NetworkPolicy. + jsonPath: .status.currentNodesRealized + - name: Age + type: date + jsonPath: .metadata.creationTimestamp + schema: + openAPIV3Schema: + type: object + properties: + spec: + # Ensure that Spec.Priority field is set + required: + - priority + type: object + properties: + tier: + type: string + priority: + type: number + format: float + # Ensure that Spec.Priority field is between 1 and 10000 + minimum: 1.0 + maximum: 10000.0 + appliedTo: + type: array + items: + type: object + # Ensure that Spec.AppliedTo does not allow IPBlock field + properties: + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaceSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + group: + type: string + serviceAccount: + type: object + properties: + name: + type: string + namespace: + type: string + required: + - name + - namespace + service: + type: object + properties: + name: + type: string + namespace: + type: string + required: + - name + - namespace + ingress: + type: array + items: + type: object + required: + - action + properties: + appliedTo: + type: array + items: + type: object + # Ensure that rule AppliedTo does not allow IPBlock field + properties: + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaceSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + group: + type: string + serviceAccount: + type: object + properties: + name: + type: string + namespace: + type: string + required: + - name + - namespace + service: + type: object + properties: + name: + type: string + namespace: + type: string + required: + - name + - namespace + # Ensure that Action field allows only ALLOW, DROP, REJECT and PASS values + action: + type: string + enum: ['Allow', 'Drop', 'Reject', 'Pass'] + ports: + type: array + items: + type: object + properties: + protocol: + type: string + enum: ['TCP', 'UDP', 'SCTP'] + port: + x-kubernetes-int-or-string: true + endPort: + type: integer + protocols: + type: array + items: + type: object + oneOf: + - required: [icmp] + - required: [igmp] + properties: + icmp: + type: object + properties: + icmpType: + type: integer + minimum: 0 + maximum: 255 + icmpCode: + type: integer + minimum: 0 + maximum: 255 + igmp: + type: object + properties: + igmpType: + type: integer + # Only IGMP query (0x11) is valid igmpType in ingress rules. + enum: [ 0x11 ] + groupAddress: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + from: + type: array + items: + type: object + properties: + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaceSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaces: + type: object + properties: + match: + enum: + - Self + type: string + ipBlock: + type: object + properties: + cidr: + type: string + format: cidr + group: + type: string + serviceAccount: + type: object + properties: + name: + type: string + namespace: + type: string + required: + - name + - namespace + nodeSelector: + type: object + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + type: array + type: object + type: array + matchLabels: + x-kubernetes-preserve-unknown-fields: true + name: + type: string + enableLogging: + type: boolean + egress: + type: array + items: + type: object + required: + - action + properties: + appliedTo: + type: array + items: + type: object + # Ensure that rule AppliedTo does not allow IPBlock field + properties: + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaceSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + group: + type: string + serviceAccount: + type: object + properties: + name: + type: string + namespace: + type: string + required: + - name + - namespace + # Ensure that Action field allows only ALLOW, DROP, REJECT and PASS values + action: + type: string + enum: ['Allow', 'Drop', 'Reject', 'Pass'] + ports: + type: array + items: + type: object + properties: + protocol: + type: string + enum: ['TCP', 'UDP', 'SCTP'] + port: + x-kubernetes-int-or-string: true + endPort: + type: integer + protocols: + type: array + items: + type: object + oneOf: + - required: [icmp] + - required: [igmp] + properties: + icmp: + type: object + properties: + icmpType: + type: integer + minimum: 0 + maximum: 255 + icmpCode: + type: integer + minimum: 0 + maximum: 255 + igmp: + type: object + properties: + igmpType: + type: integer + # Only IGMP reports are igmpType in egress rules, + # 0x12 is IGMP report V1, 0x16 is IGMP report v2, 0x22 is IGMP report v3. + # It will match all IGMP report types if igmpType is not set. + enum: [ 0x12, 0x16, 0x22 ] + groupAddress: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + to: + type: array + items: + type: object + properties: + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaceSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaces: + type: object + properties: + match: + enum: + - Self + type: string + ipBlock: + type: object + properties: + cidr: + type: string + format: cidr + group: + type: string + fqdn: + type: string + serviceAccount: + type: object + properties: + name: + type: string + namespace: + type: string + required: + - name + - namespace + nodeSelector: + type: object + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + type: array + type: object + type: array + matchLabels: + x-kubernetes-preserve-unknown-fields: true + toServices: + type: array + items: + type: object + required: + - name + - namespace + properties: + name: + type: string + namespace: + type: string + name: + type: string + enableLogging: + type: boolean + status: + type: object + properties: + phase: + type: string + observedGeneration: + type: integer + currentNodesRealized: + type: integer + desiredNodesRealized: + type: integer + conditions: + type: array + items: + type: object + properties: + type: + type: string + status: + type: string + lastTransitionTime: + type: string + reason: + type: string + message: + type: string + subresources: + status: {} + scope: Cluster + names: + plural: clusternetworkpolicies + singular: clusternetworkpolicy + kind: ClusterNetworkPolicy + shortNames: + - acnp + +--- +# Source: crds/egress.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: egresses.crd.antrea.io + labels: + app: antrea +spec: + group: crd.antrea.io + versions: + - name: v1alpha2 + served: true + storage: true + schema: + openAPIV3Schema: + type: object + required: + - spec + properties: + spec: + type: object + required: + - appliedTo + anyOf: + - required: + - egressIP + - required: + - externalIPPool + properties: + appliedTo: + type: object + properties: + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaceSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + egressIP: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + externalIPPool: + type: string + status: + type: object + properties: + egressNode: + type: string + additionalPrinterColumns: + - description: Specifies the SNAT IP address for the selected workloads. + jsonPath: .spec.egressIP + name: EgressIP + type: string + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + - description: The Owner Node of egress IP + jsonPath: .status.egressNode + name: Node + type: string + subresources: + status: {} + scope: Cluster + names: + plural: egresses + singular: egress + kind: Egress + shortNames: + - eg + +--- +# Source: crds/externalentity.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: externalentities.crd.antrea.io + labels: + app: antrea +spec: + group: crd.antrea.io + versions: + - name: v1alpha2 + served: true + storage: true + schema: + openAPIV3Schema: + type: object + properties: + spec: + type: object + properties: + endpoints: + type: array + items: + type: object + properties: + ip: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + name: + type: string + ports: + type: array + items: + type: object + properties: + protocol: + type: string + enum: ['TCP', 'UDP', 'SCTP'] + port: + x-kubernetes-int-or-string: true + name: + type: string + externalNode: + type: string + - name: v1alpha1 + served: false + storage: false + schema: + openAPIV3Schema: + type: object + scope: Namespaced + names: + plural: externalentities + singular: externalentity + kind: ExternalEntity + shortNames: + - ee + +--- +# Source: crds/externalippool.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: externalippools.crd.antrea.io + labels: + app: antrea +spec: + group: crd.antrea.io + versions: + - name: v1alpha2 + served: true + storage: true + schema: + openAPIV3Schema: + type: object + required: + - spec + properties: + spec: + type: object + required: + - ipRanges + - nodeSelector + properties: + ipRanges: + type: array + items: + type: object + oneOf: + - required: + - cidr + - required: + - start + - end + properties: + cidr: + type: string + format: cidr + start: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + end: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + nodeSelector: + type: object + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + type: array + type: object + type: array + matchLabels: + x-kubernetes-preserve-unknown-fields: true + status: + type: object + properties: + usage: + type: object + properties: + total: + type: integer + used: + type: integer + additionalPrinterColumns: + - description: The number of total IPs + jsonPath: .status.usage.total + name: Total + type: integer + - description: The number of allocated IPs + jsonPath: .status.usage.used + name: Used + type: integer + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + subresources: + status: {} + scope: Cluster + names: + plural: externalippools + singular: externalippool + kind: ExternalIPPool + shortNames: + - eip + +--- +# Source: crds/externalnode.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + labels: + app: antrea + name: externalnodes.crd.antrea.io +spec: + group: crd.antrea.io + versions: + - name: v1alpha1 + schema: + openAPIV3Schema: + type: object + required: + - spec + properties: + spec: + type: object + required: + - interfaces + properties: + interfaces: + type: array + minItems: 1 + maxItems: 1 + required: + - ips + items: + type: object + properties: + ips: + type: array + minItems: 1 + items: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + name: + type: string + served: true + storage: true + scope: Namespaced + names: + kind: ExternalNode + plural: externalnodes + shortNames: + - en + singular: externalnode +--- +# Source: crds/ippool.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: ippools.crd.antrea.io + labels: + app: antrea +spec: + group: crd.antrea.io + versions: + - name: v1alpha2 + served: true + storage: true + schema: + openAPIV3Schema: + type: object + required: + - spec + properties: + spec: + required: + - ipVersion + - ipRanges + type: object + properties: + ipVersion: + type: integer + enum: [ 4, 6 ] + ipRanges: + items: + oneOf: + - required: + - cidr + - gateway + - prefixLength + - required: + - start + - end + - gateway + - prefixLength + properties: + cidr: + format: cidr + type: string + start: + oneOf: + - format: ipv4 + - format: ipv6 + type: string + end: + oneOf: + - format: ipv4 + - format: ipv6 + type: string + gateway: + oneOf: + - format: ipv4 + - format: ipv6 + type: string + prefixLength: + type: integer + minimum: 1 + maximum: 128 + vlan: + type: integer + minimum: 0 + maximum: 4094 + type: object + type: array + status: + properties: + ipAddresses: + items: + properties: + ipAddress: + type: string + owner: + properties: + pod: + properties: + name: + type: string + namespace: + type: string + containerID: + type: string + ifName: + type: string + type: object + statefulSet: + properties: + name: + type: string + namespace: + type: string + index: + type: integer + type: object + type: object + phase: + type: string + type: object + type: array + usage: + properties: + used: + type: integer + total: + type: integer + type: object + type: object + additionalPrinterColumns: + - description: The number of total IPs + jsonPath: .status.usage.total + name: Total + type: integer + - description: The number of allocated IPs + jsonPath: .status.usage.used + name: Used + type: integer + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + subresources: + status: {} + scope: Cluster + names: + plural: ippools + singular: ippool + kind: IPPool + shortNames: + - ipp + +--- +# Source: crds/networkpolicy.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: networkpolicies.crd.antrea.io + labels: + app: antrea +spec: + group: crd.antrea.io + versions: + - name: v1alpha1 + served: true + storage: true + additionalPrinterColumns: + - name: Tier + type: string + description: The Tier to which this Antrea NetworkPolicy belongs to. + jsonPath: .spec.tier + - name: Priority + type: number + format: float + description: The Priority of this Antrea NetworkPolicy relative to other policies. + jsonPath: .spec.priority + - name: Desired Nodes + type: number + format: int32 + description: The total number of Nodes that should realize the NetworkPolicy. + jsonPath: .status.desiredNodesRealized + - name: Current Nodes + type: number + format: int32 + description: The number of Nodes that have realized the NetworkPolicy. + jsonPath: .status.currentNodesRealized + - name: Age + type: date + jsonPath: .metadata.creationTimestamp + schema: + openAPIV3Schema: + type: object + properties: + spec: + # Ensure that Spec.Priority field is set + required: + - priority + type: object + properties: + tier: + type: string + priority: + type: number + format: float + # Ensure that Spec.Priority field is between 1 and 10000 + minimum: 1.0 + maximum: 10000.0 + appliedTo: + type: array + items: + type: object + # Ensure that Spec.AppliedTo does not allow NamespaceSelector/IPBlock field + properties: + externalEntitySelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + group: + type: string + ingress: + type: array + items: + type: object + required: + - action + properties: + appliedTo: + type: array + items: + type: object + # Ensure that rule AppliedTo does not allow NamespaceSelector/IPBlock field + properties: + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + group: + type: string + # Ensure that Action field allows only ALLOW, DROP, REJECT and PASS values + action: + type: string + enum: ['Allow', 'Drop', 'Reject', 'Pass'] + ports: + type: array + items: + type: object + properties: + protocol: + type: string + enum: ['TCP', 'UDP', 'SCTP'] + port: + x-kubernetes-int-or-string: true + endPort: + type: integer + protocols: + type: array + items: + type: object + oneOf: + - required: [icmp] + - required: [igmp] + properties: + icmp: + type: object + properties: + icmpType: + type: integer + minimum: 0 + maximum: 255 + icmpCode: + type: integer + minimum: 0 + maximum: 255 + igmp: + type: object + properties: + igmpType: + type: integer + # Only IGMP query (0x11) is valid igmpType in ingress rules. + enum: [ 0x11 ] + groupAddress: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + from: + type: array + items: + type: object + properties: + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaceSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + externalEntitySelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + ipBlock: + type: object + properties: + cidr: + type: string + format: cidr + nodeSelector: + type: object + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + type: array + type: object + type: array + matchLabels: + x-kubernetes-preserve-unknown-fields: true + group: + type: string + name: + type: string + enableLogging: + type: boolean + egress: + type: array + items: + type: object + required: + - action + properties: + appliedTo: + type: array + items: + type: object + # Ensure that rule AppliedTo does not allow NamespaceSelector/IPBlock field + properties: + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + group: + type: string + # Ensure that Action field allows only ALLOW, DROP, REJECT and PASS values + action: + type: string + enum: ['Allow', 'Drop', 'Reject', 'Pass'] + ports: + type: array + items: + type: object + properties: + protocol: + type: string + enum: ['TCP', 'UDP', 'SCTP'] + port: + x-kubernetes-int-or-string: true + endPort: + type: integer + protocols: + type: array + items: + type: object + oneOf: + - required: [icmp] + - required: [igmp] + properties: + icmp: + type: object + properties: + icmpType: + type: integer + minimum: 0 + maximum: 255 + icmpCode: + type: integer + minimum: 0 + maximum: 255 + igmp: + type: object + properties: + igmpType: + type: integer + # Only IGMP reports are igmpType in egress rules, + # 0x12 is IGMP report V1, 0x16 is IGMP report v2, 0x22 is IGMP report v3. + # It will match all IGMP report types if igmpType is not set. + enum: [ 0x12, 0x16, 0x22 ] + groupAddress: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + to: + type: array + items: + type: object + properties: + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaceSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + externalEntitySelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + ipBlock: + type: object + properties: + cidr: + type: string + format: cidr + fqdn: + type: string + nodeSelector: + type: object + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + type: array + type: object + type: array + matchLabels: + x-kubernetes-preserve-unknown-fields: true + group: + type: string + toServices: + type: array + items: + type: object + required: + - name + properties: + name: + type: string + namespace: + type: string + name: + type: string + enableLogging: + type: boolean + status: + type: object + properties: + phase: + type: string + observedGeneration: + type: integer + currentNodesRealized: + type: integer + desiredNodesRealized: + type: integer + conditions: + type: array + items: + type: object + properties: + type: + type: string + status: + type: string + lastTransitionTime: + type: string + reason: + type: string + message: + type: string + subresources: + status: {} + scope: Namespaced + names: + plural: networkpolicies + singular: networkpolicy + kind: NetworkPolicy + shortNames: + - anp + +--- +# Source: crds/supportbundlecollection.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: supportbundlecollections.crd.antrea.io +spec: + group: crd.antrea.io + versions: + - name: v1alpha1 + served: true + storage: true + schema: + openAPIV3Schema: + type: object + properties: + spec: + type: object + required: + - fileServer + - authentication + anyOf: + - required: + - nodes + - required: + - externalNodes + properties: + nodes: + type: object + properties: + nodeNames: + type: array + items: + type: string + nodeSelector: + type: object + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + type: array + type: object + type: array + matchLabels: + x-kubernetes-preserve-unknown-fields: true + externalNodes: + type: object + required: + - namespace + properties: + namespace: + type: string + nodeNames: + type: array + items: + type: string + nodeSelector: + type: object + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + type: array + type: object + type: array + matchLabels: + x-kubernetes-preserve-unknown-fields: true + expirationMinutes: + type: integer + default: 60 + sinceTime: + type: string + format: duration + fileServer: + type: object + properties: + url: + type: string + authentication: + type: object + properties: + authType: + type: string + enum: ["BearerToken", "APIKey"] + authSecret: + type: object + properties: + name: + type: string + namespace: + type: string + status: + type: object + properties: + collectedNodes: + type: integer + desiredNodes: + type: integer + conditions: + type: array + items: + type: object + properties: + type: + type: string + status: + type: string + lastTransitionTime: + type: string + reason: + type: string + message: + type: string + subresources: + status: {} + scope: Cluster + names: + plural: supportbundlecollections + singular: supportbundlecollection + kind: SupportBundleCollection + shortNames: + - sbc + +--- +# Source: crds/tier.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: tiers.crd.antrea.io + labels: + app: antrea +spec: + group: crd.antrea.io + versions: + - name: v1alpha1 + served: true + storage: true + additionalPrinterColumns: + - name: Priority + type: integer + description: The Priority of this Tier relative to other Tiers. + jsonPath: .spec.priority + - name: Age + type: date + jsonPath: .metadata.creationTimestamp + schema: + openAPIV3Schema: + type: object + properties: + spec: + required: + - priority + type: object + properties: + priority: + type: integer + minimum: 0 + maximum: 255 + description: + type: string + scope: Cluster + names: + plural: tiers + singular: tier + kind: Tier + shortNames: + - tr + +--- +# Source: crds/traceflow.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: traceflows.crd.antrea.io + labels: + app: antrea +spec: + group: crd.antrea.io + versions: + - name: v1alpha1 + served: true + storage: true + additionalPrinterColumns: + - jsonPath: .status.phase + description: The phase of the Traceflow. + name: Phase + type: string + - jsonPath: .spec.source.pod + description: The name of the source Pod. + name: Source-Pod + type: string + priority: 10 + - jsonPath: .spec.destination.pod + description: The name of the destination Pod. + name: Destination-Pod + type: string + priority: 10 + - jsonPath: .spec.destination.ip + description: The IP address of the destination. + name: Destination-IP + type: string + priority: 10 + - jsonPath: .spec.liveTraffic + description: Trace live traffic. + name: Live-Traffic + type: boolean + priority: 10 + - jsonPath: .spec.droppedOnly + description: Capture only the dropped packet. + name: Dropped-Only + type: boolean + priority: 10 + - jsonPath: .spec.timeout + description: Timeout in seconds. + name: Timeout + type: integer + priority: 10 + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + schema: + openAPIV3Schema: + type: object + required: + - spec + properties: + spec: + type: object + properties: + source: + type: object + properties: + pod: + type: string + namespace: + type: string + ip: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + destination: + type: object + properties: + pod: + type: string + service: + type: string + namespace: + type: string + ip: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + packet: + type: object + properties: + ipHeader: + type: object + properties: + srcIP: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + protocol: + type: integer + ttl: + type: integer + flags: + type: integer + ipv6Header: + type: object + properties: + srcIP: + type: string + format: ipv6 + nextHeader: + type: integer + hopLimit: + type: integer + transportHeader: + type: object + properties: + icmp: + type: object + properties: + id: + type: integer + sequence: + type: integer + udp: + type: object + properties: + srcPort: + type: integer + dstPort: + type: integer + tcp: + type: object + properties: + srcPort: + type: integer + dstPort: + type: integer + flags: + type: integer + liveTraffic: + type: boolean + droppedOnly: + type: boolean + timeout: + type: integer + status: + type: object + properties: + reason: + type: string + dataplaneTag: + type: integer + phase: + type: string + startTime: + type: string + results: + type: array + items: + type: object + properties: + node: + type: string + role: + type: string + timestamp: + type: integer + observations: + type: array + items: + type: object + properties: + component: + type: string + componentInfo: + type: string + action: + type: string + pod: + type: string + dstMAC: + type: string + networkPolicy: + type: string + ttl: + type: integer + translatedSrcIP: + type: string + translatedDstIP: + type: string + tunnelDstIP: + type: string + capturedPacket: + properties: + srcIP: + type: string + dstIP: + type: string + length: + type: integer + ipHeader: + properties: + flags: + type: integer + protocol: + type: integer + ttl: + type: integer + type: object + ipv6Header: + properties: + hopLimit: + type: integer + nextHeader: + type: integer + type: object + transportHeader: + properties: + tcp: + properties: + dstPort: + type: integer + srcPort: + type: integer + flags: + type: integer + type: object + udp: + properties: + dstPort: + type: integer + srcPort: + type: integer + type: object + icmp: + properties: + id: + type: integer + sequence: + type: integer + type: object + type: object + type: object + subresources: + status: {} + scope: Cluster + names: + plural: traceflows + singular: traceflow + kind: Traceflow + shortNames: + - tf + +--- +# Source: crds/trafficcontrol.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: trafficcontrols.crd.antrea.io +spec: + group: crd.antrea.io + versions: + - name: v1alpha2 + served: true + storage: true + schema: + openAPIV3Schema: + type: object + required: + - spec + properties: + spec: + type: object + required: + - appliedTo + - direction + - action + - targetPort + properties: + appliedTo: + type: object + properties: + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaceSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + direction: + type: string + enum: + - Ingress + - Egress + - Both + action: + type: string + enum: + - Mirror + - Redirect + targetPort: + type: object + oneOf: + - required: [ovsInternal] + - required: [device] + - required: [geneve] + - required: [vxlan] + - required: [gre] + - required: [erspan] + properties: + ovsInternal: + type: object + required: + - name + properties: + name: + type: string + device: + type: object + required: + - name + properties: + name: + type: string + geneve: + type: object + required: + - remoteIP + properties: + remoteIP: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + vni: + type: integer + minimum: 0 + maximum: 16777215 + destinationPort: + type: integer + minimum: 1 + maximum: 65535 + vxlan: + type: object + required: + - remoteIP + properties: + remoteIP: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + vni: + type: integer + minimum: 0 + maximum: 16777215 + destinationPort: + type: integer + minimum: 1 + maximum: 65535 + gre: + type: object + required: + - remoteIP + properties: + remoteIP: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + key: + type: integer + minimum: 0 + maximum: 4294967295 + erspan: + type: object + required: + - remoteIP + - version + properties: + remoteIP: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + sessionID: + type: integer + minimum: 0 + maximum: 1023 + version: + type: integer + enum: + - 1 + - 2 + index: + type: integer + dir: + type: integer + enum: + - 0 + - 1 + hardwareID: + type: integer + returnPort: + type: object + oneOf: + - required: [ovsInternal] + - required: [device] + - required: [geneve] + - required: [vxlan] + - required: [gre] + properties: + ovsInternal: + type: object + required: + - name + properties: + name: + type: string + device: + type: object + required: + - name + properties: + name: + type: string + geneve: + type: object + required: + - remoteIP + properties: + remoteIP: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + vni: + type: integer + minimum: 0 + maximum: 16777215 + destinationPort: + type: integer + minimum: 1 + maximum: 65535 + vxlan: + type: object + required: + - remoteIP + properties: + remoteIP: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + vni: + type: integer + minimum: 0 + maximum: 16777215 + destinationPort: + type: integer + minimum: 1 + maximum: 65535 + gre: + type: object + required: + - remoteIP + properties: + remoteIP: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + key: + type: integer + minimum: 0 + maximum: 4294967295 + additionalPrinterColumns: + - description: Specifies the direction of traffic that should be matched. + jsonPath: .spec.direction + name: Direction + type: string + - description: Specifies the action that should be taken for the traffic. + jsonPath: .spec.action + name: Action + type: string + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + subresources: + status: {} + scope: Cluster + names: + plural: trafficcontrols + singular: trafficcontrol + kind: TrafficControl + shortNames: + - tc + +--- +# Source: antrea/templates/agent/serviceaccount.yaml +apiVersion: v1 +kind: ServiceAccount +metadata: + name: antrea-agent + namespace: kube-system + labels: + app: antrea +--- +# Source: antrea/templates/antctl/serviceaccount.yaml +apiVersion: v1 +kind: ServiceAccount +metadata: + name: antctl + namespace: kube-system + labels: + app: antrea +--- +# Source: antrea/templates/controller/serviceaccount.yaml +apiVersion: v1 +kind: ServiceAccount +metadata: + name: antrea-controller + namespace: kube-system + labels: + app: antrea +--- +# Source: antrea/templates/whereabouts/serviceaccount.yaml +apiVersion: v1 +kind: ServiceAccount +metadata: + name: antrea-agent-whereabouts + namespace: kube-system + labels: + app: antrea +--- +# Source: antrea/templates/agent/secret.yaml +apiVersion: v1 +kind: Secret +metadata: + name: antrea-agent-service-account-token + namespace: kube-system + annotations: + kubernetes.io/service-account.name: antrea-agent +type: kubernetes.io/service-account-token +--- +# Source: antrea/templates/antctl/secret.yaml +apiVersion: v1 +kind: Secret +metadata: + name: antctl-service-account-token + namespace: kube-system + annotations: + kubernetes.io/service-account.name: antctl +type: kubernetes.io/service-account-token +--- +# Source: antrea/templates/whereabouts/secret.yaml +apiVersion: v1 +kind: Secret +metadata: + name: whereabouts-cni-secret + namespace: kube-system + annotations: + kubernetes.io/service-account.name: antrea-agent-whereabouts + labels: + app: antrea +type: kubernetes.io/service-account-token +--- +# Source: antrea/templates/configmap.yaml +apiVersion: v1 +kind: ConfigMap +metadata: + name: antrea-config + namespace: kube-system + labels: + app: antrea +data: + antrea-agent.conf: | + # FeatureGates is a map of feature names to bools that enable or disable experimental features. + featureGates: + # AllAlpha is a global toggle for alpha features. Per-feature key values override the default set by AllAlpha. + # AllAlpha: false + + # AllBeta is a global toggle for beta features. Per-feature key values override the default set by AllBeta. + # AllBeta: false + + # Enable AntreaProxy which provides ServiceLB for in-cluster Services in antrea-agent. + # It should be enabled on Windows, otherwise NetworkPolicy will not take effect on + # Service traffic. + # AntreaProxy: true + + # Enable EndpointSlice support in AntreaProxy. Don't enable this feature unless that EndpointSlice + # API version v1 is supported and set as enabled in Kubernetes. If AntreaProxy is not enabled, + # this flag will not take effect. + # EndpointSlice: false + + # Enable TopologyAwareHints in AntreaProxy. This requires AntreaProxy and EndpointSlice to be + # enabled, otherwise this flag will not take effect. + # TopologyAwareHints: false + + # Enable traceflow which provides packet tracing feature to diagnose network issue. + # Traceflow: true + + # Enable NodePortLocal feature to make the Pods reachable externally through NodePort + # NodePortLocal: true + + # Enable Antrea ClusterNetworkPolicy feature to complement K8s NetworkPolicy for cluster admins + # to define security policies which apply to the entire cluster, and Antrea NetworkPolicy + # feature that supports priorities, rule actions and externalEntities in the future. + # AntreaPolicy: true + + # Enable flowexporter which exports polled conntrack connections as IPFIX flow records from each + # agent to a configured collector. + # FlowExporter: false + + # Enable collecting and exposing NetworkPolicy statistics. + # NetworkPolicyStats: true + + # Enable controlling SNAT IPs of Pod egress traffic. + # Egress: true + + # Enable AntreaIPAM, which can allocate IP addresses from IPPools. AntreaIPAM is required by the + # bridging mode and allocates IPs to Pods in bridging mode. It is also required to use Antrea for + # IPAM when configuring secondary network interfaces with Multus. + # AntreaIPAM: false + + # Enable multicast traffic. + # Multicast: false + + # Enable Antrea Multi-cluster Gateway to support cross-cluster traffic. + # This feature is supported only with encap mode. + # Multicluster: false + + # Enable support for provisioning secondary network interfaces for Pods (using + # Pod annotations). At the moment, Antrea can only create secondary network + # interfaces using SR-IOV VFs on baremetal Nodes. + SecondaryNetwork: true + + # Enable managing external IPs of Services of LoadBalancer type. + # ServiceExternalIP: false + + # Enable mirroring or redirecting the traffic Pods send or receive. + # TrafficControl: false + + # Enable certificated-based authentication for IPsec. + # IPsecCertAuth: false + + # Name of the OpenVSwitch bridge antrea-agent will create and use. + # Make sure it doesn't conflict with your existing OpenVSwitch bridges. + ovsBridge: "br-int" + + # Datapath type to use for the OpenVSwitch bridge created by Antrea. At the moment, the only + # supported value is 'system', which corresponds to the kernel datapath. + #ovsDatapathType: system + + # Name of the interface antrea-agent will create and use for host <--> pod communication. + # Make sure it doesn't conflict with your existing interfaces. + hostGateway: "antrea-gw0" + + # Determines how traffic is encapsulated. It has the following options: + # encap(default): Inter-node Pod traffic is always encapsulated and Pod to external network + # traffic is SNAT'd. + # noEncap: Inter-node Pod traffic is not encapsulated; Pod to external network traffic is + # SNAT'd if noSNAT is not set to true. Underlying network must be capable of + # supporting Pod traffic across IP subnets. + # hybrid: noEncap if source and destination Nodes are on the same subnet, otherwise encap. + # networkPolicyOnly: Antrea enforces NetworkPolicy only, and utilizes CNI chaining and delegates Pod + # IPAM and connectivity to the primary CNI. + # + trafficEncapMode: "encap" + + # Whether or not to SNAT (using the Node IP) the egress traffic from a Pod to the external network. + # This option is for the noEncap traffic mode only, and the default value is false. In the noEncap + # mode, if the cluster's Pod CIDR is reachable from the external network, then the Pod traffic to + # the external network needs not be SNAT'd. In the networkPolicyOnly mode, antrea-agent never + # performs SNAT and this option will be ignored; for other modes it must be set to false. + noSNAT: false + + # Tunnel protocols used for encapsulating traffic across Nodes. If WireGuard is enabled in trafficEncryptionMode, + # this option will not take effect. Supported values: + # - geneve (default) + # - vxlan + # - gre + # - stt + # Note that "gre" is not supported for IPv6 clusters (IPv6-only or dual-stack clusters). + tunnelType: "geneve" + + # TunnelPort is the destination port for UDP and TCP based tunnel protocols (Geneve, VXLAN, and STT). + # If zero, it will use the assigned IANA port for the protocol, i.e. 6081 for Geneve, 4789 for VXLAN, + # and 7471 for STT. + tunnelPort: 0 + + # Determines how tunnel traffic is encrypted. Currently encryption only works with encap mode. + # It has the following options: + # - none (default): Inter-node Pod traffic will not be encrypted. + # - ipsec: Enable IPsec (ESP) encryption for Pod traffic across Nodes. Antrea uses + # Preshared Key (PSK) for IKE authentication. When IPsec tunnel is enabled, + # the PSK value must be passed to Antrea Agent through an environment + # variable: ANTREA_IPSEC_PSK. + # - wireGuard: Enable WireGuard for tunnel traffic encryption. + trafficEncryptionMode: "none" + + # Enable bridging mode of Pod network on Nodes, in which the Node's transport interface is connected + # to the OVS bridge, and cross-Node/VLAN traffic of AntreaIPAM Pods (Pods whose IP addresses are + # allocated by AntreaIPAM from IPPools) is sent to the underlay network, and forwarded/routed by the + # underlay network. + # This option requires the `AntreaIPAM` feature gate to be enabled. At this moment, it supports only + # IPv4 and Linux Nodes, and can be enabled only when `ovsDatapathType` is `system`, + # `trafficEncapMode` is `noEncap`, and `noSNAT` is true. + enableBridgingMode: false + + # Disable TX checksum offloading for container network interfaces. It's supposed to be set to true when the + # datapath doesn't support TX checksum offloading, which causes packets to be dropped due to bad checksum. + # It affects Pods running on Linux Nodes only. + disableTXChecksumOffload: false + + # Default MTU to use for the host gateway interface and the network interface of each Pod. + # If omitted, antrea-agent will discover the MTU of the Node's primary interface and + # also adjust MTU to accommodate for tunnel encapsulation overhead (if applicable). + defaultMTU: 0 + + # wireGuard specifies WireGuard related configurations. + wireGuard: + # The port for WireGuard to receive traffic. + port: 51820 + + egress: + # exceptCIDRs is the CIDR ranges to which outbound Pod traffic will not be SNAT'd by Egresses. + exceptCIDRs: + + # ClusterIP CIDR range for Services. It's required when AntreaProxy is not enabled, and should be + # set to the same value as the one specified by --service-cluster-ip-range for kube-apiserver. When + # AntreaProxy is enabled, this parameter is not needed and will be ignored if provided. + serviceCIDR: "" + + # ClusterIP CIDR range for IPv6 Services. It's required when using kube-proxy to provide IPv6 Service in a Dual-Stack + # cluster or an IPv6 only cluster. The value should be the same as the configuration for kube-apiserver specified by + # --service-cluster-ip-range. When AntreaProxy is enabled, this parameter is not needed. + # No default value for this field. + serviceCIDRv6: "" + + # The port for the antrea-agent APIServer to serve on. + # Note that if it's set to another value, the `containerPort` of the `api` port of the + # `antrea-agent` container must be set to the same value. + apiPort: 10350 + + # Enable metrics exposure via Prometheus. Initializes Prometheus metrics listener. + enablePrometheusMetrics: true + + # Provide the IPFIX collector address as a string with format :[][:]. + # HOST can either be the DNS name or the IP of the Flow Collector. For example, + # "flow-aggregator.flow-aggregator.svc" can be provided as DNS name to connect + # to the Antrea Flow Aggregator service. If IP, it can be either IPv4 or IPv6. + # However, IPv6 address should be wrapped with []. + # If PORT is empty, we default to 4739, the standard IPFIX port. + # If no PROTO is given, we consider "tls" as default. We support "tls", "tcp" and + # "udp" protocols. "tls" is used for securing communication between flow exporter and + # flow aggregator. + flowCollectorAddr: "flow-aggregator.flow-aggregator.svc:4739:tls" + + # Provide flow poll interval as a duration string. This determines how often the + # flow exporter dumps connections from the conntrack module. Flow poll interval + # should be greater than or equal to 1s (one second). + # Valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h". + flowPollInterval: "5s" + + # Provide the active flow export timeout, which is the timeout after which a flow + # record is sent to the collector for active flows. Thus, for flows with a continuous + # stream of packets, a flow record will be exported to the collector once the elapsed + # time since the last export event is equal to the value of this timeout. + # Valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h". + activeFlowExportTimeout: "5s" + + # Provide the idle flow export timeout, which is the timeout after which a flow + # record is sent to the collector for idle flows. A flow is considered idle if no + # packet matching this flow has been observed since the last export event. + # Valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h". + idleFlowExportTimeout: "15s" + + nodePortLocal: + # Enable NodePortLocal, a feature used to make Pods reachable using port forwarding on the host. To + # enable this feature, you need to set "enable" to true, and ensure that the NodePortLocal feature + # gate is also enabled (which is the default). + enable: false + # Provide the port range used by NodePortLocal. When the NodePortLocal feature is enabled, a port + # from that range will be assigned whenever a Pod's container defines a specific port to be exposed + # (each container can define a list of ports as pod.spec.containers[].ports), and all Node traffic + # directed to that port will be forwarded to the Pod. + portRange: "61000-62000" + + # Provide the address of Kubernetes apiserver, to override any value provided in kubeconfig or InClusterConfig. + # Defaults to "". It must be a host string, a host:port pair, or a URL to the base of the apiserver. + kubeAPIServerOverride: "" + + # Provide the address of DNS server, to override the kube-dns service. It's used to resolve hostname in FQDN policy. + # Defaults to "". It must be a host string or a host:port pair of the DNS server (e.g. 10.96.0.10, 10.96.0.10:53, + # [fd00:10:96::a]:53). + dnsServerOverride: "" + + # Comma-separated list of Cipher Suites. If omitted, the default Go Cipher Suites will be used. + # https://golang.org/pkg/crypto/tls/#pkg-constants + # Note that TLS1.3 Cipher Suites cannot be added to the list. But the apiserver will always + # prefer TLS1.3 Cipher Suites whenever possible. + tlsCipherSuites: "" + + # TLS min version from: VersionTLS10, VersionTLS11, VersionTLS12, VersionTLS13. + tlsMinVersion: "" + + # The name of the interface on Node which is used for tunneling or routing the traffic across Nodes. + # If there are multiple IP addresses configured on the interface, the first one is used. The IP + # address used for tunneling or routing traffic to remote Nodes is decided in the following order of + # preference (from highest to lowest): + # 1. transportInterface + # 2. transportInterfaceCIDRs + # 3. The Node IP + transportInterface: "" + + multicast: + # The names of the interfaces on Nodes that are used to forward multicast traffic. + # Defaults to transport interface if not set. + multicastInterfaces: + + # The interval at which the antrea-agent sends IGMP queries to Pods. + # Valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h". + igmpQueryInterval: "125s" + + # The network CIDRs of the interface on Node which is used for tunneling or routing the traffic across + # Nodes. If there are multiple interfaces configured the same network CIDR, the first one is used. The + # IP address used for tunneling or routing traffic to remote Nodes is decided in the following order of + # preference (from highest to lowest): + # 1. transportInterface + # 2. transportInterfaceCIDRs + # 3. The Node IP + transportInterfaceCIDRs: + + # Option antreaProxy contains AntreaProxy related configuration options. + antreaProxy: + # ProxyAll tells antrea-agent to proxy all Service traffic, including NodePort, LoadBalancer, and ClusterIP traffic, + # regardless of where they come from. Therefore, running kube-proxy is no longer required. This requires the AntreaProxy + # feature to be enabled. + # Note that this option is experimental. If kube-proxy is removed, option kubeAPIServerOverride must be used to access + # apiserver directly. + proxyAll: false + # A string array of values which specifies the host IPv4/IPv6 addresses for NodePort. Values can be valid IP blocks. + # (e.g. 1.2.3.0/24, 1.2.3.4/32). An empty string slice is meant to select all host IPv4/IPv6 addresses. + # Note that the option is only valid when proxyAll is true. + nodePortAddresses: + # An array of string values to specify a list of Services which should be ignored by AntreaProxy (traffic to these + # Services will not be load-balanced). Values can be a valid ClusterIP (e.g. 10.11.1.2) or a Service name + # with Namespace (e.g. kube-system/kube-dns) + skipServices: + # When ProxyLoadBalancerIPs is set to false, AntreaProxy no longer load-balances traffic destined to the + # External IPs of LoadBalancer Services. This is useful when the external LoadBalancer provides additional + # capabilities (e.g. TLS termination) and it is desirable for Pod-to-ExternalIP traffic to be sent to the + # external LoadBalancer instead of being load-balanced to an Endpoint directly by AntreaProxy. + # Note that setting ProxyLoadBalancerIPs to false usually only makes sense when ProxyAll is set to true and + # kube-proxy is removed from the cluser, otherwise kube-proxy will still load-balance this traffic. + proxyLoadBalancerIPs: true + + # IPsec tunnel related configurations. + ipsec: + # The authentication mode of IPsec tunnel. It has the following options: + # - psk (default): Use pre-shared key (PSK) for IKE authentication. + # - cert: Use CA-signed certificates for IKE authentication. This option requires the `IPsecCertAuth` + # feature gate to be enabled. + authenticationMode: "psk" + + multicluster: + # Enable Antrea Multi-cluster Gateway to support cross-cluster traffic. + # This feature is supported only with encap mode. + enable: false + # The Namespace where Antrea Multi-cluster Controller is running. + # The default is antrea-agent's Namespace. + namespace: "" + antrea-cni.conflist: | + { + "cniVersion":"0.3.0", + "name": "antrea", + "plugins": [ + { + "type": "antrea", + "ipam": { + "type": "host-local" + } + } + , + { + "type": "portmap", + "capabilities": {"portMappings": true} + } + , + { + "type": "bandwidth", + "capabilities": {"bandwidth": true} + } + ] + } + antrea-controller.conf: | + # FeatureGates is a map of feature names to bools that enable or disable experimental features. + featureGates: + # AllAlpha is a global toggle for alpha features. Per-feature key values override the default set by AllAlpha. + # AllAlpha: false + + # AllBeta is a global toggle for beta features. Per-feature key values override the default set by AllBeta. + # AllBeta: false + + # Enable traceflow which provides packet tracing feature to diagnose network issue. + # Traceflow: true + + # Enable Antrea ClusterNetworkPolicy feature to complement K8s NetworkPolicy for cluster admins + # to define security policies which apply to the entire cluster, and Antrea NetworkPolicy + # feature that supports priorities, rule actions and externalEntities in the future. + # AntreaPolicy: true + + # Enable collecting and exposing NetworkPolicy statistics. + # NetworkPolicyStats: true + + # Enable multicast traffic. + # Multicast: false + + # Enable controlling SNAT IPs of Pod egress traffic. + # Egress: true + + # Run Kubernetes NodeIPAMController with Antrea. + # NodeIPAM: false + + # Enable AntreaIPAM, which can allocate IP addresses from IPPools. AntreaIPAM is required by the + # bridging mode and allocates IPs to Pods in bridging mode. It is also required to use Antrea for + # IPAM when configuring secondary network interfaces with Multus. + # AntreaIPAM: false + + # Enable managing external IPs of Services of LoadBalancer type. + # ServiceExternalIP: false + + # Enable certificated-based authentication for IPsec. + # IPsecCertAuth: false + + # Enable managing ExternalNode for unmanaged VM/BM. + # ExternalNode: false + + # The port for the antrea-controller APIServer to serve on. + # Note that if it's set to another value, the `containerPort` of the `api` port of the + # `antrea-controller` container must be set to the same value. + apiPort: 10349 + + # Enable metrics exposure via Prometheus. Initializes Prometheus metrics listener. + enablePrometheusMetrics: true + + # Indicates whether to use auto-generated self-signed TLS certificate. + # If false, a Secret named "antrea-controller-tls" must be provided with the following keys: + # ca.crt: + # tls.crt: + # tls.key: + selfSignedCert: true + + # Comma-separated list of Cipher Suites. If omitted, the default Go Cipher Suites will be used. + # https://golang.org/pkg/crypto/tls/#pkg-constants + # Note that TLS1.3 Cipher Suites cannot be added to the list. But the apiserver will always + # prefer TLS1.3 Cipher Suites whenever possible. + tlsCipherSuites: "" + + # TLS min version from: VersionTLS10, VersionTLS11, VersionTLS12, VersionTLS13. + tlsMinVersion: "" + + nodeIPAM: + # Enable the integrated Node IPAM controller within the Antrea controller. + enableNodeIPAM: false + # CIDR ranges for Pods in cluster. String array containing single CIDR range, or multiple ranges. + # The CIDRs could be either IPv4 or IPv6. At most one CIDR may be specified for each IP family. + # Value ignored when enableNodeIPAM is false. + clusterCIDRs: + # CIDR ranges for Services in cluster. It is not necessary to specify it when there is no overlap with clusterCIDRs. + # Value ignored when enableNodeIPAM is false. + serviceCIDR: "" + serviceCIDRv6: "" + # Mask size for IPv4 Node CIDR in IPv4 or dual-stack cluster. Value ignored when enableNodeIPAM is false + # or when IPv4 Pod CIDR is not configured. Valid range is 16 to 30. + nodeCIDRMaskSizeIPv4: 24 + # Mask size for IPv6 Node CIDR in IPv6 or dual-stack cluster. Value ignored when enableNodeIPAM is false + # or when IPv6 Pod CIDR is not configured. Valid range is 64 to 126. + nodeCIDRMaskSizeIPv6: 64 + + ipsecCSRSigner: + # Determines the auto-approve policy of Antrea CSR signer for IPsec certificates management. + # If enabled, Antrea will auto-approve the CertificateSingingRequest (CSR) if its subject and x509 extensions + # are permitted, and the requestor can be validated. If K8s `BoundServiceAccountTokenVolume` feature is enabled, + # the Pod identity will also be validated to provide maximum security. + # If set to false, Antrea will not auto-approve CertificateSingingRequests and they need to be approved + # manually by `kubectl certificate approve`. + autoApprove: true + # Indicates whether to use auto-generated self-signed CA certificate. + # If false, a Secret named "antrea-ipsec-ca" must be provided with the following keys: + # tls.crt: + # tls.key: + selfSignedCA: true +--- +# Source: antrea/templates/crds/group.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: groups.crd.antrea.io +spec: + group: crd.antrea.io + versions: + - name: v1alpha3 + served: true + storage: true + schema: + openAPIV3Schema: + type: object + properties: + spec: + type: object + properties: + childGroups: + type: array + items: + type: string + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaceSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + matchLabels: + x-kubernetes-preserve-unknown-fields: true + externalEntitySelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + matchLabels: + x-kubernetes-preserve-unknown-fields: true + ipBlocks: + type: array + items: + type: object + properties: + cidr: + type: string + format: cidr + serviceReference: + type: object + properties: + name: + type: string + namespace: + type: string + status: + type: object + properties: + conditions: + type: array + items: + type: object + properties: + type: + type: string + status: + type: string + lastTransitionTime: + type: string + subresources: + status: {} + scope: Namespaced + names: + plural: groups + singular: group + kind: Group + shortNames: + - grp +--- +# Source: antrea/templates/agent/clusterrole.yaml +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: antrea-agent + labels: + app: antrea +rules: + - apiGroups: + - "" + resources: + - nodes + verbs: + - get + - watch + - list + - apiGroups: + - "" + resources: + - nodes/status + verbs: + - patch + - apiGroups: + - "" + resources: + - pods + verbs: + - get + - watch + - list + - apiGroups: + - "" + resources: + - pods/status + verbs: + - patch + - apiGroups: + - "" + resources: + - endpoints + - services + - namespaces + verbs: + - get + - watch + - list + - apiGroups: + - discovery.k8s.io + resources: + - endpointslices + verbs: + - get + - watch + - list + - apiGroups: + - crd.antrea.io + resources: + - antreaagentinfos + verbs: + - get + - update + - apiGroups: + - controlplane.antrea.io + resources: + - networkpolicies + - appliedtogroups + - addressgroups + verbs: + - get + - watch + - list + - apiGroups: + - controlplane.antrea.io + resources: + - egressgroups + verbs: + - get + - watch + - list + - apiGroups: + - controlplane.antrea.io + resources: + - nodestatssummaries + verbs: + - create + - apiGroups: + - controlplane.antrea.io + resources: + - networkpolicies/status + verbs: + - create + - get + - apiGroups: + - authentication.k8s.io + resources: + - tokenreviews + verbs: + - create + - apiGroups: + - authorization.k8s.io + resources: + - subjectaccessreviews + verbs: + - create + # This is the content of built-in role kube-system/extension-apiserver-authentication-reader. + # But it doesn't have list/watch permission before K8s v1.17.0 so the extension apiserver (antrea-agent) will + # have permission issue after bumping up apiserver library to a version that supports dynamic authentication. + # See https://github.com/kubernetes/kubernetes/pull/85375 + # To support K8s clusters older than v1.17.0, we grant the required permissions directly instead of relying on + # the extension-apiserver-authentication role. + - apiGroups: + - "" + resourceNames: + - extension-apiserver-authentication + resources: + - configmaps + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - configmaps + resourceNames: + - antrea-ca + verbs: + - get + - watch + - list + - apiGroups: + - crd.antrea.io + resources: + - traceflows + - traceflows/status + verbs: + - get + - watch + - list + - update + - patch + - create + - delete + - apiGroups: + - crd.antrea.io + resources: + - egresses + verbs: + - get + - watch + - list + - apiGroups: + - crd.antrea.io + resources: + - egresses/status + verbs: + - update + - apiGroups: + - crd.antrea.io + resources: + - externalippools + - ippools + - trafficcontrols + verbs: + - get + - watch + - list + - apiGroups: + - crd.antrea.io + resources: + - ippools/status + verbs: + - update + - apiGroups: + - k8s.cni.cncf.io + resources: + - network-attachment-definitions + verbs: + - get + - list + - watch + - apiGroups: + - certificates.k8s.io + resources: + - certificatesigningrequests + verbs: + - get + - watch + - list + - create + - apiGroups: + - multicluster.crd.antrea.io + resources: + - gateways + verbs: + - get + - list + - watch + - apiGroups: + - multicluster.crd.antrea.io + resources: + - clusterinfoimports + verbs: + - get + - list + - watch +--- +# Source: antrea/templates/antctl/clusterrole.yaml +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: antctl + labels: + app: antrea +rules: + - apiGroups: + - controlplane.antrea.io + resources: + - networkpolicies + - appliedtogroups + - addressgroups + verbs: + - get + - list + - apiGroups: + - stats.antrea.io + resources: + - networkpolicystats + - antreaclusternetworkpolicystats + - antreanetworkpolicystats + verbs: + - get + - list + - apiGroups: + - system.antrea.io + resources: + - controllerinfos + - agentinfos + verbs: + - get + - apiGroups: + - system.antrea.io + resources: + - supportbundles + verbs: + - get + - post + - apiGroups: + - system.antrea.io + resources: + - supportbundles/download + verbs: + - get + - nonResourceURLs: + - /agentinfo + - /addressgroups + - /appliedtogroups + - /loglevel + - /networkpolicies + - /ovsflows + - /ovstracing + - /podinterfaces + - /featuregates + - /serviceexternalip + verbs: + - get +--- +# Source: antrea/templates/cluster-identity-reader/clusterrolebinding.yaml +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: antrea-cluster-identity-reader + labels: + app: antrea +rules: + - apiGroups: + - "" + resources: + - configmaps + resourceNames: + - antrea-cluster-identity + verbs: + - get +--- +# Source: antrea/templates/controller/clusterrole.yaml +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: antrea-controller + labels: + app: antrea +rules: + - apiGroups: + - "" + resources: + - pods + - services + - namespaces + - configmaps + verbs: + - get + - watch + - list + - apiGroups: + - "" + resources: + - nodes + verbs: + - get + - watch + - list + - patch + - apiGroups: + - "" + resources: + - services/status + verbs: + - update + - apiGroups: + - networking.k8s.io + resources: + - networkpolicies + verbs: + - get + - watch + - list + - apiGroups: + - authentication.k8s.io + resources: + - tokenreviews + verbs: + - create + - apiGroups: + - authorization.k8s.io + resources: + - subjectaccessreviews + verbs: + - create + - apiGroups: + - apiextensions.k8s.io + resources: + - customresourcedefinitions + verbs: + - get + - update + # This is the content of built-in role kube-system/extension-apiserver-authentication-reader. + # But it doesn't have list/watch permission before K8s v1.17.0 so the extension apiserver (antrea-controller) will + # have permission issue after bumping up apiserver library to a version that supports dynamic authentication. + # See https://github.com/kubernetes/kubernetes/pull/85375 + # To support K8s clusters older than v1.17.0, we grant the required permissions directly instead of relying on + # the extension-apiserver-authentication role. + - apiGroups: + - "" + resourceNames: + - extension-apiserver-authentication + resources: + - configmaps + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - configmaps + resourceNames: + - antrea-ca + - antrea-ipsec-ca + - antrea-cluster-identity + verbs: + - get + - update + - apiGroups: + - "" + resources: + - secrets + resourceNames: + - antrea-ipsec-ca + verbs: + - get + - update + - watch + - apiGroups: + - "" + resources: + - configmaps + - secrets + verbs: + - create + - apiGroups: + - apiregistration.k8s.io + resources: + - apiservices + resourceNames: + - v1alpha1.stats.antrea.io + - v1beta1.system.antrea.io + - v1beta2.controlplane.antrea.io + verbs: + - get + - update + - apiGroups: + - apiregistration.k8s.io + resources: + - apiservices + resourceNames: + - v1beta1.networking.antrea.tanzu.vmware.com + - v1beta1.controlplane.antrea.tanzu.vmware.com + - v1alpha1.stats.antrea.tanzu.vmware.com + - v1beta1.system.antrea.tanzu.vmware.com + - v1beta2.controlplane.antrea.tanzu.vmware.com + verbs: + - delete + - apiGroups: + - admissionregistration.k8s.io + resources: + - mutatingwebhookconfigurations + - validatingwebhookconfigurations + resourceNames: + # always give permissions for labelsmutator.antrea.io, even when the + # feature is disabled, to avoid errors in antrea-controller when updating + # the CA cert. + - labelsmutator.antrea.io + - crdmutator.antrea.io + - crdvalidator.antrea.io + verbs: + - get + - update + - apiGroups: + - certificates.k8s.io + resources: + - certificatesigningrequests + verbs: + - get + - list + - watch + - apiGroups: + - certificates.k8s.io + resources: + - certificatesigningrequests/approval + - certificatesigningrequests/status + verbs: + - update + - apiGroups: + - certificates.k8s.io + resources: + - signers + resourceNames: + - antrea.io/antrea-agent-ipsec-tunnel + verbs: + - approve + - sign + - apiGroups: + - crd.antrea.io + resources: + - antreacontrollerinfos + verbs: + - get + - create + - update + - delete + - apiGroups: + - crd.antrea.io + resources: + - antreaagentinfos + verbs: + - list + - create + - delete + - apiGroups: + - crd.antrea.io + resources: + - clusternetworkpolicies + - networkpolicies + verbs: + - get + - watch + - list + - update + - patch + - create + - delete + - apiGroups: + - crd.antrea.io + resources: + - clusternetworkpolicies/status + - networkpolicies/status + verbs: + - update + - apiGroups: + - crd.antrea.io + resources: + - tiers + verbs: + - get + - watch + - list + - update + - patch + - create + - delete + - apiGroups: + - crd.antrea.io + resources: + - traceflows + - traceflows/status + verbs: + - get + - watch + - list + - update + - patch + - create + - delete + - apiGroups: + - crd.antrea.io + resources: + - externalentities + - clustergroups + - groups + verbs: + - get + - watch + - list + - update + - patch + - create + - delete + - apiGroups: + - crd.antrea.io + resources: + - clustergroups/status + - groups/status + verbs: + - update + - apiGroups: + - crd.antrea.io + resources: + - egresses + verbs: + - get + - watch + - list + - update + - patch + - apiGroups: + - crd.antrea.io + resources: + - externalippools + - ippools + verbs: + - get + - watch + - list + - apiGroups: + - crd.antrea.io + resources: + - externalippools/status + - ippools/status + verbs: + - update + - patch + - apiGroups: + - crd.antrea.io + resources: + - externalnodes + verbs: + - get + - watch + - list + - apiGroups: + - apps + resources: + - statefulsets + verbs: + - get + - list + - watch +--- +# Source: antrea/templates/crds-rbac/clusterroles.yaml +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: aggregate-antrea-policies-edit + labels: + app: antrea + # Add these permissions to the "admin" and "edit" default roles. + rbac.authorization.k8s.io/aggregate-to-admin: "true" + rbac.authorization.k8s.io/aggregate-to-edit: "true" +rules: +- apiGroups: ["crd.antrea.io"] + resources: ["clusternetworkpolicies", "networkpolicies"] + verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] +--- +# Source: antrea/templates/crds-rbac/clusterroles.yaml +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: aggregate-antrea-policies-view + labels: + app: antrea + # Add these permissions to the "view" default role. + rbac.authorization.k8s.io/aggregate-to-view: "true" +rules: +- apiGroups: ["crd.antrea.io"] + resources: ["clusternetworkpolicies", "networkpolicies"] + verbs: ["get", "list", "watch"] +--- +# Source: antrea/templates/crds-rbac/clusterroles.yaml +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: aggregate-traceflows-edit + labels: + app: antrea + # Add these permissions to the "admin" and "edit" default roles. + rbac.authorization.k8s.io/aggregate-to-admin: "true" + rbac.authorization.k8s.io/aggregate-to-edit: "true" +rules: +- apiGroups: ["crd.antrea.io"] + resources: ["traceflows"] + verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] +--- +# Source: antrea/templates/crds-rbac/clusterroles.yaml +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: aggregate-traceflows-view + labels: + app: antrea + # Add these permissions to the "view" default role. + rbac.authorization.k8s.io/aggregate-to-view: "true" +rules: +- apiGroups: ["crd.antrea.io"] + resources: ["traceflows"] + verbs: ["get", "list", "watch"] +--- +# Source: antrea/templates/crds-rbac/clusterroles.yaml +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: aggregate-antrea-clustergroups-edit + labels: + app: antrea + # Add these permissions to the "admin" and "edit" default roles. + rbac.authorization.k8s.io/aggregate-to-admin: "true" + rbac.authorization.k8s.io/aggregate-to-edit: "true" +rules: +- apiGroups: ["crd.antrea.io"] + resources: ["clustergroups"] + verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] +--- +# Source: antrea/templates/crds-rbac/clusterroles.yaml +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: aggregate-antrea-clustergroups-view + labels: + app: antrea + # Add these permissions to the "view" default role. + rbac.authorization.k8s.io/aggregate-to-view: "true" +rules: +- apiGroups: ["crd.antrea.io"] + resources: ["clustergroups"] + verbs: ["get", "list", "watch"] +--- +# Source: antrea/templates/whereabouts/clusterrole.yaml +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: antrea-agent-whereabouts + labels: + app: antrea +rules: + - apiGroups: + - whereabouts.cni.cncf.io + resources: + - ippools + - overlappingrangeipreservations + verbs: + - get + - put + - watch + - list + - update + - patch + - create + - delete + - apiGroups: + - coordination.k8s.io + resources: + - leases + verbs: + - create + - get + - list + - update +--- +# Source: antrea/templates/agent/clusterrolebinding.yaml +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: antrea-agent + labels: + app: antrea +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: antrea-agent +subjects: + - kind: ServiceAccount + name: antrea-agent + namespace: kube-system +--- +# Source: antrea/templates/antctl/clusterrolebinding.yaml +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + labels: + app: antrea + name: antctl +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: antctl +subjects: + - kind: ServiceAccount + name: antctl + namespace: kube-system +--- +# Source: antrea/templates/controller/clusterrolebinding.yaml +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: antrea-controller + labels: + app: antrea +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: antrea-controller +subjects: + - kind: ServiceAccount + name: antrea-controller + namespace: kube-system +--- +# Source: antrea/templates/whereabouts/clusterrolebinding.yaml +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: antrea-agent-whereabouts + labels: + app: antrea +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: antrea-agent-whereabouts +subjects: + - kind: ServiceAccount + name: antrea-agent-whereabouts + namespace: kube-system +--- +# Source: antrea/templates/controller/service.yaml +apiVersion: v1 +kind: Service +metadata: + name: antrea + namespace: kube-system + labels: + app: antrea +spec: + ports: + - port: 443 + protocol: TCP + targetPort: api + selector: + app: antrea + component: antrea-controller +--- +# Source: antrea/templates/agent/daemonset.yaml +apiVersion: apps/v1 +kind: DaemonSet +metadata: + name: antrea-agent + namespace: kube-system + labels: + app: antrea + component: antrea-agent +spec: + selector: + matchLabels: + app: antrea + component: antrea-agent + updateStrategy: + type: RollingUpdate + template: + metadata: + annotations: + # Starting with v1.21, Kubernetes supports default container annotation. + # Using "kubectl logs/exec/attach/cp" doesn't have to specify "-c antrea-agent" when troubleshooting. + kubectl.kubernetes.io/default-container: antrea-agent + # Automatically restart Pods with a RollingUpdate if the ConfigMap changes + # See https://helm.sh/docs/howto/charts_tips_and_tricks/#automatically-roll-deployments + checksum/config: cda023525442c38c869663e4fd703a76cafa307220ae85ec0a8bd393587fa3ed + labels: + app: antrea + component: antrea-agent + spec: + hostNetwork: true + dnsPolicy: ClusterFirstWithHostNet + priorityClassName: system-node-critical + nodeSelector: + kubernetes.io/os: linux + tolerations: + - key: CriticalAddonsOnly + operator: Exists + - effect: NoSchedule + operator: Exists + - effect: NoExecute + operator: Exists + serviceAccountName: antrea-agent + initContainers: + - name: install-whereabouts-config + image: "antrea/antrea-ubuntu:intel-debug-sec" + resources: + requests: + cpu: "100m" + command: ["install_whereabouts_config"] + volumeMounts: + - name: whereabouts-cni-conf + mountPath: /host/etc/cni/net.d/whereabouts.d + - name: whereabouts-secret + mountPath: /var/run/secrets/whereabouts + - name: install-cni + image: "antrea/antrea-ubuntu:intel-debug-sec" + imagePullPolicy: IfNotPresent + resources: + requests: + cpu: 100m + command: ["install_cni"] + securityContext: + capabilities: + add: + # SYS_MODULE is required to load the OVS kernel module. + - SYS_MODULE + env: + # SKIP_CNI_BINARIES takes in values as a comma separated list of + # binaries that need to be skipped for installation, e.g. "portmap, bandwidth". + - name: SKIP_CNI_BINARIES + value: "" + volumeMounts: + - name: antrea-config + mountPath: /etc/antrea/antrea-cni.conflist + subPath: antrea-cni.conflist + readOnly: true + - name: host-cni-conf + mountPath: /host/etc/cni/net.d + - name: host-cni-bin + mountPath: /host/opt/cni/bin + # For loading the OVS kernel module. + - name: host-lib-modules + mountPath: /lib/modules + readOnly: true + # For changing the default permissions of the run directory. + - name: host-var-run-antrea + mountPath: /var/run/antrea + containers: + - name: antrea-agent + image: "antrea/antrea-ubuntu:intel-debug-sec" + imagePullPolicy: IfNotPresent + command: ["antrea-agent"] + # Log to both "/var/log/antrea/" and stderr (so "kubectl logs" can work).- + args: + - "--config=/etc/antrea/antrea-agent.conf" + - "--logtostderr=false" + - "--log_dir=/var/log/antrea" + - "--alsologtostderr" + - "--log_file_max_size=100" + - "--log_file_max_num=4" + env: + # Provide pod and node information for clusterinformation CRD. + - name: POD_NAME + valueFrom: + fieldRef: + fieldPath: metadata.name + - name: POD_NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: NODE_NAME + valueFrom: + fieldRef: + fieldPath: spec.nodeName + resources: + requests: + cpu: 200m + ports: + - containerPort: 10350 + name: api + protocol: TCP + livenessProbe: + exec: + command: + - /bin/sh + - -c + - container_liveness_probe agent + initialDelaySeconds: 5 + timeoutSeconds: 5 + periodSeconds: 10 + failureThreshold: 5 + readinessProbe: + httpGet: + host: localhost + path: /readyz + port: api + scheme: HTTPS + initialDelaySeconds: 5 + timeoutSeconds: 5 + periodSeconds: 10 + # In large-scale clusters, it may take up to 40~50 seconds for the antrea-agent to reconnect to the antrea + # Service after the antrea-controller restarts. The antrea-agent shouldn't be reported as NotReady in this + # scenario, otherwise the DaemonSet controller would restart all agents at once, as opposed to performing a + # rolling update. Set failureThreshold to 8 so it can tolerate 70s of disconnection. + failureThreshold: 8 + securityContext: + # antrea-agent needs to perform sysctl configuration. + privileged: true + volumeMounts: + - name: antrea-config + mountPath: /etc/antrea/antrea-agent.conf + subPath: antrea-agent.conf + readOnly: true + - name: host-var-run-antrea + mountPath: /var/run/antrea + - name: host-var-run-antrea + mountPath: /var/run/openvswitch + subPath: openvswitch + # host-local IPAM stores allocated IP addresses as files in /var/lib/cni/networks/$NETWORK_NAME. + # Mount a sub-directory of host-var-run-antrea to it for persistence of IP allocation. + - name: host-var-run-antrea + mountPath: /var/lib/cni + subPath: cni + # We need to mount both the /proc directory and the /var/run/netns directory so that + # antrea-agent can open the network namespace path when setting up Pod + # networking. Different container runtimes may use /proc or /var/run/netns when invoking + # the CNI commands. Docker uses /proc and containerd uses /var/run/netns. + - name: host-var-log-antrea + mountPath: /var/log/antrea + - name: host-proc + mountPath: /host/proc + readOnly: true + - name: host-var-run-netns + mountPath: /host/var/run/netns + readOnly: true + # When a container is created, a mount point for the network namespace is added under + # /var/run/netns on the host, which needs to be propagated to the antrea-agent container. + mountPropagation: HostToContainer + - name: xtables-lock + mountPath: /run/xtables.lock + - name: whereabouts-cni-conf + mountPath: /host/etc/cni/net.d/whereabouts.d + - name: whereabouts-secret + mountPath: /var/run/secrets/whereabouts + - mountPath: /var/lib/kubelet + name: host-kubelet + readOnly: true + - name: antrea-ovs + image: "antrea/antrea-ubuntu:intel-debug-sec" + imagePullPolicy: IfNotPresent + resources: + requests: + cpu: 200m + command: ["start_ovs"] + args: + - "--log_file_max_size=100" + - "--log_file_max_num=4" + securityContext: + # capabilities required by OVS daemons + capabilities: + add: + - SYS_NICE + - NET_ADMIN + - SYS_ADMIN + - IPC_LOCK + livenessProbe: + exec: + # docker CRI doesn't honor timeoutSeconds, add "timeout" to the command as a workaround. + # https://github.com/kubernetes/kubernetes/issues/51901 + command: + - /bin/sh + - -c + - timeout 10 container_liveness_probe ovs + initialDelaySeconds: 5 + timeoutSeconds: 10 + periodSeconds: 10 + failureThreshold: 5 + volumeMounts: + - name: host-var-run-antrea + mountPath: /var/run/openvswitch + subPath: openvswitch + - name: host-var-log-antrea + mountPath: /var/log/openvswitch + subPath: openvswitch + volumes: + - name: antrea-config + configMap: + name: antrea-config + - name: host-cni-conf + hostPath: + path: /etc/cni/net.d + - name: host-cni-bin + hostPath: + path: /opt/cni/bin + - name: host-proc + hostPath: + path: /proc + - name: host-var-run-netns + hostPath: + path: /var/run/netns + - name: host-var-run-antrea + hostPath: + path: /var/run/antrea + # we use subPath to create run subdirectories for different component (e.g. OVS) and + # subPath requires the base volume to exist + type: DirectoryOrCreate + - name: host-var-log-antrea + hostPath: + path: /var/log/antrea + # we use subPath to create logging subdirectories for different component (e.g. OVS) + type: DirectoryOrCreate + - name: host-lib-modules + hostPath: + path: /lib/modules + - name: xtables-lock + hostPath: + path: /run/xtables.lock + type: FileOrCreate + - hostPath: + path: /var/lib/kubelet + name: host-kubelet + - hostPath: + path: /host/etc/cni/net.d/whereabouts.d + name: whereabouts-cni-conf + - name: whereabouts-secret + secret: + secretName: whereabouts-cni-secret +--- +# Source: antrea/templates/controller/deployment.yaml +apiVersion: apps/v1 +kind: Deployment +metadata: + name: antrea-controller + namespace: kube-system + labels: + app: antrea + component: antrea-controller +spec: + strategy: + # Ensure the existing Pod is stopped before the new one is created. + type: Recreate + selector: + matchLabels: + app: antrea + component: antrea-controller + replicas: 1 + template: + metadata: + annotations: + # Automatically restart Pod if the ConfigMap changes + # See https://helm.sh/docs/howto/charts_tips_and_tricks/#automatically-roll-deployments + checksum/config: cda023525442c38c869663e4fd703a76cafa307220ae85ec0a8bd393587fa3ed + labels: + app: antrea + component: antrea-controller + spec: + nodeSelector: + kubernetes.io/os: linux + hostNetwork: true + priorityClassName: system-cluster-critical + tolerations: + - key: CriticalAddonsOnly + operator: Exists + - effect: NoSchedule + key: node-role.kubernetes.io/master + - effect: NoSchedule + key: node-role.kubernetes.io/control-plane + serviceAccountName: antrea-controller + containers: + - name: antrea-controller + image: "antrea/antrea-ubuntu:intel-debug-sec" + imagePullPolicy: IfNotPresent + resources: + requests: + cpu: 200m + command: ["antrea-controller"] + # Log to both "/var/log/antrea/" and stderr (so "kubectl logs" can work). + args: + - "--config=/etc/antrea/antrea-controller.conf" + - "--logtostderr=false" + - "--log_dir=/var/log/antrea" + - "--alsologtostderr" + - "--log_file_max_size=100" + - "--log_file_max_num=4" + env: + # Provide pod and node information for clusterinformation CRD. + - name: POD_NAME + valueFrom: + fieldRef: + fieldPath: metadata.name + - name: POD_NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: NODE_NAME + valueFrom: + fieldRef: + fieldPath: spec.nodeName + # Provide ServiceAccount name for validation webhook. + - name: SERVICEACCOUNT_NAME + valueFrom: + fieldRef: + fieldPath: spec.serviceAccountName + - name: ANTREA_CONFIG_MAP_NAME + value: antrea-config + ports: + - containerPort: 10349 + name: api + protocol: TCP + readinessProbe: + httpGet: + host: localhost + path: /readyz + port: api + scheme: HTTPS + initialDelaySeconds: 5 + timeoutSeconds: 5 + periodSeconds: 10 + failureThreshold: 5 + livenessProbe: + httpGet: + host: localhost + path: /livez + port: api + scheme: HTTPS + timeoutSeconds: 5 + periodSeconds: 10 + failureThreshold: 5 + volumeMounts: + - name: antrea-config + mountPath: /etc/antrea/antrea-controller.conf + subPath: antrea-controller.conf + readOnly: true + - name: antrea-controller-tls + mountPath: /var/run/antrea/antrea-controller-tls + - name: host-var-log-antrea + mountPath: /var/log/antrea + volumes: + - name: antrea-config + configMap: + name: antrea-config + # Make it optional as we only read it when selfSignedCert=false. + - name: antrea-controller-tls + secret: + secretName: antrea-controller-tls + defaultMode: 0400 + optional: true + - name: host-var-log-antrea + hostPath: + path: /var/log/antrea + type: DirectoryOrCreate +--- +# Source: antrea/templates/controller/apiservices.yaml +apiVersion: apiregistration.k8s.io/v1 +kind: APIService +metadata: + name: v1beta2.controlplane.antrea.io + labels: + app: antrea +spec: + group: controlplane.antrea.io + groupPriorityMinimum: 100 + version: v1beta2 + versionPriority: 100 + service: + name: antrea + namespace: kube-system +--- +# Source: antrea/templates/controller/apiservices.yaml +apiVersion: apiregistration.k8s.io/v1 +kind: APIService +metadata: + name: v1beta1.system.antrea.io + labels: + app: antrea +spec: + group: system.antrea.io + groupPriorityMinimum: 100 + version: v1beta1 + versionPriority: 100 + service: + name: antrea + namespace: kube-system +--- +# Source: antrea/templates/controller/apiservices.yaml +apiVersion: apiregistration.k8s.io/v1 +kind: APIService +metadata: + name: v1alpha1.stats.antrea.io + labels: + app: antrea +spec: + group: stats.antrea.io + groupPriorityMinimum: 100 + version: v1alpha1 + versionPriority: 100 + service: + name: antrea + namespace: kube-system +--- +# Source: antrea/templates/webhooks/mutating/crdmutator.yaml +apiVersion: admissionregistration.k8s.io/v1 +kind: MutatingWebhookConfiguration +metadata: + name: "crdmutator.antrea.io" + labels: + app: antrea +webhooks: + - name: "acnpmutator.antrea.io" + clientConfig: + service: + name: "antrea" + namespace: kube-system + path: "/mutate/acnp" + rules: + - operations: ["CREATE", "UPDATE"] + apiGroups: ["crd.antrea.io"] + apiVersions: ["v1alpha1"] + resources: ["clusternetworkpolicies"] + scope: "Cluster" + admissionReviewVersions: ["v1", "v1beta1"] + sideEffects: None + timeoutSeconds: 5 + - name: "anpmutator.antrea.io" + clientConfig: + service: + name: "antrea" + namespace: kube-system + path: "/mutate/anp" + rules: + - operations: ["CREATE", "UPDATE"] + apiGroups: ["crd.antrea.io"] + apiVersions: ["v1alpha1"] + resources: ["networkpolicies"] + scope: "Namespaced" + admissionReviewVersions: ["v1", "v1beta1"] + sideEffects: None + timeoutSeconds: 5 +--- +# Source: antrea/templates/webhooks/validating/crdvalidator.yaml +apiVersion: admissionregistration.k8s.io/v1 +kind: ValidatingWebhookConfiguration +metadata: + name: "crdvalidator.antrea.io" + labels: + app: antrea +webhooks: + - name: "tiervalidator.antrea.io" + clientConfig: + service: + name: "antrea" + namespace: kube-system + path: "/validate/tier" + rules: + - operations: ["CREATE", "UPDATE", "DELETE"] + apiGroups: ["crd.antrea.io"] + apiVersions: ["v1alpha1"] + resources: ["tiers"] + scope: "Cluster" + admissionReviewVersions: ["v1", "v1beta1"] + sideEffects: None + timeoutSeconds: 5 + - name: "acnpvalidator.antrea.io" + clientConfig: + service: + name: "antrea" + namespace: kube-system + path: "/validate/acnp" + rules: + - operations: ["CREATE", "UPDATE"] + apiGroups: ["crd.antrea.io"] + apiVersions: ["v1alpha1"] + resources: ["clusternetworkpolicies"] + scope: "Cluster" + admissionReviewVersions: ["v1", "v1beta1"] + sideEffects: None + timeoutSeconds: 5 + - name: "anpvalidator.antrea.io" + clientConfig: + service: + name: "antrea" + namespace: kube-system + path: "/validate/anp" + rules: + - operations: ["CREATE", "UPDATE"] + apiGroups: ["crd.antrea.io"] + apiVersions: ["v1alpha1"] + resources: ["networkpolicies"] + scope: "Namespaced" + admissionReviewVersions: ["v1", "v1beta1"] + sideEffects: None + timeoutSeconds: 5 + - name: "clustergroupvalidator.antrea.io" + clientConfig: + service: + name: "antrea" + namespace: kube-system + path: "/validate/clustergroup" + rules: + - operations: ["CREATE", "UPDATE"] + apiGroups: ["crd.antrea.io"] + apiVersions: ["v1alpha3", "v1alpha2"] + resources: ["clustergroups"] + scope: "Cluster" + admissionReviewVersions: ["v1", "v1beta1"] + sideEffects: None + timeoutSeconds: 5 + - name: "groupvalidator.antrea.io" + clientConfig: + service: + name: "antrea" + namespace: "kube-system" + path: "/validate/group" + rules: + - operations: [ "CREATE", "UPDATE" ] + apiGroups: [ "crd.antrea.io" ] + apiVersions: [ "v1alpha3" ] + resources: [ "groups" ] + scope: "Namespaced" + admissionReviewVersions: [ "v1", "v1beta1" ] + sideEffects: None + timeoutSeconds: 5 + - name: "externalippoolvalidator.antrea.io" + clientConfig: + service: + name: "antrea" + namespace: kube-system + path: "/validate/externalippool" + rules: + - operations: ["UPDATE"] + apiGroups: ["crd.antrea.io"] + apiVersions: ["v1alpha2"] + resources: ["externalippools"] + scope: "Cluster" + admissionReviewVersions: ["v1", "v1beta1"] + sideEffects: None + timeoutSeconds: 5 + - name: "egressvalidator.antrea.io" + clientConfig: + service: + name: "antrea" + namespace: kube-system + path: "/validate/egress" + rules: + - operations: ["CREATE", "UPDATE"] + apiGroups: ["crd.antrea.io"] + apiVersions: ["v1alpha2"] + resources: ["egresses"] + scope: "Cluster" + admissionReviewVersions: ["v1", "v1beta1"] + sideEffects: None + timeoutSeconds: 5 + - name: "ippoolvalidator.antrea.io" + clientConfig: + service: + name: "antrea" + namespace: kube-system + path: "/validate/ippool" + rules: + - operations: ["CREATE", "UPDATE", "DELETE"] + apiGroups: ["crd.antrea.io"] + apiVersions: ["v1alpha2"] + resources: ["ippools"] + scope: "Cluster" + admissionReviewVersions: ["v1", "v1beta1"] + sideEffects: None + timeoutSeconds: 5 diff --git a/b.log b/b.log new file mode 100644 index 00000000000..5949cafae8c --- /dev/null +++ b/b.log @@ -0,0 +1,611 @@ +I1012 11:10:43.223487 1 log_file.go:93] Set log file max size to 104857600 +I1012 11:10:43.225750 1 agent.go:96] Starting Antrea agent (version v1.9.0-dev-0dceb752.dirty) +I1012 11:10:43.225800 1 client.go:87] No kubeconfig file was specified. Falling back to in-cluster config +I1012 11:10:43.226952 1 prometheus.go:171] Initializing prometheus metrics +I1012 11:10:43.227510 1 ovs_client.go:70] Connecting to OVSDB at address /var/run/openvswitch/db.sock +I1012 11:10:44.228790 1 ovs_client.go:89] Not connected yet, will try again in 2s +I1012 11:10:44.229244 1 agent.go:361] Setting up node network +I1012 11:10:44.255925 1 agent.go:950] "Setting Node MTU" MTU=1450 +I1012 11:10:44.256765 1 ovs_client.go:113] Bridge exists: 0f59126c-82e4-45cf-bac0-0696844bdb40 +I1012 11:10:44.274651 1 agent.go:1091] Using round number 33 +I1012 11:10:44.275084 1 ofctrl.go:172] Initialize connection or re-connect to /var/run/openvswitch/br-int.mgmt. +I1012 11:10:44.364108 1 route_linux.go:163] Initialized iptables +I1012 11:10:45.275939 1 ofctrl.go:187] Connected to socket /var/run/openvswitch/br-int.mgmt +I1012 11:10:45.276371 1 ofctrl.go:249] New connection.. +I1012 11:10:45.276437 1 ofctrl.go:257] Sent hello with OF version: 6 +I1012 11:10:45.276552 1 ofctrl.go:269] Received Openflow 1.5 Hello message +I1012 11:10:45.277385 1 ofctrl.go:289] Received ofp1.5 Switch feature response: {Header:{Version:6 Type:6 Length:32 Xid:3} DPID:00:00:6e:12:59:0f:cf:45 Buffers:0 NumTables:254 AuxilaryId:0 pad:[0 0] Capabilities:591 Reserved:0} +I1012 11:10:45.277468 1 ofSwitch.go:85] Openflow Connection for new switch: 00:00:6e:12:59:0f:cf:45 +I1012 11:10:45.277981 1 ofctrl_bridge.go:325] OFSwitch is connected: 00:00:6e:12:59:0f:cf:45 +I1012 11:10:45.399849 1 agent.go:452] Agent initialized NodeConfig=NodeName: vcesd2, OVSBridge: br-int, PodIPv4CIDR: 172.25.0.0/24, PodIPv6CIDR: , NodeIPv4: 172.25.55.29/24, NodeIPv6: , TransportIPv4: 172.25.55.29/24, TransportIPv6: , Gateway: Name antrea-gw0: IPv4 172.25.0.1, IPv6 , MAC 62:3d:8d:a2:1b:bf, NetworkConfig=&{encap geneve 0 None {psk } [] true false} +I1012 11:10:45.402085 1 metrics.go:138] Registering Antrea Proxy prometheus metrics +I1012 11:10:45.408129 1 fqdn.go:186] "Using kube-dns Service for DNS requests" dnsServer="10.96.0.10:53" +I1012 11:10:45.408278 1 audit_logging.go:177] "Initialized Antrea-native Policy Logger for audit logging" logFile="/var/log/antrea/networkpolicy/np.log" +I1012 11:10:45.414392 1 server.go:743] Reconciliation for CNI server +I1012 11:10:45.441481 1 agent.go:609] Cleaning up flow-restore-wait config +I1012 11:10:45.442341 1 agent.go:622] Cleaned up flow-restore-wait config +I1012 11:10:45.442358 1 client.go:105] No antrea kubeconfig file was specified. Falling back to in-cluster config +I1012 11:10:45.442367 1 client.go:108] Didn't get CA certificate, skip updating Antrea Client +I1012 11:10:45.442411 1 client.go:87] No kubeconfig file was specified. Falling back to in-cluster config +I1012 11:10:45.442446 1 channel.go:83] "Starting SubscribableChannel" name="PodUpdate" +I1012 11:10:45.442493 1 log_file.go:121] Starting log file monitoring. Maximum log file number is 4 +I1012 11:10:45.442563 1 node_route_controller.go:362] Starting AntreaAgentNodeRouteController +I1012 11:10:45.442620 1 shared_informer.go:255] Waiting for caches to sync for AntreaAgentNodeRouteController +I1012 11:10:45.442669 1 route_linux.go:197] Starting iptables sync, with sync interval 1m0s +I1012 11:10:45.442692 1 server.go:677] Starting CNI server +I1012 11:10:45.442734 1 configmap_cafile_content.go:202] "Starting controller" name="antrea-ca::kube-system::antrea-ca::ca.crt" +I1012 11:10:45.442774 1 shared_informer.go:255] Waiting for caches to sync for antrea-ca::kube-system::antrea-ca::ca.crt +I1012 11:10:45.442938 1 networkpolicy_controller.go:447] Waiting for Antrea client to be ready +I1012 11:10:45.442981 1 server.go:687] CNI server is listening ... +I1012 11:10:45.442995 1 cluster.go:323] "Starting" controllerName="MemberListCluster" +I1012 11:10:45.443058 1 shared_informer.go:255] Waiting for caches to sync for MemberListCluster +I1012 11:10:45.443072 1 traceflow_controller.go:170] Starting AntreaAgentTraceflowController +I1012 11:10:45.443088 1 shared_informer.go:255] Waiting for caches to sync for AntreaAgentTraceflowController +I1012 11:10:45.443098 1 log_file.go:182] Deleted log file antrea-agent.vcesd2.root.log.INFO.20221012-104620.1 +I1012 11:10:45.443164 1 controller.go:168] Starting ExternalIPPoolController +I1012 11:10:45.443205 1 log_file.go:182] Deleted log file antrea-agent.vcesd2.root.log.WARNING.20221012-102701.1 +I1012 11:10:45.443226 1 shared_informer.go:255] Waiting for caches to sync for ExternalIPPoolController +I1012 11:10:45.443222 1 egress_controller.go:307] Starting AntreaAgentEgressController +I1012 11:10:45.443299 1 shared_informer.go:255] Waiting for caches to sync for AntreaAgentEgressController +I1012 11:10:45.443359 1 local_ip_detector_linux.go:59] Starting localIPDetector +I1012 11:10:45.443531 1 config.go:132] Starting endpoints config controller +I1012 11:10:45.443549 1 shared_informer.go:255] Waiting for caches to sync for endpoints config +I1012 11:10:45.443561 1 config.go:223] Starting service config controller +I1012 11:10:45.443619 1 shared_informer.go:255] Waiting for caches to sync for service config +I1012 11:10:45.443628 1 controller.go:454] "Starting " controller="SecondaryNetworkController" +I1012 11:10:45.443660 1 agent.go:49] Starting Antrea Agent Monitor +I1012 11:10:45.443699 1 shared_informer.go:255] Waiting for caches to sync for SecondaryNetworkController +I1012 11:10:45.443744 1 collector.go:86] Start collecting metrics +I1012 11:10:45.543192 1 shared_informer.go:262] Caches are synced for antrea-ca::kube-system::antrea-ca::ca.crt +I1012 11:10:45.543286 1 shared_informer.go:262] Caches are synced for AntreaAgentNodeRouteController +I1012 11:10:45.543330 1 node_route_controller.go:315] Reconciliation for AntreaAgentNodeRouteController +I1012 11:10:45.543338 1 shared_informer.go:262] Caches are synced for AntreaAgentTraceflowController +I1012 11:10:45.543412 1 shared_informer.go:262] Caches are synced for AntreaAgentEgressController +I1012 11:10:45.543497 1 shared_informer.go:262] Caches are synced for MemberListCluster +I1012 11:10:45.543595 1 shared_informer.go:262] Caches are synced for ExternalIPPoolController +I1012 11:10:45.543636 1 client.go:105] No antrea kubeconfig file was specified. Falling back to in-cluster config +I1012 11:10:45.543688 1 shared_informer.go:262] Caches are synced for endpoints config +I1012 11:10:45.543707 1 egress_controller.go:766] Starting watch for EgressGroup +W1012 11:10:45.543722 1 egress_controller.go:769] Failed to get antrea client: Antrea client is not ready +I1012 11:10:45.543746 1 shared_informer.go:262] Caches are synced for service config +I1012 11:10:45.543890 1 shared_informer.go:262] Caches are synced for SecondaryNetworkController +I1012 11:10:45.544014 1 client.go:130] Updating Antrea client with the new CA bundle +I1012 11:10:45.544210 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/etcd-vcesd2" +I1012 11:10:45.544231 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-controller-manager-vcesd2" +I1012 11:10:45.544264 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/coredns-64897985d-hzkht" +I1012 11:10:45.544274 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/antrea-controller-59cbc8f559-724q8" +I1012 11:10:45.544291 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-sriov-device-plugin-amd64-95srr" +I1012 11:10:45.544313 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-scheduler-vcesd2" +I1012 11:10:45.544337 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-proxy-xp5bq" +I1012 11:10:45.544345 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/coredns-64897985d-ffc47" +I1012 11:10:45.544313 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-apiserver-vcesd2" +I1012 11:10:45.544426 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/antrea-agent-tx8dr" +I1012 11:10:45.544850 1 cluster.go:461] "Processed Node event" eventType=Join nodeName="vcesd2" affectedExternalIPPoolNum=0 +I1012 11:10:45.643764 1 networkpolicy_controller.go:458] Antrea client is ready +I1012 11:10:45.643822 1 networkpolicy_controller.go:473] Waiting for all watchers to complete full sync +I1012 11:10:45.643853 1 networkpolicy_controller.go:711] Starting watch for AddressGroup +I1012 11:10:45.643893 1 networkpolicy_controller.go:711] Starting watch for AppliedToGroup +I1012 11:10:45.643864 1 networkpolicy_controller.go:711] Starting watch for NetworkPolicy +I1012 11:10:45.932310 1 serving.go:348] Generated self-signed cert in-memory +I1012 11:10:46.219530 1 requestheader_controller.go:169] Starting RequestHeaderAuthRequestController +I1012 11:10:46.219564 1 shared_informer.go:255] Waiting for caches to sync for RequestHeaderAuthRequestController +I1012 11:10:46.219574 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" +I1012 11:10:46.219601 1 shared_informer.go:255] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file +I1012 11:10:46.219619 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" +I1012 11:10:46.219665 1 shared_informer.go:255] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file +I1012 11:10:46.219948 1 secure_serving.go:210] Serving securely on [::]:10350 +I1012 11:10:46.220010 1 tlsconfig.go:240] "Starting DynamicServingCertificateController" +I1012 11:10:46.319698 1 shared_informer.go:262] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file +I1012 11:10:46.319820 1 shared_informer.go:262] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file +I1012 11:10:46.319900 1 shared_informer.go:262] Caches are synced for RequestHeaderAuthRequestController +W1012 11:10:46.675566 1 networkpolicy_controller.go:714] Failed to start watch for AddressGroup: Get "https://10.107.224.207:443/apis/controlplane.antrea.io/v1beta2/addressgroups?fieldSelector=nodeName%3Dvcesd2&watch=true": dial tcp 10.107.224.207:443: connect: connection refused +W1012 11:10:46.675595 1 networkpolicy_controller.go:714] Failed to start watch for AppliedToGroup: Get "https://10.107.224.207:443/apis/controlplane.antrea.io/v1beta2/appliedtogroups?fieldSelector=nodeName%3Dvcesd2&watch=true": dial tcp 10.107.224.207:443: connect: connection refused +W1012 11:10:46.675636 1 networkpolicy_controller.go:714] Failed to start watch for NetworkPolicy: Get "https://10.107.224.207:443/apis/controlplane.antrea.io/v1beta2/networkpolicies?fieldSelector=nodeName%3Dvcesd2&watch=true": dial tcp 10.107.224.207:443: connect: connection refused +I1012 11:10:50.544624 1 egress_controller.go:766] Starting watch for EgressGroup +I1012 11:10:50.644362 1 networkpolicy_controller.go:711] Starting watch for AddressGroup +I1012 11:10:50.644457 1 networkpolicy_controller.go:711] Starting watch for AppliedToGroup +I1012 11:10:50.644532 1 networkpolicy_controller.go:711] Starting watch for NetworkPolicy +I1012 11:10:50.842769 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/antrea-controller-59cbc8f559-724q8" +I1012 11:10:51.591038 1 egress_controller.go:787] Started watch for EgressGroup +I1012 11:10:51.591326 1 networkpolicy_controller.go:724] Started watch for AppliedToGroup +I1012 11:10:51.591337 1 egress_controller.go:815] Received 0 init events for EgressGroup +I1012 11:10:51.591424 1 networkpolicy_controller.go:754] Received 0 init events for AppliedToGroup +I1012 11:10:51.591504 1 networkpolicy_controller.go:724] Started watch for NetworkPolicy +I1012 11:10:51.591533 1 networkpolicy_controller.go:724] Started watch for AddressGroup +I1012 11:10:51.591601 1 networkpolicy_controller.go:754] Received 0 init events for AddressGroup +I1012 11:10:51.591638 1 networkpolicy_controller.go:754] Received 0 init events for NetworkPolicy +I1012 11:10:51.591691 1 networkpolicy_controller.go:475] All watchers have completed full sync, installing flows for init events +I1012 11:10:51.592612 1 networkpolicy_controller.go:479] Starting NetworkPolicy workers now +I1012 11:10:51.592647 1 networkpolicy_controller.go:485] Starting IDAllocator worker to maintain the async rule cache +I1012 11:10:51.592681 1 status_controller.go:209] Starting NetworkPolicy StatusController +I1012 11:10:55.400565 1 agent.go:527] Deleting stale flows from previous round if any +I1012 11:10:55.400614 1 agent.go:459] Persisting round number 33 to OVSDB +I1012 11:10:55.401622 1 agent.go:464] Round number 33 was persisted to OVSDB +I1012 11:11:00.851364 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/antrea-agent-tx8dr" +I1012 11:20:45.444142 1 log_file.go:182] Deleted log file antrea-agent.vcesd2.root.log.WARNING.20221012-104622.1 +I1012 12:05:40.985451 1 server.go:425] Received CmdAdd request cni_args:{container_id:"1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8" netns:"/proc/3277680/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec2;K8S_POD_INFRA_CONTAINER_ID=1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:05:40.985815 1 server.go:425] Received CmdAdd request cni_args:{container_id:"4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c" netns:"/proc/3277670/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec3;K8S_POD_INFRA_CONTAINER_ID=4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:05:40.992493 1 server.go:495] "Allocated IP addresses" container="1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.88 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 12:05:40.992858 1 server.go:495] "Allocated IP addresses" container="4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.89 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 12:05:41.094857 1 server.go:425] Received CmdAdd request cni_args:{container_id:"ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50" netns:"/proc/3277699/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec1;K8S_POD_INFRA_CONTAINER_ID=ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:05:41.103371 1 server.go:495] "Allocated IP addresses" container="ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.90 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 12:05:41.163921 1 pod_configuration.go:265] Configured interfaces for container 1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8 +I1012 12:05:41.163960 1 server.go:522] CmdAdd for container 1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8 succeeded +I1012 12:05:41.163963 1 pod_configuration.go:265] Configured interfaces for container 4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c +I1012 12:05:41.163993 1 server.go:522] CmdAdd for container 4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c succeeded +I1012 12:05:41.180512 1 pod_configuration.go:265] Configured interfaces for container ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50 +I1012 12:05:41.180555 1 server.go:522] CmdAdd for container ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50 succeeded +I1012 12:05:41.434696 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:05:41.443588 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:05:41.443642 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:05:41.446876 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:05:41.449860 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:05:41.449898 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:05:42.499240 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:05:42.505125 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:05:42.505165 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:05:43.444051 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:05:43.450463 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:05:43.453030 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:05:43.453072 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:05:43.453396 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:05:43.453446 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:05:44.505866 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:05:44.511677 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:05:44.511721 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:05:47.453850 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:05:47.453922 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:05:47.462403 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:05:47.462447 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:05:47.462646 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:05:47.462675 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:05:48.512951 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:05:48.520540 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:05:48.520583 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:05:55.462988 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:05:55.463034 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:05:55.479525 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:05:55.479569 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:05:55.479606 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:05:55.479654 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:05:56.521285 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:05:56.531969 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:05:56.532012 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:06:11.480824 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:06:11.480863 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:06:11.488517 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:06:11.488562 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:06:11.488522 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:06:11.488620 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:06:12.532187 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:06:12.542697 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:06:12.542741 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:06:43.488834 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:06:43.488874 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:06:43.497187 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:06:43.497232 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:06:43.497512 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:06:43.497555 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:06:44.543226 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:06:44.549004 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:06:44.549055 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:07:47.497784 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:07:47.497848 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:07:47.507669 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:07:47.507742 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:07:47.508017 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:07:47.508068 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:07:48.549887 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:07:48.558654 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:07:48.558695 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:09:47.508871 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:09:47.508922 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:09:47.518239 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:09:47.518286 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:09:47.518609 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:09:47.518672 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:09:48.559792 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:09:48.565655 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:09:48.565704 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:11:47.519409 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:11:47.519461 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:11:47.528148 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:11:47.528192 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:11:47.528428 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:11:47.528475 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:11:48.566908 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:11:48.577596 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:11:48.577646 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:12:19.519860 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:12:19.541809 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec1" +I1012 12:12:19.541876 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 12:12:19.541949 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:12:19.542057 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:12:19.542074 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +I1012 12:12:19.648418 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:12:19.651926 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec2" +I1012 12:12:19.652025 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 12:12:19.652125 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:12:19.652174 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:12:19.652195 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T12:12:19Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T12:12:19Z [debug] Beginning IPAM for ContainerID: ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50 +2022-10-12T12:12:19Z [debug] Started leader election +I1012 12:12:19.616509 3994 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:12:19.630896 3994 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:12:19Z [debug] OnStartedLeading() called +2022-10-12T12:12:19Z [debug] Elected as leader, do processing +2022-10-12T12:12:19Z [debug] IPManagement -- mode: 0 / containerID: ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50 / podRef: kube-system/testpodsec1 +2022-10-12T12:12:19Z [error] IPAM error reading pool allocations (attempt: 0): k8s pool initialized +2022-10-12T12:12:19Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T12:12:19Z [debug] Reserving IP: |148.14.24.1 ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50| +2022-10-12T12:12:19Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.1 +2022-10-12T12:12:19Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.1 GenerateName: Namespace:kube-system SelfLink: UID:3bd77b2f-4a95-4966-8fe3-6e4895687987 ResourceVersion:9982 Generation:1 CreationTimestamp:2022-10-12 12:12:19 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:12:19 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50 PodRef:kube-system/testpodsec1}} +2022-10-12T12:12:19Z [debug] OnStoppedLeading() called +2022-10-12T12:12:19Z [debug] Finished leader election +2022-10-12T12:12:19Z [debug] IPManagement: {148.14.24.1 ffffff00}, +I1012 12:12:19.675848 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[] +I1012 12:12:19.757665 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:12:19.761079 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec3" +I1012 12:12:19.761243 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 12:12:19.761387 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:12:19.761462 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:12:19.761495 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T12:12:19Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T12:12:19Z [debug] Beginning IPAM for ContainerID: 1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8 +2022-10-12T12:12:19Z [debug] Started leader election +I1012 12:12:19.736046 4024 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:12:19.745156 4024 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:12:19Z [debug] OnStartedLeading() called +2022-10-12T12:12:19Z [debug] Elected as leader, do processing +2022-10-12T12:12:19Z [debug] IPManagement -- mode: 0 / containerID: 1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8 / podRef: kube-system/testpodsec2 +2022-10-12T12:12:19Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T12:12:19Z [debug] Reserving IP: |148.14.24.2 1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8| +2022-10-12T12:12:19Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.2 +2022-10-12T12:12:19Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.2 GenerateName: Namespace:kube-system SelfLink: UID:8ff6cda0-dc79-4a3c-8ca7-a4267a11d0e2 ResourceVersion:9990 Generation:1 CreationTimestamp:2022-10-12 12:12:19 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:12:19 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8 PodRef:kube-system/testpodsec2}} +2022-10-12T12:12:19Z [debug] OnStoppedLeading() called +2022-10-12T12:12:19Z [debug] Finished leader election +2022-10-12T12:12:19Z [debug] IPManagement: {148.14.24.2 ffffff00}, +I1012 12:12:19.778901 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[] +2022-10-12T12:12:19Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec3 PodNamespace:kube-system} +2022-10-12T12:12:19Z [debug] Beginning IPAM for ContainerID: 4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c +2022-10-12T12:12:19Z [debug] Started leader election +I1012 12:12:19.829385 4081 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:12:19.838506 4081 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:12:19Z [debug] OnStartedLeading() called +2022-10-12T12:12:19Z [debug] Elected as leader, do processing +2022-10-12T12:12:19Z [debug] IPManagement -- mode: 0 / containerID: 4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c / podRef: kube-system/testpodsec3 +2022-10-12T12:12:19Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T12:12:19Z [debug] Reserving IP: |148.14.24.3 4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c| +2022-10-12T12:12:19Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.3 +2022-10-12T12:12:19Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.3 GenerateName: Namespace:kube-system SelfLink: UID:14aa21b5-f321-4341-bb0f-3f5c9e0ba94b ResourceVersion:9995 Generation:1 CreationTimestamp:2022-10-12 12:12:19 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:12:19 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c PodRef:kube-system/testpodsec3}} +2022-10-12T12:12:19Z [debug] OnStoppedLeading() called +2022-10-12T12:12:19Z [debug] Finished leader election +2022-10-12T12:12:19Z [debug] IPManagement: {148.14.24.3 ffffff00}, +I1012 12:12:19.869993 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[] +2022-10-12T12:12:19Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec3 PodNamespace:kube-system} +2022-10-12T12:12:19Z [debug] Beginning delete for ContainerID: 4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c +2022-10-12T12:12:19Z [debug] Started leader election +I1012 12:12:19.938931 4137 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:12:19.955388 4137 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:12:19Z [debug] OnStartedLeading() called +2022-10-12T12:12:19Z [debug] Elected as leader, do processing +2022-10-12T12:12:19Z [debug] IPManagement -- mode: 1 / containerID: 4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c / podRef: kube-system/testpodsec3 +2022-10-12T12:12:19Z [debug] Deallocating given previously used IP: 148.14.24.3 +2022-10-12T12:12:19Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.3 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:12:19Z [debug] OnStoppedLeading() called +2022-10-12T12:12:19Z [debug] Finished leader election +2022-10-12T12:12:19Z [debug] IPManagement: { }, +I1012 12:12:19.983624 1 controller.go:440] "INTEL - secondary interface configuration FAILED!!!!!!!!!!!!!!!!!" err="SRIOV Interface creation failed: error getting the Pod SR-IOV VF device ID" +I1012 12:12:19.983736 1 controller.go:154] "Pod VF Cache cleared" pod="kube-system/testpodsec3" +2022-10-12T12:12:19Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T12:12:19Z [debug] Beginning delete for ContainerID: ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50 +2022-10-12T12:12:19Z [debug] Started leader election +I1012 12:12:19.747453 4037 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:12:20.629011 4037 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:12:20Z [debug] OnStartedLeading() called +2022-10-12T12:12:20Z [debug] Elected as leader, do processing +2022-10-12T12:12:20Z [debug] IPManagement -- mode: 1 / containerID: ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50 / podRef: kube-system/testpodsec1 +2022-10-12T12:12:20Z [debug] Deallocating given previously used IP: 148.14.24.1 +2022-10-12T12:12:20Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.1 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:12:20Z [debug] OnStoppedLeading() called +2022-10-12T12:12:20Z [debug] Finished leader election +2022-10-12T12:12:20Z [debug] IPManagement: { }, +I1012 12:12:20.663064 1 controller.go:440] "INTEL - secondary interface configuration FAILED!!!!!!!!!!!!!!!!!" err="SRIOV Interface creation failed: error getting the Pod SR-IOV VF device ID" +I1012 12:12:20.663174 1 controller.go:154] "Pod VF Cache cleared" pod="kube-system/testpodsec1" +2022-10-12T12:12:19Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T12:12:19Z [debug] Beginning delete for ContainerID: 1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8 +2022-10-12T12:12:19Z [debug] Started leader election +I1012 12:12:19.845556 4088 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:12:20.720232 4088 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:12:20Z [debug] OnStartedLeading() called +2022-10-12T12:12:20Z [debug] Elected as leader, do processing +2022-10-12T12:12:20Z [debug] IPManagement -- mode: 1 / containerID: 1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8 / podRef: kube-system/testpodsec2 +2022-10-12T12:12:20Z [debug] Deallocating given previously used IP: 148.14.24.2 +2022-10-12T12:12:20Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.2 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:12:20Z [debug] OnStoppedLeading() called +2022-10-12T12:12:20Z [debug] Finished leader election +2022-10-12T12:12:20Z [debug] IPManagement: { }, +I1012 12:12:20.752450 1 controller.go:440] "INTEL - secondary interface configuration FAILED!!!!!!!!!!!!!!!!!" err="SRIOV Interface creation failed: error getting the Pod SR-IOV VF device ID" +I1012 12:12:20.752554 1 controller.go:154] "Pod VF Cache cleared" pod="kube-system/testpodsec2" +I1012 12:12:39.019976 1 server.go:425] Received CmdAdd request cni_args:{container_id:"edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb" netns:"/proc/3283572/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec3;K8S_POD_INFRA_CONTAINER_ID=edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:12:39.026042 1 server.go:495] "Allocated IP addresses" container="edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.91 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 12:12:39.111538 1 server.go:425] Received CmdAdd request cni_args:{container_id:"62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed" netns:"/proc/3283583/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec1;K8S_POD_INFRA_CONTAINER_ID=62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:12:39.111713 1 server.go:425] Received CmdAdd request cni_args:{container_id:"e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da" netns:"/proc/3283590/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec2;K8S_POD_INFRA_CONTAINER_ID=e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:12:39.117985 1 server.go:495] "Allocated IP addresses" container="62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.92 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 12:12:39.118819 1 server.go:495] "Allocated IP addresses" container="e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.93 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 12:12:39.249560 1 pod_configuration.go:265] Configured interfaces for container edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb +I1012 12:12:39.249604 1 server.go:522] CmdAdd for container edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb succeeded +I1012 12:12:39.260774 1 pod_configuration.go:265] Configured interfaces for container 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed +I1012 12:12:39.260810 1 server.go:522] CmdAdd for container 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed succeeded +I1012 12:12:39.260848 1 pod_configuration.go:265] Configured interfaces for container e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da +I1012 12:12:39.260877 1 server.go:522] CmdAdd for container e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da succeeded +I1012 12:12:40.239577 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:12:40.246500 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec2" +I1012 12:12:40.246587 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 12:12:40.246732 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:12:40.246785 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:12:40.246802 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +I1012 12:12:40.249753 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:12:40.253557 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec1" +I1012 12:12:40.253652 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 12:12:40.253747 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:12:40.253798 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:12:40.253819 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +I1012 12:12:40.263355 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:12:40.267077 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec3" +I1012 12:12:40.267220 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 12:12:40.267354 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:12:40.267409 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:12:40.267427 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T12:12:40Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T12:12:40Z [debug] Beginning IPAM for ContainerID: e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da +2022-10-12T12:12:40Z [debug] Started leader election +I1012 12:12:40.333020 4194 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:12:40.346262 4194 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:12:40Z [debug] OnStartedLeading() called +2022-10-12T12:12:40Z [debug] Elected as leader, do processing +2022-10-12T12:12:40Z [debug] IPManagement -- mode: 0 / containerID: e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da / podRef: kube-system/testpodsec2 +2022-10-12T12:12:40Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T12:12:40Z [debug] Reserving IP: |148.14.24.1 e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da| +2022-10-12T12:12:40Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.1 +2022-10-12T12:12:40Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.1 GenerateName: Namespace:kube-system SelfLink: UID:b0df3b78-b1b2-4487-8d0a-780609bf5abf ResourceVersion:10063 Generation:1 CreationTimestamp:2022-10-12 12:12:40 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:12:40 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da PodRef:kube-system/testpodsec2}} +2022-10-12T12:12:40Z [debug] OnStoppedLeading() called +2022-10-12T12:12:40Z [debug] Finished leader election +2022-10-12T12:12:40Z [debug] IPManagement: {148.14.24.1 ffffff00}, +I1012 12:12:40.382347 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:03.7 ifName:} {vfDeviceID:0000:18:06.7 ifName:} {vfDeviceID:0000:18:05.3 ifName:}] +I1012 12:12:40.448450 1 sriov.go:118] Configured interfaces for container e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da; hostIface: {Name:ens785f0v23 Mac:e6:e8:c7:3b:7a:fc Sandbox:}, containerIface: {Name:eth2 Mac:e6:e8:c7:3b:7a:fc Sandbox:/host/proc/3283590/ns/net} +I1012 12:12:40.448529 1 controller.go:444] "INTEL - networklist ITERATED" +I1012 12:12:40.448570 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net2 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth3 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:12:40.453324 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:7d1f7d37-57cd-475e-a117-5f4c8b473f0e ResourceVersion:9962 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > Pod="kube-system/testpodsec2" +I1012 12:12:40.453427 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:7d1f7d37-57cd-475e-a117-5f4c8b473f0e ResourceVersion:9962 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > +I1012 12:12:40.453520 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.25.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net2\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:12:40.453568 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:12:40.453590 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T12:12:40Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T12:12:40Z [debug] Beginning IPAM for ContainerID: e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da +2022-10-12T12:12:40Z [debug] Started leader election +I1012 12:12:40.526613 4277 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:12:40.536870 4277 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:12:40Z [debug] OnStartedLeading() called +2022-10-12T12:12:40Z [debug] Elected as leader, do processing +2022-10-12T12:12:40Z [debug] IPManagement -- mode: 0 / containerID: e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da / podRef: kube-system/testpodsec2 +2022-10-12T12:12:40Z [error] IPAM error reading pool allocations (attempt: 0): k8s pool initialized +2022-10-12T12:12:40Z [debug] IterateForAssignment input >> ip: 148.14.25.0 | ipnet: {148.14.25.0 ffffff00} | first IP: 148.14.25.1 | last IP: 148.14.25.254 +2022-10-12T12:12:40Z [debug] Reserving IP: |148.14.25.1 e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da| +2022-10-12T12:12:40Z [debug] OverlappingRangewide allocation check for IP: 148.14.25.1 +2022-10-12T12:12:40Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.1 GenerateName: Namespace:kube-system SelfLink: UID:ecde1aef-06ca-4e2a-aea2-8adc66d8b556 ResourceVersion:10069 Generation:1 CreationTimestamp:2022-10-12 12:12:40 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:12:40 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da PodRef:kube-system/testpodsec2}} +2022-10-12T12:12:40Z [debug] OnStoppedLeading() called +2022-10-12T12:12:40Z [debug] Finished leader election +2022-10-12T12:12:40Z [debug] IPManagement: {148.14.25.1 ffffff00}, +I1012 12:12:40.588289 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:03.7 ifName:eth2} {vfDeviceID:0000:18:06.7 ifName:} {vfDeviceID:0000:18:05.3 ifName:}] +I1012 12:12:40.660277 1 sriov.go:118] Configured interfaces for container e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da; hostIface: {Name:ens785f0v47 Mac:7a:f8:bb:ea:1d:91 Sandbox:}, containerIface: {Name:eth3 Mac:7a:f8:bb:ea:1d:91 Sandbox:/host/proc/3283590/ns/net} +I1012 12:12:40.660358 1 controller.go:444] "INTEL - networklist ITERATED" +2022-10-12T12:12:40Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec3 PodNamespace:kube-system} +2022-10-12T12:12:40Z [debug] Beginning IPAM for ContainerID: edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb +2022-10-12T12:12:40Z [debug] Started leader election +I1012 12:12:40.347637 4210 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:12:41.222943 4210 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:12:41Z [debug] OnStartedLeading() called +2022-10-12T12:12:41Z [debug] Elected as leader, do processing +2022-10-12T12:12:41Z [debug] IPManagement -- mode: 0 / containerID: edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb / podRef: kube-system/testpodsec3 +2022-10-12T12:12:41Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T12:12:41Z [debug] Reserving IP: |148.14.24.2 edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb| +2022-10-12T12:12:41Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.2 +2022-10-12T12:12:41Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.2 GenerateName: Namespace:kube-system SelfLink: UID:ea9b115b-7bec-49fd-a465-6c66a3b19b3a ResourceVersion:10074 Generation:1 CreationTimestamp:2022-10-12 12:12:41 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:12:41 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb PodRef:kube-system/testpodsec3}} +2022-10-12T12:12:41Z [debug] OnStoppedLeading() called +2022-10-12T12:12:41Z [debug] Finished leader election +2022-10-12T12:12:41Z [debug] IPManagement: {148.14.24.2 ffffff00}, +I1012 12:12:41.262511 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:04.5 ifName:} {vfDeviceID:0000:18:07.1 ifName:} {vfDeviceID:0000:18:06.0 ifName:}] +I1012 12:12:41.324387 1 sriov.go:118] Configured interfaces for container edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb; hostIface: {Name:ens785f0v29 Mac:a2:1b:21:b8:59:ea Sandbox:}, containerIface: {Name:eth4 Mac:a2:1b:21:b8:59:ea Sandbox:/host/proc/3283572/ns/net} +I1012 12:12:41.324446 1 controller.go:444] "INTEL - networklist ITERATED" +2022-10-12T12:12:40Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T12:12:40Z [debug] Beginning IPAM for ContainerID: 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed +2022-10-12T12:12:40Z [debug] Started leader election +I1012 12:12:40.333157 4199 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +E1012 12:12:40.348292 4199 leaderelection.go:367] Failed to update lock: Operation cannot be fulfilled on leases.coordination.k8s.io "whereabouts": the object has been modified; please apply your changes to the latest version and try again +E1012 12:12:41.223926 4199 leaderelection.go:367] Failed to update lock: Operation cannot be fulfilled on leases.coordination.k8s.io "whereabouts": the object has been modified; please apply your changes to the latest version and try again +I1012 12:12:42.305395 4199 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:12:42Z [debug] OnStartedLeading() called +2022-10-12T12:12:42Z [debug] Elected as leader, do processing +2022-10-12T12:12:42Z [debug] IPManagement -- mode: 0 / containerID: 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed / podRef: kube-system/testpodsec1 +2022-10-12T12:12:42Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T12:12:42Z [debug] Reserving IP: |148.14.24.3 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed| +2022-10-12T12:12:42Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.3 +2022-10-12T12:12:42Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.3 GenerateName: Namespace:kube-system SelfLink: UID:13605e6d-6204-4e02-9617-3fe64c1e5eb8 ResourceVersion:10081 Generation:1 CreationTimestamp:2022-10-12 12:12:42 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:12:42 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed PodRef:kube-system/testpodsec1}} +2022-10-12T12:12:42Z [debug] OnStoppedLeading() called +2022-10-12T12:12:42Z [debug] Finished leader election +2022-10-12T12:12:42Z [debug] IPManagement: {148.14.24.3 ffffff00}, +I1012 12:12:42.346815 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:01.0 ifName:} {vfDeviceID:0000:18:07.5 ifName:} {vfDeviceID:0000:18:04.6 ifName:}] +I1012 12:12:42.412184 1 sriov.go:118] Configured interfaces for container 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed; hostIface: {Name:ens785f0v0 Mac:92:70:ea:e7:0e:fd Sandbox:}, containerIface: {Name:eth1 Mac:92:70:ea:e7:0e:fd Sandbox:/host/proc/3283583/ns/net} +I1012 12:12:42.412265 1 controller.go:444] "INTEL - networklist ITERATED" +I1012 12:12:42.412306 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net2 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:12:42.416914 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:7d1f7d37-57cd-475e-a117-5f4c8b473f0e ResourceVersion:9962 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > Pod="kube-system/testpodsec1" +I1012 12:12:42.417034 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:7d1f7d37-57cd-475e-a117-5f4c8b473f0e ResourceVersion:9962 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > +I1012 12:12:42.417134 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.25.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net2\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:12:42.417178 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:12:42.417199 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T12:12:42Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T12:12:42Z [debug] Beginning IPAM for ContainerID: 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed +2022-10-12T12:12:42Z [debug] Started leader election +I1012 12:12:42.486865 4312 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:12:42.498445 4312 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:12:42Z [debug] OnStartedLeading() called +2022-10-12T12:12:42Z [debug] Elected as leader, do processing +2022-10-12T12:12:42Z [debug] IPManagement -- mode: 0 / containerID: 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed / podRef: kube-system/testpodsec1 +2022-10-12T12:12:42Z [debug] IterateForAssignment input >> ip: 148.14.25.0 | ipnet: {148.14.25.0 ffffff00} | first IP: 148.14.25.1 | last IP: 148.14.25.254 +2022-10-12T12:12:42Z [debug] Reserving IP: |148.14.25.2 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed| +2022-10-12T12:12:42Z [debug] OverlappingRangewide allocation check for IP: 148.14.25.2 +2022-10-12T12:12:42Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.2 GenerateName: Namespace:kube-system SelfLink: UID:ba9faf8f-8961-4e54-8ded-e505aefd9684 ResourceVersion:10086 Generation:1 CreationTimestamp:2022-10-12 12:12:42 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:12:42 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed PodRef:kube-system/testpodsec1}} +2022-10-12T12:12:42Z [debug] OnStoppedLeading() called +2022-10-12T12:12:42Z [debug] Finished leader election +2022-10-12T12:12:42Z [debug] IPManagement: {148.14.25.2 ffffff00}, +I1012 12:12:42.532961 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:01.0 ifName:eth1} {vfDeviceID:0000:18:07.5 ifName:} {vfDeviceID:0000:18:04.6 ifName:}] +I1012 12:12:42.600356 1 sriov.go:118] Configured interfaces for container 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed; hostIface: {Name:ens785f0v53 Mac:5a:3e:03:40:80:80 Sandbox:}, containerIface: {Name:eth2 Mac:5a:3e:03:40:80:80 Sandbox:/host/proc/3283583/ns/net} +I1012 12:12:42.600419 1 controller.go:444] "INTEL - networklist ITERATED" +I1012 12:12:49.697542 1 server.go:539] Received CmdDel request cni_args:{container_id:"ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50" netns:"/proc/3277699/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec1;K8S_POD_INFRA_CONTAINER_ID=ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:12:49.703907 1 server.go:563] Deleted IP addresses for container ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50 +I1012 12:12:49.705773 1 pod_configuration.go:537] Removed interfaces for container ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50 +I1012 12:12:49.779443 1 server.go:569] CmdDel for container ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50 succeeded +I1012 12:12:49.785841 1 server.go:539] Received CmdDel request cni_args:{container_id:"1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8" netns:"/proc/3277680/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec2;K8S_POD_INFRA_CONTAINER_ID=1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:12:49.791949 1 server.go:563] Deleted IP addresses for container 1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8 +I1012 12:12:49.793440 1 pod_configuration.go:537] Removed interfaces for container 1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8 +I1012 12:12:49.895470 1 server.go:569] CmdDel for container 1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8 succeeded +I1012 12:12:49.947053 1 server.go:539] Received CmdDel request cni_args:{container_id:"4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c" netns:"/proc/3277670/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec3;K8S_POD_INFRA_CONTAINER_ID=4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:12:49.952943 1 server.go:563] Deleted IP addresses for container 4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c +I1012 12:12:49.954466 1 pod_configuration.go:537] Removed interfaces for container 4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c +I1012 12:12:50.008323 1 server.go:569] CmdDel for container 4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c succeeded +I1012 12:13:47.528637 1 controller.go:269] "Secondary network already configured on this Pod and annotation update not supported, skipping update" pod="kube-system/testpodsec2" +I1012 12:13:47.528692 1 controller.go:269] "Secondary network already configured on this Pod and annotation update not supported, skipping update" pod="kube-system/testpodsec1" +I1012 12:13:48.578776 1 controller.go:269] "Secondary network already configured on this Pod and annotation update not supported, skipping update" pod="kube-system/testpodsec3" +I1012 12:16:06.334734 1 controller.go:269] "Secondary network already configured on this Pod and annotation update not supported, skipping update" pod="kube-system/testpodsec1" +I1012 12:16:06.458094 1 controller.go:269] "Secondary network already configured on this Pod and annotation update not supported, skipping update" pod="kube-system/testpodsec2" +2022-10-12T12:16:06Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T12:16:06Z [debug] Beginning delete for ContainerID: 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed +2022-10-12T12:16:06Z [debug] Started leader election +I1012 12:16:06.431951 4574 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:16:06.449050 4574 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:16:06Z [debug] OnStartedLeading() called +2022-10-12T12:16:06Z [debug] Elected as leader, do processing +2022-10-12T12:16:06Z [debug] IPManagement -- mode: 1 / containerID: 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed / podRef: kube-system/testpodsec1 +2022-10-12T12:16:06Z [debug] Deallocating given previously used IP: 148.14.24.3 +2022-10-12T12:16:06Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.3 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:16:06Z [debug] OnStoppedLeading() called +2022-10-12T12:16:06Z [debug] Finished leader election +2022-10-12T12:16:06Z [debug] IPManagement: { }, +2022-10-12T12:16:06Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T12:16:06Z [debug] Beginning delete for ContainerID: e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da +2022-10-12T12:16:06Z [debug] Started leader election +I1012 12:16:06.531536 4601 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:16:06.540026 4601 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:16:06Z [debug] OnStartedLeading() called +2022-10-12T12:16:06Z [debug] Elected as leader, do processing +2022-10-12T12:16:06Z [debug] IPManagement -- mode: 1 / containerID: e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da / podRef: kube-system/testpodsec2 +2022-10-12T12:16:06Z [debug] Deallocating given previously used IP: 148.14.24.1 +2022-10-12T12:16:06Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.1 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:16:06Z [debug] OnStoppedLeading() called +2022-10-12T12:16:06Z [debug] Finished leader election +2022-10-12T12:16:06Z [debug] IPManagement: { }, +I1012 12:16:06.577753 1 controller.go:269] "Secondary network already configured on this Pod and annotation update not supported, skipping update" pod="kube-system/testpodsec3" +2022-10-12T12:16:06Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T12:16:06Z [debug] Beginning delete for ContainerID: e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da +2022-10-12T12:16:06Z [debug] Started leader election +I1012 12:16:06.647111 4658 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:16:06.656126 4658 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:16:06Z [debug] OnStartedLeading() called +2022-10-12T12:16:06Z [debug] Elected as leader, do processing +2022-10-12T12:16:06Z [debug] IPManagement -- mode: 1 / containerID: e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da / podRef: kube-system/testpodsec2 +2022-10-12T12:16:06Z [debug] Deallocating given previously used IP: 148.14.25.1 +2022-10-12T12:16:06Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.1 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:16:06Z [debug] OnStoppedLeading() called +2022-10-12T12:16:06Z [debug] Finished leader election +2022-10-12T12:16:06Z [debug] IPManagement: { }, +I1012 12:16:06.685128 1 controller.go:154] "Pod VF Cache cleared" pod="kube-system/testpodsec2" +2022-10-12T12:16:06Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T12:16:06Z [debug] Beginning delete for ContainerID: 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed +2022-10-12T12:16:06Z [debug] Started leader election +I1012 12:16:06.555659 4609 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:16:07.440189 4609 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:16:07Z [debug] OnStartedLeading() called +2022-10-12T12:16:07Z [debug] Elected as leader, do processing +2022-10-12T12:16:07Z [debug] IPManagement -- mode: 1 / containerID: 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed / podRef: kube-system/testpodsec1 +2022-10-12T12:16:07Z [debug] Deallocating given previously used IP: 148.14.25.2 +2022-10-12T12:16:07Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.2 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:16:07Z [debug] OnStoppedLeading() called +2022-10-12T12:16:07Z [debug] Finished leader election +2022-10-12T12:16:07Z [debug] IPManagement: { }, +I1012 12:16:07.473221 1 controller.go:154] "Pod VF Cache cleared" pod="kube-system/testpodsec1" +2022-10-12T12:16:06Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec3 PodNamespace:kube-system} +2022-10-12T12:16:06Z [debug] Beginning delete for ContainerID: edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb +2022-10-12T12:16:06Z [debug] Started leader election +I1012 12:16:06.658922 4659 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:16:07.533851 4659 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:16:07Z [debug] OnStartedLeading() called +2022-10-12T12:16:07Z [debug] Elected as leader, do processing +2022-10-12T12:16:07Z [debug] IPManagement -- mode: 1 / containerID: edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb / podRef: kube-system/testpodsec3 +2022-10-12T12:16:07Z [debug] Deallocating given previously used IP: 148.14.24.2 +2022-10-12T12:16:07Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.2 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:16:07Z [debug] OnStoppedLeading() called +2022-10-12T12:16:07Z [debug] Finished leader election +2022-10-12T12:16:07Z [debug] IPManagement: { }, +I1012 12:16:07.566213 1 controller.go:154] "Pod VF Cache cleared" pod="kube-system/testpodsec3" +I1012 12:16:36.518583 1 server.go:539] Received CmdDel request cni_args:{container_id:"62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed" netns:"/proc/3283583/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec1;K8S_POD_INFRA_CONTAINER_ID=62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:16:36.524608 1 server.go:563] Deleted IP addresses for container 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed +I1012 12:16:36.526384 1 pod_configuration.go:537] Removed interfaces for container 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed +I1012 12:16:36.595934 1 server.go:539] Received CmdDel request cni_args:{container_id:"e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da" netns:"/proc/3283590/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec2;K8S_POD_INFRA_CONTAINER_ID=e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:16:36.601784 1 server.go:563] Deleted IP addresses for container e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da +I1012 12:16:36.603311 1 pod_configuration.go:537] Removed interfaces for container e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da +I1012 12:16:36.695385 1 server.go:569] CmdDel for container e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da succeeded +I1012 12:16:36.728038 1 server.go:539] Received CmdDel request cni_args:{container_id:"edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb" netns:"/proc/3283572/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec3;K8S_POD_INFRA_CONTAINER_ID=edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:16:36.734040 1 server.go:563] Deleted IP addresses for container edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb +I1012 12:16:36.735597 1 pod_configuration.go:537] Removed interfaces for container edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb +I1012 12:16:36.831381 1 server.go:569] CmdDel for container edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb succeeded +I1012 12:16:36.855297 1 server.go:569] CmdDel for container 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed succeeded diff --git a/b.logs b/b.logs new file mode 100644 index 00000000000..244dbcaccde --- /dev/null +++ b/b.logs @@ -0,0 +1,299 @@ +I1011 15:02:52.405158 1 log_file.go:93] Set log file max size to 104857600 +I1011 15:02:52.406994 1 agent.go:96] Starting Antrea agent (version v1.9.0-dev-0dceb752.dirty) +I1011 15:02:52.407056 1 client.go:87] No kubeconfig file was specified. Falling back to in-cluster config +I1011 15:02:52.408286 1 prometheus.go:171] Initializing prometheus metrics +I1011 15:02:52.408596 1 ovs_client.go:70] Connecting to OVSDB at address /var/run/openvswitch/db.sock +I1011 15:02:53.409042 1 ovs_client.go:89] Not connected yet, will try again in 2s +I1011 15:02:53.409636 1 agent.go:361] Setting up node network +I1011 15:02:53.434560 1 agent.go:950] "Setting Node MTU" MTU=1450 +I1011 15:02:53.435311 1 ovs_client.go:113] Bridge exists: 0f59126c-82e4-45cf-bac0-0696844bdb40 +I1011 15:02:53.453101 1 agent.go:1091] Using round number 20 +I1011 15:02:53.453493 1 ofctrl.go:172] Initialize connection or re-connect to /var/run/openvswitch/br-int.mgmt. +I1011 15:02:53.539516 1 route_linux.go:163] Initialized iptables +I1011 15:02:54.454414 1 ofctrl.go:187] Connected to socket /var/run/openvswitch/br-int.mgmt +I1011 15:02:54.454885 1 ofctrl.go:249] New connection.. +I1011 15:02:54.454945 1 ofctrl.go:257] Sent hello with OF version: 6 +I1011 15:02:54.455069 1 ofctrl.go:269] Received Openflow 1.5 Hello message +I1011 15:02:54.456000 1 ofctrl.go:289] Received ofp1.5 Switch feature response: {Header:{Version:6 Type:6 Length:32 Xid:3} DPID:00:00:6e:12:59:0f:cf:45 Buffers:0 NumTables:254 AuxilaryId:0 pad:[0 0] Capabilities:591 Reserved:0} +I1011 15:02:54.456074 1 ofSwitch.go:85] Openflow Connection for new switch: 00:00:6e:12:59:0f:cf:45 +I1011 15:02:54.456645 1 ofctrl_bridge.go:325] OFSwitch is connected: 00:00:6e:12:59:0f:cf:45 +I1011 15:02:54.583125 1 agent.go:452] Agent initialized NodeConfig=NodeName: vcesd2, OVSBridge: br-int, PodIPv4CIDR: 172.25.0.0/24, PodIPv6CIDR: , NodeIPv4: 172.25.55.29/24, NodeIPv6: , TransportIPv4: 172.25.55.29/24, TransportIPv6: , Gateway: Name antrea-gw0: IPv4 172.25.0.1, IPv6 , MAC 62:3d:8d:a2:1b:bf, NetworkConfig=&{encap geneve 0 None {psk } [] true false} +I1011 15:02:54.583516 1 metrics.go:138] Registering Antrea Proxy prometheus metrics +I1011 15:02:54.590448 1 fqdn.go:186] "Using kube-dns Service for DNS requests" dnsServer="10.96.0.10:53" +I1011 15:02:54.590582 1 audit_logging.go:177] "Initialized Antrea-native Policy Logger for audit logging" logFile="/var/log/antrea/networkpolicy/np.log" +I1011 15:02:54.595402 1 server.go:743] Reconciliation for CNI server +I1011 15:02:54.626937 1 pod_configuration.go:537] Removed interfaces for container 58bc82c73081c06d98a69ec494b29fc99caa3b9d590c8959683f440ec426a819 +I1011 15:02:54.964003 1 pod_configuration.go:537] Removed interfaces for container 15a58fc5d70fee1e8365bc5b6221d097d0f409b7ae3e0c0b99fd6d0c75b760f6 +I1011 15:02:55.020137 1 pod_configuration.go:537] Removed interfaces for container 6c3526e78076b001863823c4050f34109a523fc0d3b4072f0bfbf86af1a066e5 +I1011 15:02:55.084076 1 agent.go:609] Cleaning up flow-restore-wait config +I1011 15:02:55.084857 1 agent.go:622] Cleaned up flow-restore-wait config +I1011 15:02:55.084874 1 client.go:105] No antrea kubeconfig file was specified. Falling back to in-cluster config +I1011 15:02:55.084884 1 client.go:108] Didn't get CA certificate, skip updating Antrea Client +I1011 15:02:55.084939 1 client.go:87] No kubeconfig file was specified. Falling back to in-cluster config +I1011 15:02:55.085029 1 channel.go:83] "Starting SubscribableChannel" name="PodUpdate" +I1011 15:02:55.085090 1 log_file.go:121] Starting log file monitoring. Maximum log file number is 4 +I1011 15:02:55.085151 1 node_route_controller.go:362] Starting AntreaAgentNodeRouteController +I1011 15:02:55.085206 1 shared_informer.go:255] Waiting for caches to sync for AntreaAgentNodeRouteController +I1011 15:02:55.085238 1 server.go:677] Starting CNI server +I1011 15:02:55.085271 1 route_linux.go:197] Starting iptables sync, with sync interval 1m0s +I1011 15:02:55.085382 1 configmap_cafile_content.go:202] "Starting controller" name="antrea-ca::kube-system::antrea-ca::ca.crt" +I1011 15:02:55.085433 1 shared_informer.go:255] Waiting for caches to sync for antrea-ca::kube-system::antrea-ca::ca.crt +I1011 15:02:55.085472 1 server.go:687] CNI server is listening ... +I1011 15:02:55.085487 1 controller.go:443] "Starting " controller="SecondaryNetworkController" +I1011 15:02:55.085531 1 shared_informer.go:255] Waiting for caches to sync for SecondaryNetworkController +I1011 15:02:55.085573 1 egress_controller.go:307] Starting AntreaAgentEgressController +I1011 15:02:55.085593 1 shared_informer.go:255] Waiting for caches to sync for AntreaAgentEgressController +I1011 15:02:55.085635 1 networkpolicy_controller.go:447] Waiting for Antrea client to be ready +I1011 15:02:55.085642 1 controller.go:168] Starting ExternalIPPoolController +I1011 15:02:55.085651 1 shared_informer.go:255] Waiting for caches to sync for ExternalIPPoolController +I1011 15:02:55.085653 1 log_file.go:182] Deleted log file antrea-agent.vcesd2.root.log.INFO.20221011-135255.1 +I1011 15:02:55.085665 1 config.go:132] Starting endpoints config controller +I1011 15:02:55.085693 1 cluster.go:323] "Starting" controllerName="MemberListCluster" +I1011 15:02:55.085710 1 shared_informer.go:255] Waiting for caches to sync for MemberListCluster +I1011 15:02:55.085706 1 collector.go:86] Start collecting metrics +I1011 15:02:55.085700 1 shared_informer.go:255] Waiting for caches to sync for endpoints config +I1011 15:02:55.085879 1 traceflow_controller.go:170] Starting AntreaAgentTraceflowController +I1011 15:02:55.085923 1 config.go:223] Starting service config controller +I1011 15:02:55.085938 1 shared_informer.go:255] Waiting for caches to sync for service config +I1011 15:02:55.085937 1 shared_informer.go:255] Waiting for caches to sync for AntreaAgentTraceflowController +I1011 15:02:55.085748 1 local_ip_detector_linux.go:59] Starting localIPDetector +I1011 15:02:55.086187 1 agent.go:49] Starting Antrea Agent Monitor +I1011 15:02:55.185424 1 shared_informer.go:262] Caches are synced for AntreaAgentNodeRouteController +I1011 15:02:55.185460 1 node_route_controller.go:315] Reconciliation for AntreaAgentNodeRouteController +I1011 15:02:55.185548 1 shared_informer.go:262] Caches are synced for antrea-ca::kube-system::antrea-ca::ca.crt +I1011 15:02:55.185700 1 shared_informer.go:262] Caches are synced for AntreaAgentEgressController +I1011 15:02:55.185774 1 shared_informer.go:262] Caches are synced for SecondaryNetworkController +I1011 15:02:55.185872 1 controller.go:248] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-apiserver-vcesd2" +I1011 15:02:55.185927 1 controller.go:248] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/coredns-64897985d-2m558" +I1011 15:02:55.185925 1 shared_informer.go:262] Caches are synced for MemberListCluster +I1011 15:02:55.185945 1 controller.go:248] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-proxy-cstz7" +I1011 15:02:55.185967 1 controller.go:248] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/coredns-64897985d-gsc8n" +I1011 15:02:55.186020 1 controller.go:248] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/antrea-controller-59cbc8f559-k5q76" +I1011 15:02:55.186024 1 controller.go:248] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/etcd-vcesd2" +I1011 15:02:55.186059 1 controller.go:248] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-controller-manager-vcesd2" +I1011 15:02:55.186113 1 controller.go:248] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-sriov-device-plugin-amd64-k4ng7" +I1011 15:02:55.186122 1 shared_informer.go:262] Caches are synced for endpoints config +I1011 15:02:55.186130 1 shared_informer.go:262] Caches are synced for service config +I1011 15:02:55.186066 1 controller.go:248] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/antrea-agent-5t42p" +I1011 15:02:55.185735 1 shared_informer.go:262] Caches are synced for ExternalIPPoolController +I1011 15:02:55.186205 1 shared_informer.go:262] Caches are synced for AntreaAgentTraceflowController +I1011 15:02:55.186078 1 controller.go:248] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-scheduler-vcesd2" +I1011 15:02:55.186080 1 client.go:105] No antrea kubeconfig file was specified. Falling back to in-cluster config +I1011 15:02:55.186163 1 egress_controller.go:766] Starting watch for EgressGroup +W1011 15:02:55.186299 1 egress_controller.go:769] Failed to get antrea client: Antrea client is not ready +I1011 15:02:55.186705 1 client.go:130] Updating Antrea client with the new CA bundle +I1011 15:02:55.188450 1 cluster.go:461] "Processed Node event" eventType=Join nodeName="vcesd2" affectedExternalIPPoolNum=0 +I1011 15:02:55.286339 1 networkpolicy_controller.go:458] Antrea client is ready +I1011 15:02:55.286404 1 networkpolicy_controller.go:473] Waiting for all watchers to complete full sync +I1011 15:02:55.286483 1 networkpolicy_controller.go:711] Starting watch for AddressGroup +I1011 15:02:55.286475 1 networkpolicy_controller.go:711] Starting watch for AppliedToGroup +I1011 15:02:55.286542 1 networkpolicy_controller.go:711] Starting watch for NetworkPolicy +I1011 15:02:55.518784 1 serving.go:348] Generated self-signed cert in-memory +I1011 15:02:56.007541 1 requestheader_controller.go:169] Starting RequestHeaderAuthRequestController +I1011 15:02:56.007551 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" +I1011 15:02:56.007580 1 shared_informer.go:255] Waiting for caches to sync for RequestHeaderAuthRequestController +I1011 15:02:56.007582 1 shared_informer.go:255] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file +I1011 15:02:56.007568 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" +I1011 15:02:56.007613 1 shared_informer.go:255] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file +I1011 15:02:56.008673 1 secure_serving.go:210] Serving securely on [::]:10350 +I1011 15:02:56.008781 1 tlsconfig.go:240] "Starting DynamicServingCertificateController" +I1011 15:02:56.107904 1 shared_informer.go:262] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file +I1011 15:02:56.108009 1 shared_informer.go:262] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file +I1011 15:02:56.108083 1 shared_informer.go:262] Caches are synced for RequestHeaderAuthRequestController +W1011 15:02:56.307510 1 networkpolicy_controller.go:714] Failed to start watch for AppliedToGroup: Get "https://10.103.63.52:443/apis/controlplane.antrea.io/v1beta2/appliedtogroups?fieldSelector=nodeName%3Dvcesd2&watch=true": dial tcp 10.103.63.52:443: connect: connection refused +W1011 15:02:56.307559 1 networkpolicy_controller.go:714] Failed to start watch for NetworkPolicy: Get "https://10.103.63.52:443/apis/controlplane.antrea.io/v1beta2/networkpolicies?fieldSelector=nodeName%3Dvcesd2&watch=true": dial tcp 10.103.63.52:443: connect: connection refused +W1011 15:02:56.307558 1 networkpolicy_controller.go:714] Failed to start watch for AddressGroup: Get "https://10.103.63.52:443/apis/controlplane.antrea.io/v1beta2/addressgroups?fieldSelector=nodeName%3Dvcesd2&watch=true": dial tcp 10.103.63.52:443: connect: connection refused +I1011 15:02:59.133946 1 server.go:539] Received CmdDel request cni_args:{container_id:"58bc82c73081c06d98a69ec494b29fc99caa3b9d590c8959683f440ec426a819" netns:"/proc/2065234/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec1;K8S_POD_INFRA_CONTAINER_ID=58bc82c73081c06d98a69ec494b29fc99caa3b9d590c8959683f440ec426a819" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1011 15:02:59.140907 1 server.go:563] Deleted IP addresses for container 58bc82c73081c06d98a69ec494b29fc99caa3b9d590c8959683f440ec426a819 +I1011 15:02:59.140946 1 server.go:569] CmdDel for container 58bc82c73081c06d98a69ec494b29fc99caa3b9d590c8959683f440ec426a819 succeeded +I1011 15:02:59.205789 1 server.go:539] Received CmdDel request cni_args:{container_id:"6c3526e78076b001863823c4050f34109a523fc0d3b4072f0bfbf86af1a066e5" netns:"/proc/2065215/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec2;K8S_POD_INFRA_CONTAINER_ID=6c3526e78076b001863823c4050f34109a523fc0d3b4072f0bfbf86af1a066e5" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1011 15:02:59.211922 1 server.go:563] Deleted IP addresses for container 6c3526e78076b001863823c4050f34109a523fc0d3b4072f0bfbf86af1a066e5 +I1011 15:02:59.211960 1 server.go:569] CmdDel for container 6c3526e78076b001863823c4050f34109a523fc0d3b4072f0bfbf86af1a066e5 succeeded +I1011 15:02:59.317207 1 server.go:539] Received CmdDel request cni_args:{container_id:"15a58fc5d70fee1e8365bc5b6221d097d0f409b7ae3e0c0b99fd6d0c75b760f6" netns:"/proc/2065207/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec3;K8S_POD_INFRA_CONTAINER_ID=15a58fc5d70fee1e8365bc5b6221d097d0f409b7ae3e0c0b99fd6d0c75b760f6" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1011 15:02:59.323068 1 server.go:563] Deleted IP addresses for container 15a58fc5d70fee1e8365bc5b6221d097d0f409b7ae3e0c0b99fd6d0c75b760f6 +I1011 15:02:59.323109 1 server.go:569] CmdDel for container 15a58fc5d70fee1e8365bc5b6221d097d0f409b7ae3e0c0b99fd6d0c75b760f6 succeeded +I1011 15:02:59.554435 1 controller.go:248] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/antrea-controller-59cbc8f559-k5q76" +I1011 15:03:00.186860 1 egress_controller.go:766] Starting watch for EgressGroup +I1011 15:03:00.207782 1 egress_controller.go:787] Started watch for EgressGroup +I1011 15:03:00.208021 1 egress_controller.go:815] Received 0 init events for EgressGroup +I1011 15:03:00.287233 1 networkpolicy_controller.go:711] Starting watch for AppliedToGroup +I1011 15:03:00.287332 1 networkpolicy_controller.go:711] Starting watch for AddressGroup +I1011 15:03:00.287422 1 networkpolicy_controller.go:711] Starting watch for NetworkPolicy +I1011 15:03:00.292134 1 networkpolicy_controller.go:724] Started watch for AppliedToGroup +I1011 15:03:00.292315 1 networkpolicy_controller.go:724] Started watch for NetworkPolicy +I1011 15:03:00.292377 1 networkpolicy_controller.go:724] Started watch for AddressGroup +I1011 15:03:00.292410 1 networkpolicy_controller.go:754] Received 0 init events for NetworkPolicy +I1011 15:03:00.292427 1 networkpolicy_controller.go:754] Received 0 init events for AppliedToGroup +I1011 15:03:00.292608 1 networkpolicy_controller.go:754] Received 0 init events for AddressGroup +I1011 15:03:00.292641 1 networkpolicy_controller.go:475] All watchers have completed full sync, installing flows for init events +I1011 15:03:00.293681 1 networkpolicy_controller.go:479] Starting NetworkPolicy workers now +I1011 15:03:00.293715 1 networkpolicy_controller.go:485] Starting IDAllocator worker to maintain the async rule cache +I1011 15:03:00.293745 1 status_controller.go:209] Starting NetworkPolicy StatusController +I1011 15:03:04.584455 1 agent.go:527] Deleting stale flows from previous round if any +I1011 15:03:04.584516 1 agent.go:459] Persisting round number 20 to OVSDB +I1011 15:03:04.585635 1 agent.go:464] Round number 20 was persisted to OVSDB +I1011 15:03:09.560337 1 controller.go:248] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/antrea-agent-5t42p" +I1011 15:03:32.960738 1 server.go:425] Received CmdAdd request cni_args:{container_id:"157efdbd85ff83c4f88ee1c7e35f4f71f85dfd25166608b3773927bf422806ae" netns:"/proc/2136126/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec3;K8S_POD_INFRA_CONTAINER_ID=157efdbd85ff83c4f88ee1c7e35f4f71f85dfd25166608b3773927bf422806ae" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1011 15:03:32.961493 1 server.go:425] Received CmdAdd request cni_args:{container_id:"5134e8304e4ecc7348f6b7e221cd5eab85d67a1889452aa83caedb5369d957b7" netns:"/proc/2136152/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec1;K8S_POD_INFRA_CONTAINER_ID=5134e8304e4ecc7348f6b7e221cd5eab85d67a1889452aa83caedb5369d957b7" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1011 15:03:32.967715 1 server.go:495] "Allocated IP addresses" container="157efdbd85ff83c4f88ee1c7e35f4f71f85dfd25166608b3773927bf422806ae" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.63 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1011 15:03:32.967752 1 server.go:495] "Allocated IP addresses" container="5134e8304e4ecc7348f6b7e221cd5eab85d67a1889452aa83caedb5369d957b7" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.64 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1011 15:03:32.980635 1 server.go:425] Received CmdAdd request cni_args:{container_id:"508624b9aec7c0b353bd451906a98e4db24e9af0f855a6710d8c58a1a5fc36d6" netns:"/proc/2136137/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec2;K8S_POD_INFRA_CONTAINER_ID=508624b9aec7c0b353bd451906a98e4db24e9af0f855a6710d8c58a1a5fc36d6" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1011 15:03:32.986759 1 server.go:495] "Allocated IP addresses" container="508624b9aec7c0b353bd451906a98e4db24e9af0f855a6710d8c58a1a5fc36d6" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.65 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1011 15:03:33.147390 1 pod_configuration.go:265] Configured interfaces for container 508624b9aec7c0b353bd451906a98e4db24e9af0f855a6710d8c58a1a5fc36d6 +I1011 15:03:33.147445 1 server.go:522] CmdAdd for container 508624b9aec7c0b353bd451906a98e4db24e9af0f855a6710d8c58a1a5fc36d6 succeeded +I1011 15:03:33.147468 1 pod_configuration.go:265] Configured interfaces for container 5134e8304e4ecc7348f6b7e221cd5eab85d67a1889452aa83caedb5369d957b7 +I1011 15:03:33.147514 1 server.go:522] CmdAdd for container 5134e8304e4ecc7348f6b7e221cd5eab85d67a1889452aa83caedb5369d957b7 succeeded +I1011 15:03:33.147647 1 pod_configuration.go:265] Configured interfaces for container 157efdbd85ff83c4f88ee1c7e35f4f71f85dfd25166608b3773927bf422806ae +I1011 15:03:33.147695 1 server.go:522] CmdAdd for container 157efdbd85ff83c4f88ee1c7e35f4f71f85dfd25166608b3773927bf422806ae succeeded +I1011 15:03:34.024638 1 controller.go:395] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1011 15:03:34.052141 1 controller.go:397] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:a30314d2-6a37-4b52-b1de-2f57af14c31c ResourceVersion:21443 Generation:1 CreationTimestamp:2022-10-10 08:19:55 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-10 08:19:55 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec2" +I1011 15:03:34.052223 1 controller.go:403] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:a30314d2-6a37-4b52-b1de-2f57af14c31c ResourceVersion:21443 Generation:1 CreationTimestamp:2022-10-10 08:19:55 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-10 08:19:55 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1011 15:03:34.052286 1 controller.go:409] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1011 15:03:34.052373 1 controller.go:420] "INTEL - networkConfig.Type IS ANTREA" +I1011 15:03:34.052391 1 controller.go:426] "INTEL - networkConfig.NetworkType IS SRIOV" +I1011 15:03:34.053584 1 controller.go:395] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1011 15:03:34.056657 1 controller.go:397] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:a30314d2-6a37-4b52-b1de-2f57af14c31c ResourceVersion:21443 Generation:1 CreationTimestamp:2022-10-10 08:19:55 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-10 08:19:55 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec1" +I1011 15:03:34.056737 1 controller.go:403] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:a30314d2-6a37-4b52-b1de-2f57af14c31c ResourceVersion:21443 Generation:1 CreationTimestamp:2022-10-10 08:19:55 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-10 08:19:55 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1011 15:03:34.056818 1 controller.go:409] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1011 15:03:34.056855 1 controller.go:420] "INTEL - networkConfig.Type IS ANTREA" +I1011 15:03:34.056870 1 controller.go:426] "INTEL - networkConfig.NetworkType IS SRIOV" +I1011 15:03:34.062311 1 controller.go:395] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1011 15:03:34.065857 1 controller.go:397] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:a30314d2-6a37-4b52-b1de-2f57af14c31c ResourceVersion:21443 Generation:1 CreationTimestamp:2022-10-10 08:19:55 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-10 08:19:55 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec3" +I1011 15:03:34.065955 1 controller.go:403] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:a30314d2-6a37-4b52-b1de-2f57af14c31c ResourceVersion:21443 Generation:1 CreationTimestamp:2022-10-10 08:19:55 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-10 08:19:55 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1011 15:03:34.066046 1 controller.go:409] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1011 15:03:34.066093 1 controller.go:420] "INTEL - networkConfig.Type IS ANTREA" +I1011 15:03:34.066113 1 controller.go:426] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-11T15:03:34Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-11T15:03:34Z [debug] Beginning IPAM for ContainerID: 5134e8304e4ecc7348f6b7e221cd5eab85d67a1889452aa83caedb5369d957b7 +2022-10-11T15:03:34Z [debug] Started leader election +I1011 15:03:34.135585 177 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1011 15:03:34.150657 177 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-11T15:03:34Z [debug] OnStartedLeading() called +2022-10-11T15:03:34Z [debug] Elected as leader, do processing +2022-10-11T15:03:34Z [debug] IPManagement -- mode: 0 / containerID: 5134e8304e4ecc7348f6b7e221cd5eab85d67a1889452aa83caedb5369d957b7 / podRef: kube-system/testpodsec1 +2022-10-11T15:03:34Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-11T15:03:34Z [debug] Reserving IP: |148.14.24.8 5134e8304e4ecc7348f6b7e221cd5eab85d67a1889452aa83caedb5369d957b7| +2022-10-11T15:03:34Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.8 +2022-10-11T15:03:34Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.8 GenerateName: Namespace:kube-system SelfLink: UID:8a7652e0-2697-4374-b4de-cf73dd8a8e65 ResourceVersion:179021 Generation:1 CreationTimestamp:2022-10-11 15:03:34 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-11 15:03:34 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:5134e8304e4ecc7348f6b7e221cd5eab85d67a1889452aa83caedb5369d957b7 PodRef:kube-system/testpodsec1}} +2022-10-11T15:03:34Z [debug] OnStoppedLeading() called +2022-10-11T15:03:34Z [debug] Finished leader election +2022-10-11T15:03:34Z [debug] IPManagement: {148.14.24.8 ffffff00}, +I1011 15:03:34.192626 1 controller.go:156] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:04.0 ifName:} {vfDeviceID:0000:18:02.5 ifName:} {vfDeviceID:0000:18:03.4 ifName:}] +I1011 15:03:34.272344 1 sriov.go:118] Configured interfaces for container 5134e8304e4ecc7348f6b7e221cd5eab85d67a1889452aa83caedb5369d957b7; hostIface: {Name:dev159 Mac:22:f1:dd:5a:59:62 Sandbox:}, containerIface: {Name:eth1 Mac:22:f1:dd:5a:59:62 Sandbox:/host/proc/2136152/ns/net} +I1011 15:03:34.272420 1 controller.go:433] "INTEL - networklist ITERATED" +I1011 15:03:34.272464 1 controller.go:395] "Secondary Network attached to Pod" network=&{Name:virtual-net2 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1011 15:03:34.277280 1 controller.go:397] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:89ae225e-c198-432e-800c-d3e8e78abb9a ResourceVersion:21444 Generation:1 CreationTimestamp:2022-10-10 08:19:55 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-10 08:19:55 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > Pod="kube-system/testpodsec1" +I1011 15:03:34.277397 1 controller.go:403] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:89ae225e-c198-432e-800c-d3e8e78abb9a ResourceVersion:21444 Generation:1 CreationTimestamp:2022-10-10 08:19:55 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-10 08:19:55 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > +I1011 15:03:34.277507 1 controller.go:409] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.25.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net2\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1011 15:03:34.277561 1 controller.go:420] "INTEL - networkConfig.Type IS ANTREA" +I1011 15:03:34.277583 1 controller.go:426] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-11T15:03:34Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-11T15:03:34Z [debug] Beginning IPAM for ContainerID: 5134e8304e4ecc7348f6b7e221cd5eab85d67a1889452aa83caedb5369d957b7 +2022-10-11T15:03:34Z [debug] Started leader election +I1011 15:03:34.350992 259 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1011 15:03:34.361310 259 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-11T15:03:34Z [debug] OnStartedLeading() called +2022-10-11T15:03:34Z [debug] Elected as leader, do processing +2022-10-11T15:03:34Z [debug] IPManagement -- mode: 0 / containerID: 5134e8304e4ecc7348f6b7e221cd5eab85d67a1889452aa83caedb5369d957b7 / podRef: kube-system/testpodsec1 +2022-10-11T15:03:34Z [debug] IterateForAssignment input >> ip: 148.14.25.0 | ipnet: {148.14.25.0 ffffff00} | first IP: 148.14.25.1 | last IP: 148.14.25.254 +2022-10-11T15:03:34Z [debug] Reserving IP: |148.14.25.3 5134e8304e4ecc7348f6b7e221cd5eab85d67a1889452aa83caedb5369d957b7| +2022-10-11T15:03:34Z [debug] OverlappingRangewide allocation check for IP: 148.14.25.3 +2022-10-11T15:03:34Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.3 GenerateName: Namespace:kube-system SelfLink: UID:86cd90e7-701a-49b2-b2d8-991557ed8ba3 ResourceVersion:179026 Generation:1 CreationTimestamp:2022-10-11 15:03:34 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-11 15:03:34 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:5134e8304e4ecc7348f6b7e221cd5eab85d67a1889452aa83caedb5369d957b7 PodRef:kube-system/testpodsec1}} +2022-10-11T15:03:34Z [debug] OnStoppedLeading() called +2022-10-11T15:03:34Z [debug] Finished leader election +2022-10-11T15:03:34Z [debug] IPManagement: {148.14.25.3 ffffff00}, +I1011 15:03:34.398002 1 controller.go:156] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:04.0 ifName:eth1} {vfDeviceID:0000:18:02.5 ifName:} {vfDeviceID:0000:18:03.4 ifName:}] +I1011 15:03:34.472302 1 sriov.go:118] Configured interfaces for container 5134e8304e4ecc7348f6b7e221cd5eab85d67a1889452aa83caedb5369d957b7; hostIface: {Name:ens785f0v13 Mac:4e:a5:da:b0:de:72 Sandbox:}, containerIface: {Name:eth2 Mac:4e:a5:da:b0:de:72 Sandbox:/host/proc/2136152/ns/net} +I1011 15:03:34.472376 1 controller.go:433] "INTEL - networklist ITERATED" +2022-10-11T15:03:34Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec3 PodNamespace:kube-system} +2022-10-11T15:03:34Z [debug] Beginning IPAM for ContainerID: 157efdbd85ff83c4f88ee1c7e35f4f71f85dfd25166608b3773927bf422806ae +2022-10-11T15:03:34Z [debug] Started leader election +I1011 15:03:34.148565 182 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1011 15:03:35.024949 182 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-11T15:03:35Z [debug] OnStartedLeading() called +2022-10-11T15:03:35Z [debug] Elected as leader, do processing +2022-10-11T15:03:35Z [debug] IPManagement -- mode: 0 / containerID: 157efdbd85ff83c4f88ee1c7e35f4f71f85dfd25166608b3773927bf422806ae / podRef: kube-system/testpodsec3 +2022-10-11T15:03:35Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-11T15:03:35Z [debug] Reserving IP: |148.14.24.9 157efdbd85ff83c4f88ee1c7e35f4f71f85dfd25166608b3773927bf422806ae| +2022-10-11T15:03:35Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.9 +2022-10-11T15:03:35Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.9 GenerateName: Namespace:kube-system SelfLink: UID:b439d5e3-d98f-4170-8a1c-9c37442f2f9f ResourceVersion:179035 Generation:1 CreationTimestamp:2022-10-11 15:03:35 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-11 15:03:35 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:157efdbd85ff83c4f88ee1c7e35f4f71f85dfd25166608b3773927bf422806ae PodRef:kube-system/testpodsec3}} +2022-10-11T15:03:35Z [debug] OnStoppedLeading() called +2022-10-11T15:03:35Z [debug] Finished leader election +2022-10-11T15:03:35Z [debug] IPManagement: {148.14.24.9 ffffff00}, +I1011 15:03:35.069900 1 controller.go:156] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:01.7 ifName:} {vfDeviceID:0000:18:03.3 ifName:} {vfDeviceID:0000:18:01.4 ifName:}] +I1011 15:03:35.160128 1 sriov.go:118] Configured interfaces for container 157efdbd85ff83c4f88ee1c7e35f4f71f85dfd25166608b3773927bf422806ae; hostIface: {Name:dev143 Mac:ee:8d:c1:69:93:6c Sandbox:}, containerIface: {Name:eth4 Mac:ee:8d:c1:69:93:6c Sandbox:/host/proc/2136126/ns/net} +I1011 15:03:35.160190 1 controller.go:433] "INTEL - networklist ITERATED" +2022-10-11T15:03:34Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-11T15:03:34Z [debug] Beginning IPAM for ContainerID: 508624b9aec7c0b353bd451906a98e4db24e9af0f855a6710d8c58a1a5fc36d6 +2022-10-11T15:03:34Z [debug] Started leader election +I1011 15:03:34.135087 172 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +E1011 15:03:34.151985 172 leaderelection.go:367] Failed to update lock: Operation cannot be fulfilled on leases.coordination.k8s.io "whereabouts": the object has been modified; please apply your changes to the latest version and try again +E1011 15:03:35.025782 172 leaderelection.go:367] Failed to update lock: Operation cannot be fulfilled on leases.coordination.k8s.io "whereabouts": the object has been modified; please apply your changes to the latest version and try again +I1011 15:03:36.109341 172 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-11T15:03:36Z [debug] OnStartedLeading() called +2022-10-11T15:03:36Z [debug] Elected as leader, do processing +2022-10-11T15:03:36Z [debug] IPManagement -- mode: 0 / containerID: 508624b9aec7c0b353bd451906a98e4db24e9af0f855a6710d8c58a1a5fc36d6 / podRef: kube-system/testpodsec2 +2022-10-11T15:03:36Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-11T15:03:36Z [debug] Reserving IP: |148.14.24.10 508624b9aec7c0b353bd451906a98e4db24e9af0f855a6710d8c58a1a5fc36d6| +2022-10-11T15:03:36Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.10 +2022-10-11T15:03:36Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.10 GenerateName: Namespace:kube-system SelfLink: UID:4828a1bd-495f-4821-813e-25f86d6d190b ResourceVersion:179040 Generation:1 CreationTimestamp:2022-10-11 15:03:36 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-11 15:03:36 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:508624b9aec7c0b353bd451906a98e4db24e9af0f855a6710d8c58a1a5fc36d6 PodRef:kube-system/testpodsec2}} +2022-10-11T15:03:36Z [debug] OnStoppedLeading() called +2022-10-11T15:03:36Z [debug] Finished leader election +2022-10-11T15:03:36Z [debug] IPManagement: {148.14.24.10 ffffff00}, +I1011 15:03:36.156705 1 controller.go:156] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:05.0 ifName:} {vfDeviceID:0000:18:01.1 ifName:} {vfDeviceID:0000:18:03.1 ifName:}] +I1011 15:03:36.224214 1 sriov.go:118] Configured interfaces for container 508624b9aec7c0b353bd451906a98e4db24e9af0f855a6710d8c58a1a5fc36d6; hostIface: {Name:dev153 Mac:b6:e6:63:65:a4:41 Sandbox:}, containerIface: {Name:eth2 Mac:b6:e6:63:65:a4:41 Sandbox:/host/proc/2136137/ns/net} +I1011 15:03:36.224275 1 controller.go:433] "INTEL - networklist ITERATED" +I1011 15:03:36.224314 1 controller.go:395] "Secondary Network attached to Pod" network=&{Name:virtual-net2 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth3 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1011 15:03:36.228904 1 controller.go:397] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:89ae225e-c198-432e-800c-d3e8e78abb9a ResourceVersion:21444 Generation:1 CreationTimestamp:2022-10-10 08:19:55 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-10 08:19:55 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > Pod="kube-system/testpodsec2" +I1011 15:03:36.229006 1 controller.go:403] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:89ae225e-c198-432e-800c-d3e8e78abb9a ResourceVersion:21444 Generation:1 CreationTimestamp:2022-10-10 08:19:55 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-10 08:19:55 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > +I1011 15:03:36.229109 1 controller.go:409] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.25.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net2\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1011 15:03:36.229158 1 controller.go:420] "INTEL - networkConfig.Type IS ANTREA" +I1011 15:03:36.229183 1 controller.go:426] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-11T15:03:36Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-11T15:03:36Z [debug] Beginning IPAM for ContainerID: 508624b9aec7c0b353bd451906a98e4db24e9af0f855a6710d8c58a1a5fc36d6 +2022-10-11T15:03:36Z [debug] Started leader election +I1011 15:03:36.301155 286 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1011 15:03:36.311468 286 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-11T15:03:36Z [debug] OnStartedLeading() called +2022-10-11T15:03:36Z [debug] Elected as leader, do processing +2022-10-11T15:03:36Z [debug] IPManagement -- mode: 0 / containerID: 508624b9aec7c0b353bd451906a98e4db24e9af0f855a6710d8c58a1a5fc36d6 / podRef: kube-system/testpodsec2 +2022-10-11T15:03:36Z [debug] IterateForAssignment input >> ip: 148.14.25.0 | ipnet: {148.14.25.0 ffffff00} | first IP: 148.14.25.1 | last IP: 148.14.25.254 +2022-10-11T15:03:36Z [debug] Reserving IP: |148.14.25.4 508624b9aec7c0b353bd451906a98e4db24e9af0f855a6710d8c58a1a5fc36d6| +2022-10-11T15:03:36Z [debug] OverlappingRangewide allocation check for IP: 148.14.25.4 +2022-10-11T15:03:36Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.4 GenerateName: Namespace:kube-system SelfLink: UID:331a52fe-b05d-4379-8555-3b215e18d923 ResourceVersion:179045 Generation:1 CreationTimestamp:2022-10-11 15:03:36 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-11 15:03:36 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:508624b9aec7c0b353bd451906a98e4db24e9af0f855a6710d8c58a1a5fc36d6 PodRef:kube-system/testpodsec2}} +2022-10-11T15:03:36Z [debug] OnStoppedLeading() called +2022-10-11T15:03:36Z [debug] Finished leader election +2022-10-11T15:03:36Z [debug] IPManagement: {148.14.25.4 ffffff00}, +I1011 15:03:36.347389 1 controller.go:156] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:05.0 ifName:eth2} {vfDeviceID:0000:18:01.1 ifName:} {vfDeviceID:0000:18:03.1 ifName:}] +I1011 15:03:36.428449 1 sriov.go:118] Configured interfaces for container 508624b9aec7c0b353bd451906a98e4db24e9af0f855a6710d8c58a1a5fc36d6; hostIface: {Name:eth1 Mac:96:1e:f2:b0:b0:da Sandbox:}, containerIface: {Name:eth3 Mac:96:1e:f2:b0:b0:da Sandbox:/host/proc/2136137/ns/net} +I1011 15:03:36.428514 1 controller.go:433] "INTEL - networklist ITERATED" diff --git a/c.log b/c.log new file mode 100644 index 00000000000..c8a6c0a136b --- /dev/null +++ b/c.log @@ -0,0 +1,444 @@ +I1012 09:42:43.143738 1 log_file.go:93] Set log file max size to 104857600 +I1012 09:42:43.144782 1 agent.go:96] Starting Antrea agent (version v1.9.0-dev-0dceb752.dirty) +I1012 09:42:43.144802 1 client.go:87] No kubeconfig file was specified. Falling back to in-cluster config +I1012 09:42:43.145261 1 prometheus.go:171] Initializing prometheus metrics +I1012 09:42:43.145367 1 ovs_client.go:70] Connecting to OVSDB at address /var/run/openvswitch/db.sock +I1012 09:42:44.145885 1 ovs_client.go:89] Not connected yet, will try again in 2s +I1012 09:42:44.146361 1 agent.go:361] Setting up node network +I1012 09:42:44.167619 1 agent.go:950] "Setting Node MTU" MTU=1450 +I1012 09:42:44.168357 1 ovs_client.go:113] Bridge exists: 0f59126c-82e4-45cf-bac0-0696844bdb40 +I1012 09:42:44.186295 1 agent.go:1091] Using round number 27 +I1012 09:42:44.189926 1 ofctrl.go:172] Initialize connection or re-connect to /var/run/openvswitch/br-int.mgmt. +I1012 09:42:44.274524 1 route_linux.go:163] Initialized iptables +I1012 09:42:45.190345 1 ofctrl.go:187] Connected to socket /var/run/openvswitch/br-int.mgmt +I1012 09:42:45.190758 1 ofctrl.go:249] New connection.. +I1012 09:42:45.190814 1 ofctrl.go:257] Sent hello with OF version: 6 +I1012 09:42:45.190881 1 ofctrl.go:269] Received Openflow 1.5 Hello message +I1012 09:42:45.191662 1 ofctrl.go:289] Received ofp1.5 Switch feature response: {Header:{Version:6 Type:6 Length:32 Xid:3} DPID:00:00:6e:12:59:0f:cf:45 Buffers:0 NumTables:254 AuxilaryId:0 pad:[0 0] Capabilities:591 Reserved:0} +I1012 09:42:45.191764 1 ofSwitch.go:85] Openflow Connection for new switch: 00:00:6e:12:59:0f:cf:45 +I1012 09:42:45.192213 1 ofctrl_bridge.go:325] OFSwitch is connected: 00:00:6e:12:59:0f:cf:45 +I1012 09:42:45.318934 1 agent.go:452] Agent initialized NodeConfig=NodeName: vcesd2, OVSBridge: br-int, PodIPv4CIDR: 172.25.0.0/24, PodIPv6CIDR: , NodeIPv4: 172.25.55.29/24, NodeIPv6: , TransportIPv4: 172.25.55.29/24, TransportIPv6: , Gateway: Name antrea-gw0: IPv4 172.25.0.1, IPv6 , MAC 62:3d:8d:a2:1b:bf, NetworkConfig=&{encap geneve 0 None {psk } [] true false} +I1012 09:42:45.319366 1 metrics.go:138] Registering Antrea Proxy prometheus metrics +I1012 09:42:45.326509 1 fqdn.go:186] "Using kube-dns Service for DNS requests" dnsServer="10.96.0.10:53" +I1012 09:42:45.326676 1 audit_logging.go:177] "Initialized Antrea-native Policy Logger for audit logging" logFile="/var/log/antrea/networkpolicy/np.log" +I1012 09:42:45.330912 1 server.go:743] Reconciliation for CNI server +I1012 09:42:45.348140 1 pod_configuration.go:537] Removed interfaces for container 1514552322b1b13e651e28ddbc85619a0dcd6afc1bd33bd0e56a9e13c3c6bcc6 +I1012 09:42:45.348867 1 pod_configuration.go:537] Removed interfaces for container efd9e45b81bc6f712d25251a548762d13a49f3c3ef35e4f69362e85e4fa14ef4 +I1012 09:42:45.417244 1 pod_configuration.go:537] Removed interfaces for container 380f71b05a9c4bf8bf24698b6d52bbb4f324ddf81d9dacf12dc2c21c5a2b4389 +I1012 09:42:45.480925 1 agent.go:609] Cleaning up flow-restore-wait config +I1012 09:42:45.481544 1 agent.go:622] Cleaned up flow-restore-wait config +I1012 09:42:45.481562 1 client.go:105] No antrea kubeconfig file was specified. Falling back to in-cluster config +I1012 09:42:45.481571 1 client.go:108] Didn't get CA certificate, skip updating Antrea Client +I1012 09:42:45.481623 1 client.go:87] No kubeconfig file was specified. Falling back to in-cluster config +I1012 09:42:45.481653 1 route_linux.go:197] Starting iptables sync, with sync interval 1m0s +I1012 09:42:45.481667 1 log_file.go:121] Starting log file monitoring. Maximum log file number is 4 +I1012 09:42:45.481792 1 server.go:677] Starting CNI server +I1012 09:42:45.481905 1 node_route_controller.go:362] Starting AntreaAgentNodeRouteController +I1012 09:42:45.481954 1 shared_informer.go:255] Waiting for caches to sync for AntreaAgentNodeRouteController +I1012 09:42:45.482026 1 server.go:687] CNI server is listening ... +I1012 09:42:45.482025 1 channel.go:83] "Starting SubscribableChannel" name="PodUpdate" +I1012 09:42:45.482089 1 configmap_cafile_content.go:202] "Starting controller" name="antrea-ca::kube-system::antrea-ca::ca.crt" +I1012 09:42:45.482107 1 shared_informer.go:255] Waiting for caches to sync for antrea-ca::kube-system::antrea-ca::ca.crt +I1012 09:42:45.482180 1 networkpolicy_controller.go:447] Waiting for Antrea client to be ready +I1012 09:42:45.482273 1 controller.go:454] "Starting " controller="SecondaryNetworkController" +I1012 09:42:45.482346 1 shared_informer.go:255] Waiting for caches to sync for SecondaryNetworkController +I1012 09:42:45.482360 1 egress_controller.go:307] Starting AntreaAgentEgressController +I1012 09:42:45.482383 1 shared_informer.go:255] Waiting for caches to sync for AntreaAgentEgressController +I1012 09:42:45.482295 1 log_file.go:182] Deleted log file antrea-agent.vcesd2.root.log.INFO.20221011-205524.1 +I1012 09:42:45.482486 1 local_ip_detector_linux.go:59] Starting localIPDetector +I1012 09:42:45.482526 1 controller.go:168] Starting ExternalIPPoolController +I1012 09:42:45.482531 1 traceflow_controller.go:170] Starting AntreaAgentTraceflowController +I1012 09:42:45.482539 1 shared_informer.go:255] Waiting for caches to sync for ExternalIPPoolController +I1012 09:42:45.482545 1 shared_informer.go:255] Waiting for caches to sync for AntreaAgentTraceflowController +I1012 09:42:45.482619 1 cluster.go:323] "Starting" controllerName="MemberListCluster" +I1012 09:42:45.482638 1 shared_informer.go:255] Waiting for caches to sync for MemberListCluster +I1012 09:42:45.482510 1 config.go:132] Starting endpoints config controller +I1012 09:42:45.482673 1 shared_informer.go:255] Waiting for caches to sync for endpoints config +I1012 09:42:45.482623 1 config.go:223] Starting service config controller +I1012 09:42:45.482698 1 shared_informer.go:255] Waiting for caches to sync for service config +I1012 09:42:45.482752 1 collector.go:86] Start collecting metrics +I1012 09:42:45.482876 1 agent.go:49] Starting Antrea Agent Monitor +I1012 09:42:45.582574 1 shared_informer.go:262] Caches are synced for AntreaAgentEgressController +I1012 09:42:45.582669 1 shared_informer.go:262] Caches are synced for ExternalIPPoolController +I1012 09:42:45.582725 1 shared_informer.go:262] Caches are synced for AntreaAgentNodeRouteController +I1012 09:42:45.582743 1 node_route_controller.go:315] Reconciliation for AntreaAgentNodeRouteController +I1012 09:42:45.582751 1 shared_informer.go:262] Caches are synced for service config +I1012 09:42:45.582797 1 shared_informer.go:262] Caches are synced for SecondaryNetworkController +I1012 09:42:45.582819 1 shared_informer.go:262] Caches are synced for endpoints config +I1012 09:42:45.582871 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-proxy-cstz7" +I1012 09:42:45.582907 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/coredns-64897985d-2m558" +I1012 09:42:45.582931 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/coredns-64897985d-gsc8n" +I1012 09:42:45.582951 1 egress_controller.go:766] Starting watch for EgressGroup +I1012 09:42:45.582972 1 shared_informer.go:262] Caches are synced for AntreaAgentTraceflowController +I1012 09:42:45.582973 1 shared_informer.go:262] Caches are synced for MemberListCluster +I1012 09:42:45.583034 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-apiserver-vcesd2" +I1012 09:42:45.583062 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-controller-manager-vcesd2" +I1012 09:42:45.583090 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-scheduler-vcesd2" +I1012 09:42:45.583095 1 shared_informer.go:262] Caches are synced for antrea-ca::kube-system::antrea-ca::ca.crt +I1012 09:42:45.583110 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-sriov-device-plugin-amd64-k4ng7" +I1012 09:42:45.583163 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/etcd-vcesd2" +I1012 09:42:45.583187 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/antrea-controller-59cbc8f559-hrrmv" +W1012 09:42:45.582982 1 egress_controller.go:769] Failed to get antrea client: Antrea client is not ready +I1012 09:42:45.582957 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/antrea-agent-94c8s" +I1012 09:42:45.583423 1 client.go:105] No antrea kubeconfig file was specified. Falling back to in-cluster config +I1012 09:42:45.583864 1 client.go:130] Updating Antrea client with the new CA bundle +I1012 09:42:45.583988 1 cluster.go:461] "Processed Node event" eventType=Join nodeName="vcesd2" affectedExternalIPPoolNum=0 +I1012 09:42:45.683206 1 networkpolicy_controller.go:458] Antrea client is ready +I1012 09:42:45.683248 1 networkpolicy_controller.go:473] Waiting for all watchers to complete full sync +I1012 09:42:45.683303 1 networkpolicy_controller.go:711] Starting watch for NetworkPolicy +I1012 09:42:45.683396 1 networkpolicy_controller.go:711] Starting watch for AddressGroup +I1012 09:42:45.683416 1 networkpolicy_controller.go:711] Starting watch for AppliedToGroup +I1012 09:42:45.718307 1 serving.go:348] Generated self-signed cert in-memory +I1012 09:42:46.049529 1 requestheader_controller.go:169] Starting RequestHeaderAuthRequestController +I1012 09:42:46.049565 1 shared_informer.go:255] Waiting for caches to sync for RequestHeaderAuthRequestController +I1012 09:42:46.049580 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" +I1012 09:42:46.049606 1 shared_informer.go:255] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file +I1012 09:42:46.049620 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" +I1012 09:42:46.049633 1 shared_informer.go:255] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file +I1012 09:42:46.050032 1 secure_serving.go:210] Serving securely on [::]:10350 +I1012 09:42:46.050158 1 tlsconfig.go:240] "Starting DynamicServingCertificateController" +I1012 09:42:46.150286 1 shared_informer.go:262] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file +I1012 09:42:46.150390 1 shared_informer.go:262] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file +I1012 09:42:46.150438 1 shared_informer.go:262] Caches are synced for RequestHeaderAuthRequestController +W1012 09:42:46.707551 1 networkpolicy_controller.go:714] Failed to start watch for NetworkPolicy: Get "https://10.107.225.42:443/apis/controlplane.antrea.io/v1beta2/networkpolicies?fieldSelector=nodeName%3Dvcesd2&watch=true": dial tcp 10.107.225.42:443: connect: connection refused +W1012 09:42:46.707573 1 networkpolicy_controller.go:714] Failed to start watch for AppliedToGroup: Get "https://10.107.225.42:443/apis/controlplane.antrea.io/v1beta2/appliedtogroups?fieldSelector=nodeName%3Dvcesd2&watch=true": dial tcp 10.107.225.42:443: connect: connection refused +W1012 09:42:46.707611 1 networkpolicy_controller.go:714] Failed to start watch for AddressGroup: Get "https://10.107.225.42:443/apis/controlplane.antrea.io/v1beta2/addressgroups?fieldSelector=nodeName%3Dvcesd2&watch=true": dial tcp 10.107.225.42:443: connect: connection refused +I1012 09:42:50.584065 1 egress_controller.go:766] Starting watch for EgressGroup +I1012 09:42:50.684233 1 networkpolicy_controller.go:711] Starting watch for AddressGroup +I1012 09:42:50.684328 1 networkpolicy_controller.go:711] Starting watch for AppliedToGroup +I1012 09:42:50.684428 1 networkpolicy_controller.go:711] Starting watch for NetworkPolicy +I1012 09:42:51.051677 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/antrea-controller-59cbc8f559-hrrmv" +I1012 09:42:51.624177 1 networkpolicy_controller.go:724] Started watch for AddressGroup +I1012 09:42:51.624520 1 networkpolicy_controller.go:724] Started watch for AppliedToGroup +I1012 09:42:51.624538 1 networkpolicy_controller.go:754] Received 0 init events for AddressGroup +I1012 09:42:51.624556 1 networkpolicy_controller.go:724] Started watch for NetworkPolicy +I1012 09:42:51.624617 1 networkpolicy_controller.go:754] Received 0 init events for NetworkPolicy +I1012 09:42:51.624635 1 networkpolicy_controller.go:754] Received 0 init events for AppliedToGroup +I1012 09:42:51.624660 1 networkpolicy_controller.go:475] All watchers have completed full sync, installing flows for init events +I1012 09:42:51.624633 1 egress_controller.go:787] Started watch for EgressGroup +I1012 09:42:51.624766 1 egress_controller.go:815] Received 0 init events for EgressGroup +I1012 09:42:51.625636 1 networkpolicy_controller.go:479] Starting NetworkPolicy workers now +I1012 09:42:51.625683 1 networkpolicy_controller.go:485] Starting IDAllocator worker to maintain the async rule cache +I1012 09:42:51.625719 1 status_controller.go:209] Starting NetworkPolicy StatusController +I1012 09:42:54.425204 1 server.go:539] Received CmdDel request cni_args:{container_id:"380f71b05a9c4bf8bf24698b6d52bbb4f324ddf81d9dacf12dc2c21c5a2b4389" netns:"/proc/2895883/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec2;K8S_POD_INFRA_CONTAINER_ID=380f71b05a9c4bf8bf24698b6d52bbb4f324ddf81d9dacf12dc2c21c5a2b4389" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 09:42:54.432079 1 server.go:563] Deleted IP addresses for container 380f71b05a9c4bf8bf24698b6d52bbb4f324ddf81d9dacf12dc2c21c5a2b4389 +I1012 09:42:54.432126 1 server.go:569] CmdDel for container 380f71b05a9c4bf8bf24698b6d52bbb4f324ddf81d9dacf12dc2c21c5a2b4389 succeeded +I1012 09:42:54.528865 1 server.go:539] Received CmdDel request cni_args:{container_id:"efd9e45b81bc6f712d25251a548762d13a49f3c3ef35e4f69362e85e4fa14ef4" netns:"/proc/2895904/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec3;K8S_POD_INFRA_CONTAINER_ID=efd9e45b81bc6f712d25251a548762d13a49f3c3ef35e4f69362e85e4fa14ef4" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 09:42:54.535191 1 server.go:563] Deleted IP addresses for container efd9e45b81bc6f712d25251a548762d13a49f3c3ef35e4f69362e85e4fa14ef4 +I1012 09:42:54.535232 1 server.go:569] CmdDel for container efd9e45b81bc6f712d25251a548762d13a49f3c3ef35e4f69362e85e4fa14ef4 succeeded +I1012 09:42:55.319718 1 agent.go:527] Deleting stale flows from previous round if any +I1012 09:42:55.319770 1 agent.go:459] Persisting round number 27 to OVSDB +I1012 09:42:55.320910 1 agent.go:464] Round number 27 was persisted to OVSDB +I1012 09:43:01.053116 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/antrea-agent-94c8s" +I1012 09:43:40.911000 1 server.go:425] Received CmdAdd request cni_args:{container_id:"b0ac66acb34ca0a4c2618cd08fd558c09ef7590757c2ae7101d2023f57fedf6a" netns:"/proc/3091202/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec3;K8S_POD_INFRA_CONTAINER_ID=b0ac66acb34ca0a4c2618cd08fd558c09ef7590757c2ae7101d2023f57fedf6a" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 09:43:40.917176 1 server.go:495] "Allocated IP addresses" container="b0ac66acb34ca0a4c2618cd08fd558c09ef7590757c2ae7101d2023f57fedf6a" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.81 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 09:43:40.978292 1 server.go:425] Received CmdAdd request cni_args:{container_id:"e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf" netns:"/proc/3091219/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec1;K8S_POD_INFRA_CONTAINER_ID=e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 09:43:40.978784 1 server.go:425] Received CmdAdd request cni_args:{container_id:"07f924563e115d2f5f66cd0ddaa8fb7d8da27e67063e377767e4e21df00a462e" netns:"/proc/3091212/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec2;K8S_POD_INFRA_CONTAINER_ID=07f924563e115d2f5f66cd0ddaa8fb7d8da27e67063e377767e4e21df00a462e" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 09:43:40.984761 1 server.go:495] "Allocated IP addresses" container="e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.82 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 09:43:40.985239 1 server.go:495] "Allocated IP addresses" container="07f924563e115d2f5f66cd0ddaa8fb7d8da27e67063e377767e4e21df00a462e" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.83 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 09:43:41.067217 1 pod_configuration.go:265] Configured interfaces for container b0ac66acb34ca0a4c2618cd08fd558c09ef7590757c2ae7101d2023f57fedf6a +I1012 09:43:41.067253 1 server.go:522] CmdAdd for container b0ac66acb34ca0a4c2618cd08fd558c09ef7590757c2ae7101d2023f57fedf6a succeeded +I1012 09:43:41.093521 1 pod_configuration.go:265] Configured interfaces for container 07f924563e115d2f5f66cd0ddaa8fb7d8da27e67063e377767e4e21df00a462e +I1012 09:43:41.093555 1 server.go:522] CmdAdd for container 07f924563e115d2f5f66cd0ddaa8fb7d8da27e67063e377767e4e21df00a462e succeeded +I1012 09:43:41.093667 1 pod_configuration.go:265] Configured interfaces for container e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf +I1012 09:43:41.093710 1 server.go:522] CmdAdd for container e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf succeeded +I1012 09:43:41.982151 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 09:43:41.990043 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:2b27e92c-7933-47e5-a435-51dc044175f7 ResourceVersion:265536 Generation:1 CreationTimestamp:2022-10-12 08:31:37 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 08:31:37 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec3" +I1012 09:43:41.990146 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:2b27e92c-7933-47e5-a435-51dc044175f7 ResourceVersion:265536 Generation:1 CreationTimestamp:2022-10-12 08:31:37 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 08:31:37 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 09:43:41.990233 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 09:43:41.990369 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 09:43:41.990390 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +I1012 09:43:41.992756 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 09:43:41.996648 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:2b27e92c-7933-47e5-a435-51dc044175f7 ResourceVersion:265536 Generation:1 CreationTimestamp:2022-10-12 08:31:37 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 08:31:37 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec2" +I1012 09:43:41.996742 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:2b27e92c-7933-47e5-a435-51dc044175f7 ResourceVersion:265536 Generation:1 CreationTimestamp:2022-10-12 08:31:37 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 08:31:37 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 09:43:41.996835 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 09:43:41.996884 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 09:43:41.996904 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +I1012 09:43:42.005960 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 09:43:42.009953 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:2b27e92c-7933-47e5-a435-51dc044175f7 ResourceVersion:265536 Generation:1 CreationTimestamp:2022-10-12 08:31:37 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 08:31:37 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec1" +I1012 09:43:42.010055 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:2b27e92c-7933-47e5-a435-51dc044175f7 ResourceVersion:265536 Generation:1 CreationTimestamp:2022-10-12 08:31:37 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 08:31:37 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 09:43:42.010147 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 09:43:42.010198 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 09:43:42.010220 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T09:43:42Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec3 PodNamespace:kube-system} +2022-10-12T09:43:42Z [debug] Beginning IPAM for ContainerID: b0ac66acb34ca0a4c2618cd08fd558c09ef7590757c2ae7101d2023f57fedf6a +2022-10-12T09:43:42Z [debug] Started leader election +I1012 09:43:42.062686 176 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 09:43:42.078286 176 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T09:43:42Z [debug] OnStartedLeading() called +2022-10-12T09:43:42Z [debug] Elected as leader, do processing +2022-10-12T09:43:42Z [debug] IPManagement -- mode: 0 / containerID: b0ac66acb34ca0a4c2618cd08fd558c09ef7590757c2ae7101d2023f57fedf6a / podRef: kube-system/testpodsec3 +2022-10-12T09:43:42Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T09:43:42Z [debug] Reserving IP: |148.14.24.3 b0ac66acb34ca0a4c2618cd08fd558c09ef7590757c2ae7101d2023f57fedf6a| +2022-10-12T09:43:42Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.3 +2022-10-12T09:43:42Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.3 GenerateName: Namespace:kube-system SelfLink: UID:b88d74c4-09c7-4117-96e4-c50fe0c67b10 ResourceVersion:272598 Generation:1 CreationTimestamp:2022-10-12 09:43:42 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 09:43:42 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:b0ac66acb34ca0a4c2618cd08fd558c09ef7590757c2ae7101d2023f57fedf6a PodRef:kube-system/testpodsec3}} +2022-10-12T09:43:42Z [debug] OnStoppedLeading() called +2022-10-12T09:43:42Z [debug] Finished leader election +2022-10-12T09:43:42Z [debug] IPManagement: {148.14.24.3 ffffff00}, +I1012 09:43:42.120744 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:02.1 ifName:} {vfDeviceID:0000:18:02.5 ifName:} {vfDeviceID:0000:18:05.5 ifName:}] +I1012 09:43:42.149356 1 sriov.go:118] Configured interfaces for container b0ac66acb34ca0a4c2618cd08fd558c09ef7590757c2ae7101d2023f57fedf6a; hostIface: {Name:eth4 Mac:f2:1f:ce:96:03:6a Sandbox:}, containerIface: {Name:eth4 Mac:f2:1f:ce:96:03:6a Sandbox:/host/proc/3091202/ns/net} +I1012 09:43:42.149444 1 controller.go:444] "INTEL - networklist ITERATED" +2022-10-12T09:43:42Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T09:43:42Z [debug] Beginning IPAM for ContainerID: 07f924563e115d2f5f66cd0ddaa8fb7d8da27e67063e377767e4e21df00a462e +2022-10-12T09:43:42Z [debug] Started leader election +I1012 09:43:42.076731 181 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 09:43:42.953736 181 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T09:43:42Z [debug] OnStartedLeading() called +2022-10-12T09:43:42Z [debug] Elected as leader, do processing +2022-10-12T09:43:42Z [debug] IPManagement -- mode: 0 / containerID: 07f924563e115d2f5f66cd0ddaa8fb7d8da27e67063e377767e4e21df00a462e / podRef: kube-system/testpodsec2 +2022-10-12T09:43:42Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T09:43:42Z [debug] Reserving IP: |148.14.24.4 07f924563e115d2f5f66cd0ddaa8fb7d8da27e67063e377767e4e21df00a462e| +2022-10-12T09:43:42Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.4 +2022-10-12T09:43:42Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.4 GenerateName: Namespace:kube-system SelfLink: UID:4b27adf2-0a0d-4c01-b800-40ef821e11ae ResourceVersion:272605 Generation:1 CreationTimestamp:2022-10-12 09:43:42 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 09:43:42 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:07f924563e115d2f5f66cd0ddaa8fb7d8da27e67063e377767e4e21df00a462e PodRef:kube-system/testpodsec2}} +2022-10-12T09:43:42Z [debug] OnStoppedLeading() called +2022-10-12T09:43:42Z [debug] Finished leader election +2022-10-12T09:43:42Z [debug] IPManagement: {148.14.24.4 ffffff00}, +I1012 09:43:42.993069 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:05.0 ifName:} {vfDeviceID:0000:18:02.6 ifName:} {vfDeviceID:0000:18:05.1 ifName:}] +2022-10-12T09:43:43Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T09:43:43Z [debug] Beginning delete for ContainerID: 07f924563e115d2f5f66cd0ddaa8fb7d8da27e67063e377767e4e21df00a462e +2022-10-12T09:43:43Z [debug] Started leader election +I1012 09:43:43.066362 263 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 09:43:43.075587 263 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T09:43:43Z [debug] OnStartedLeading() called +2022-10-12T09:43:43Z [debug] Elected as leader, do processing +2022-10-12T09:43:43Z [debug] IPManagement -- mode: 1 / containerID: 07f924563e115d2f5f66cd0ddaa8fb7d8da27e67063e377767e4e21df00a462e / podRef: kube-system/testpodsec2 +2022-10-12T09:43:43Z [debug] Deallocating given previously used IP: 148.14.24.4 +2022-10-12T09:43:43Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.4 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T09:43:43Z [debug] OnStoppedLeading() called +2022-10-12T09:43:43Z [debug] Finished leader election +2022-10-12T09:43:43Z [debug] IPManagement: { }, +I1012 09:43:43.105619 1 controller.go:440] "INTEL - secondary interface configuration FAILED!!!!!!!!!!!!!!!!!" err="SRIOV Interface creation failed: failed to get VF information: lstat /sys/bus/pci/devices/0000:18:05.0/physfn/net: no such file or directory" +2022-10-12T09:43:42Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T09:43:42Z [debug] Beginning IPAM for ContainerID: e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf +2022-10-12T09:43:42Z [debug] Started leader election +I1012 09:43:42.089964 189 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 09:43:44.040794 189 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T09:43:44Z [debug] OnStartedLeading() called +2022-10-12T09:43:44Z [debug] Elected as leader, do processing +2022-10-12T09:43:44Z [debug] IPManagement -- mode: 0 / containerID: e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf / podRef: kube-system/testpodsec1 +2022-10-12T09:43:44Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T09:43:44Z [debug] Reserving IP: |148.14.24.4 e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf| +2022-10-12T09:43:44Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.4 +2022-10-12T09:43:44Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.4 GenerateName: Namespace:kube-system SelfLink: UID:f988c2e5-babb-4991-98c1-a84a0e2cf175 ResourceVersion:272616 Generation:1 CreationTimestamp:2022-10-12 09:43:44 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 09:43:44 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf PodRef:kube-system/testpodsec1}} +2022-10-12T09:43:44Z [debug] OnStoppedLeading() called +2022-10-12T09:43:44Z [debug] Finished leader election +2022-10-12T09:43:44Z [debug] IPManagement: {148.14.24.4 ffffff00}, +I1012 09:43:44.078473 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:05.4 ifName:} {vfDeviceID:0000:18:04.3 ifName:} {vfDeviceID:0000:18:01.7 ifName:}] +2022-10-12T09:43:44Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T09:43:44Z [debug] Beginning delete for ContainerID: e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf +2022-10-12T09:43:44Z [debug] Started leader election +I1012 09:43:44.148764 287 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 09:43:44.158181 287 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T09:43:44Z [debug] OnStartedLeading() called +2022-10-12T09:43:44Z [debug] Elected as leader, do processing +2022-10-12T09:43:44Z [debug] IPManagement -- mode: 1 / containerID: e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf / podRef: kube-system/testpodsec1 +2022-10-12T09:43:44Z [debug] Deallocating given previously used IP: 148.14.24.4 +2022-10-12T09:43:44Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.4 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T09:43:44Z [debug] OnStoppedLeading() called +2022-10-12T09:43:44Z [debug] Finished leader election +2022-10-12T09:43:44Z [debug] IPManagement: { }, +I1012 09:43:44.186187 1 controller.go:440] "INTEL - secondary interface configuration FAILED!!!!!!!!!!!!!!!!!" err="SRIOV Interface creation failed: failed to get VF information: lstat /sys/bus/pci/devices/0000:18:05.4/physfn/net: no such file or directory" +I1012 09:43:45.106373 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 09:43:45.116024 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:2b27e92c-7933-47e5-a435-51dc044175f7 ResourceVersion:265536 Generation:1 CreationTimestamp:2022-10-12 08:31:37 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 08:31:37 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec2" +I1012 09:43:45.116110 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:2b27e92c-7933-47e5-a435-51dc044175f7 ResourceVersion:265536 Generation:1 CreationTimestamp:2022-10-12 08:31:37 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 08:31:37 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 09:43:45.116208 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 09:43:45.116259 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 09:43:45.116279 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T09:43:45Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T09:43:45Z [debug] Beginning IPAM for ContainerID: 07f924563e115d2f5f66cd0ddaa8fb7d8da27e67063e377767e4e21df00a462e +2022-10-12T09:43:45Z [debug] Started leader election +I1012 09:43:45.190141 312 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 09:43:45.202906 312 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T09:43:45Z [debug] OnStartedLeading() called +2022-10-12T09:43:45Z [debug] Elected as leader, do processing +2022-10-12T09:43:45Z [debug] IPManagement -- mode: 0 / containerID: 07f924563e115d2f5f66cd0ddaa8fb7d8da27e67063e377767e4e21df00a462e / podRef: kube-system/testpodsec2 +2022-10-12T09:43:45Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T09:43:45Z [debug] Reserving IP: |148.14.24.4 07f924563e115d2f5f66cd0ddaa8fb7d8da27e67063e377767e4e21df00a462e| +2022-10-12T09:43:45Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.4 +2022-10-12T09:43:45Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.4 GenerateName: Namespace:kube-system SelfLink: UID:81f91fc7-ae05-4b07-8ae7-44244800c9da ResourceVersion:272629 Generation:1 CreationTimestamp:2022-10-12 09:43:45 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 09:43:45 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:07f924563e115d2f5f66cd0ddaa8fb7d8da27e67063e377767e4e21df00a462e PodRef:kube-system/testpodsec2}} +2022-10-12T09:43:45Z [debug] OnStoppedLeading() called +2022-10-12T09:43:45Z [debug] Finished leader election +2022-10-12T09:43:45Z [debug] IPManagement: {148.14.24.4 ffffff00}, +I1012 09:43:45.238144 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:05.0 ifName:eth2} {vfDeviceID:0000:18:02.6 ifName:} {vfDeviceID:0000:18:05.1 ifName:}] +I1012 09:43:45.273272 1 sriov.go:118] Configured interfaces for container 07f924563e115d2f5f66cd0ddaa8fb7d8da27e67063e377767e4e21df00a462e; hostIface: {Name:eth2 Mac:da:d8:b6:96:51:18 Sandbox:}, containerIface: {Name:eth2 Mac:da:d8:b6:96:51:18 Sandbox:/host/proc/3091212/ns/net} +I1012 09:43:45.273341 1 controller.go:444] "INTEL - networklist ITERATED" +I1012 09:43:45.273381 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net2 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth3 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 09:43:45.277472 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:e196fa65-c772-4f47-89ba-7ca7b0592b0d ResourceVersion:265537 Generation:1 CreationTimestamp:2022-10-12 08:31:37 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 08:31:37 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > Pod="kube-system/testpodsec2" +I1012 09:43:45.277577 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:e196fa65-c772-4f47-89ba-7ca7b0592b0d ResourceVersion:265537 Generation:1 CreationTimestamp:2022-10-12 08:31:37 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 08:31:37 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > +I1012 09:43:45.277669 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.25.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net2\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 09:43:45.277723 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 09:43:45.277740 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T09:43:45Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T09:43:45Z [debug] Beginning IPAM for ContainerID: 07f924563e115d2f5f66cd0ddaa8fb7d8da27e67063e377767e4e21df00a462e +2022-10-12T09:43:45Z [debug] Started leader election +I1012 09:43:45.351291 340 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 09:43:45.361677 340 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T09:43:45Z [debug] OnStartedLeading() called +2022-10-12T09:43:45Z [debug] Elected as leader, do processing +2022-10-12T09:43:45Z [debug] IPManagement -- mode: 0 / containerID: 07f924563e115d2f5f66cd0ddaa8fb7d8da27e67063e377767e4e21df00a462e / podRef: kube-system/testpodsec2 +2022-10-12T09:43:45Z [debug] IterateForAssignment input >> ip: 148.14.25.0 | ipnet: {148.14.25.0 ffffff00} | first IP: 148.14.25.1 | last IP: 148.14.25.254 +2022-10-12T09:43:45Z [debug] Reserving IP: |148.14.25.2 07f924563e115d2f5f66cd0ddaa8fb7d8da27e67063e377767e4e21df00a462e| +2022-10-12T09:43:45Z [debug] OverlappingRangewide allocation check for IP: 148.14.25.2 +2022-10-12T09:43:45Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.2 GenerateName: Namespace:kube-system SelfLink: UID:b167479a-3d5f-41f9-a083-50643adb53ea ResourceVersion:272634 Generation:1 CreationTimestamp:2022-10-12 09:43:45 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 09:43:45 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:07f924563e115d2f5f66cd0ddaa8fb7d8da27e67063e377767e4e21df00a462e PodRef:kube-system/testpodsec2}} +2022-10-12T09:43:45Z [debug] OnStoppedLeading() called +2022-10-12T09:43:45Z [debug] Finished leader election +2022-10-12T09:43:45Z [debug] IPManagement: {148.14.25.2 ffffff00}, +I1012 09:43:45.396040 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:05.0 ifName:eth2} {vfDeviceID:0000:18:02.6 ifName:eth2} {vfDeviceID:0000:18:05.1 ifName:}] +2022-10-12T09:43:45Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T09:43:45Z [debug] Beginning delete for ContainerID: 07f924563e115d2f5f66cd0ddaa8fb7d8da27e67063e377767e4e21df00a462e +2022-10-12T09:43:45Z [debug] Started leader election +I1012 09:43:45.466170 367 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 09:43:45.474984 367 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T09:43:45Z [debug] OnStartedLeading() called +2022-10-12T09:43:45Z [debug] Elected as leader, do processing +2022-10-12T09:43:45Z [debug] IPManagement -- mode: 1 / containerID: 07f924563e115d2f5f66cd0ddaa8fb7d8da27e67063e377767e4e21df00a462e / podRef: kube-system/testpodsec2 +2022-10-12T09:43:45Z [debug] Deallocating given previously used IP: 148.14.25.2 +2022-10-12T09:43:45Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.2 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T09:43:45Z [debug] OnStoppedLeading() called +2022-10-12T09:43:45Z [debug] Finished leader election +2022-10-12T09:43:45Z [debug] IPManagement: { }, +I1012 09:43:45.508664 1 controller.go:440] "INTEL - secondary interface configuration FAILED!!!!!!!!!!!!!!!!!" err="SRIOV Interface creation failed: failed to get VF information: lstat /sys/bus/pci/devices/0000:18:05.1/physfn/net: no such file or directory" +I1012 09:43:46.187284 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 09:43:46.195714 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:2b27e92c-7933-47e5-a435-51dc044175f7 ResourceVersion:265536 Generation:1 CreationTimestamp:2022-10-12 08:31:37 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 08:31:37 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec1" +I1012 09:43:46.195815 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:2b27e92c-7933-47e5-a435-51dc044175f7 ResourceVersion:265536 Generation:1 CreationTimestamp:2022-10-12 08:31:37 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 08:31:37 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 09:43:46.195909 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 09:43:46.195958 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 09:43:46.195979 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T09:43:46Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T09:43:46Z [debug] Beginning IPAM for ContainerID: e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf +2022-10-12T09:43:46Z [debug] Started leader election +I1012 09:43:46.268869 412 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 09:43:46.282053 412 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T09:43:46Z [debug] OnStartedLeading() called +2022-10-12T09:43:46Z [debug] Elected as leader, do processing +2022-10-12T09:43:46Z [debug] IPManagement -- mode: 0 / containerID: e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf / podRef: kube-system/testpodsec1 +2022-10-12T09:43:46Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T09:43:46Z [debug] Reserving IP: |148.14.24.5 e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf| +2022-10-12T09:43:46Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.5 +2022-10-12T09:43:46Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.5 GenerateName: Namespace:kube-system SelfLink: UID:bb476c5d-e97e-4231-a64e-9b0c1c64e976 ResourceVersion:272648 Generation:1 CreationTimestamp:2022-10-12 09:43:46 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 09:43:46 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf PodRef:kube-system/testpodsec1}} +2022-10-12T09:43:46Z [debug] OnStoppedLeading() called +2022-10-12T09:43:46Z [debug] Finished leader election +2022-10-12T09:43:46Z [debug] IPManagement: {148.14.24.5 ffffff00}, +I1012 09:43:46.315086 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:05.4 ifName:eth1} {vfDeviceID:0000:18:04.3 ifName:} {vfDeviceID:0000:18:01.7 ifName:}] +2022-10-12T09:43:46Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T09:43:46Z [debug] Beginning delete for ContainerID: e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf +2022-10-12T09:43:46Z [debug] Started leader election +I1012 09:43:46.390775 439 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 09:43:46.400102 439 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T09:43:46Z [debug] OnStartedLeading() called +2022-10-12T09:43:46Z [debug] Elected as leader, do processing +2022-10-12T09:43:46Z [debug] IPManagement -- mode: 1 / containerID: e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf / podRef: kube-system/testpodsec1 +2022-10-12T09:43:46Z [debug] Deallocating given previously used IP: 148.14.24.5 +2022-10-12T09:43:46Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.5 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T09:43:46Z [debug] OnStoppedLeading() called +2022-10-12T09:43:46Z [debug] Finished leader election +2022-10-12T09:43:46Z [debug] IPManagement: { }, +I1012 09:43:46.429855 1 controller.go:440] "INTEL - secondary interface configuration FAILED!!!!!!!!!!!!!!!!!" err="SRIOV Interface creation failed: failed to get VF information: lstat /sys/bus/pci/devices/0000:18:04.3/physfn/net: no such file or directory" +I1012 09:43:50.430434 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 09:43:50.438196 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:2b27e92c-7933-47e5-a435-51dc044175f7 ResourceVersion:265536 Generation:1 CreationTimestamp:2022-10-12 08:31:37 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 08:31:37 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec1" +I1012 09:43:50.438303 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:2b27e92c-7933-47e5-a435-51dc044175f7 ResourceVersion:265536 Generation:1 CreationTimestamp:2022-10-12 08:31:37 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 08:31:37 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 09:43:50.438402 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 09:43:50.438470 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 09:43:50.438491 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T09:43:50Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T09:43:50Z [debug] Beginning IPAM for ContainerID: e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf +2022-10-12T09:43:50Z [debug] Started leader election +I1012 09:43:50.523494 464 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 09:43:50.541757 464 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T09:43:50Z [debug] OnStartedLeading() called +2022-10-12T09:43:50Z [debug] Elected as leader, do processing +2022-10-12T09:43:50Z [debug] IPManagement -- mode: 0 / containerID: e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf / podRef: kube-system/testpodsec1 +2022-10-12T09:43:50Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T09:43:50Z [debug] Reserving IP: |148.14.24.5 e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf| +2022-10-12T09:43:50Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.5 +2022-10-12T09:43:50Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.5 GenerateName: Namespace:kube-system SelfLink: UID:68600a55-e952-4240-ba0d-211a30ab6b91 ResourceVersion:272662 Generation:1 CreationTimestamp:2022-10-12 09:43:50 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 09:43:50 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf PodRef:kube-system/testpodsec1}} +2022-10-12T09:43:50Z [debug] OnStoppedLeading() called +2022-10-12T09:43:50Z [debug] Finished leader election +2022-10-12T09:43:50Z [debug] IPManagement: {148.14.24.5 ffffff00}, +I1012 09:43:50.577001 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:05.4 ifName:eth1} {vfDeviceID:0000:18:04.3 ifName:eth1} {vfDeviceID:0000:18:01.7 ifName:}] +I1012 09:43:50.648317 1 sriov.go:118] Configured interfaces for container e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf; hostIface: {Name:ens785f0v7 Mac:9a:6e:97:16:00:e0 Sandbox:}, containerIface: {Name:eth1 Mac:9a:6e:97:16:00:e0 Sandbox:/host/proc/3091219/ns/net} +I1012 09:43:50.648403 1 controller.go:444] "INTEL - networklist ITERATED" +I1012 09:43:50.648445 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net2 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 09:43:50.653148 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:e196fa65-c772-4f47-89ba-7ca7b0592b0d ResourceVersion:265537 Generation:1 CreationTimestamp:2022-10-12 08:31:37 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 08:31:37 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > Pod="kube-system/testpodsec1" +I1012 09:43:50.653237 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:e196fa65-c772-4f47-89ba-7ca7b0592b0d ResourceVersion:265537 Generation:1 CreationTimestamp:2022-10-12 08:31:37 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 08:31:37 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > +I1012 09:43:50.653328 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.25.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net2\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 09:43:50.653376 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 09:43:50.653395 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T09:43:50Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T09:43:50Z [debug] Beginning IPAM for ContainerID: e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf +2022-10-12T09:43:50Z [debug] Started leader election +I1012 09:43:50.727048 485 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 09:43:50.736964 485 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T09:43:50Z [debug] OnStartedLeading() called +2022-10-12T09:43:50Z [debug] Elected as leader, do processing +2022-10-12T09:43:50Z [debug] IPManagement -- mode: 0 / containerID: e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf / podRef: kube-system/testpodsec1 +2022-10-12T09:43:50Z [debug] IterateForAssignment input >> ip: 148.14.25.0 | ipnet: {148.14.25.0 ffffff00} | first IP: 148.14.25.1 | last IP: 148.14.25.254 +2022-10-12T09:43:50Z [debug] Reserving IP: |148.14.25.2 e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf| +2022-10-12T09:43:50Z [debug] OverlappingRangewide allocation check for IP: 148.14.25.2 +2022-10-12T09:43:50Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.2 GenerateName: Namespace:kube-system SelfLink: UID:663f9ef6-1080-4756-bad6-61c3a3e70273 ResourceVersion:272669 Generation:1 CreationTimestamp:2022-10-12 09:43:50 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 09:43:50 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf PodRef:kube-system/testpodsec1}} +2022-10-12T09:43:50Z [debug] OnStoppedLeading() called +2022-10-12T09:43:50Z [debug] Finished leader election +2022-10-12T09:43:50Z [debug] IPManagement: {148.14.25.2 ffffff00}, +I1012 09:43:50.771234 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:05.4 ifName:eth1} {vfDeviceID:0000:18:04.3 ifName:eth1} {vfDeviceID:0000:18:01.7 ifName:eth1}] +2022-10-12T09:43:50Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T09:43:50Z [debug] Beginning delete for ContainerID: e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf +2022-10-12T09:43:50Z [debug] Started leader election +I1012 09:43:50.842152 507 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 09:43:50.851490 507 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T09:43:50Z [debug] OnStartedLeading() called +2022-10-12T09:43:50Z [debug] Elected as leader, do processing +2022-10-12T09:43:50Z [debug] IPManagement -- mode: 1 / containerID: e33943f7fe2b3510804619ba89caa9d693c3bfee5750c395a35a92914b289aaf / podRef: kube-system/testpodsec1 +2022-10-12T09:43:50Z [debug] Deallocating given previously used IP: 148.14.25.2 +2022-10-12T09:43:50Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.2 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T09:43:50Z [debug] OnStoppedLeading() called +2022-10-12T09:43:50Z [debug] Finished leader election +2022-10-12T09:43:50Z [debug] IPManagement: { }, +I1012 09:43:50.881535 1 controller.go:440] "INTEL - secondary interface configuration FAILED!!!!!!!!!!!!!!!!!" err="SRIOV Interface creation failed: error getting the Pod SR-IOV VF device ID" diff --git a/cleanup.sh b/cleanup.sh new file mode 100755 index 00000000000..0b1d43d833d --- /dev/null +++ b/cleanup.sh @@ -0,0 +1,7 @@ +kubectl delete pod testpodsec1 -n kube-system --force +kubectl delete pod testpodsec2 -n kube-system --force +kubectl delete pod testpodsec3 -n kube-system --force +kubectl delete pod testpodsec4 -n kube-system --force +#kubectl delete -f /tmp/secondary_network/sriovdp-daemonset.yaml +#kubectl delete -f /tmp/secondary_network/antrea.yml +#echo 0 > /sys/class/net/ens785f0/device/sriov_numvfs diff --git a/f.log b/f.log new file mode 100644 index 00000000000..c7021749695 --- /dev/null +++ b/f.log @@ -0,0 +1,1270 @@ +I1012 11:10:43.223487 1 log_file.go:93] Set log file max size to 104857600 +I1012 11:10:43.225750 1 agent.go:96] Starting Antrea agent (version v1.9.0-dev-0dceb752.dirty) +I1012 11:10:43.225800 1 client.go:87] No kubeconfig file was specified. Falling back to in-cluster config +I1012 11:10:43.226952 1 prometheus.go:171] Initializing prometheus metrics +I1012 11:10:43.227510 1 ovs_client.go:70] Connecting to OVSDB at address /var/run/openvswitch/db.sock +I1012 11:10:44.228790 1 ovs_client.go:89] Not connected yet, will try again in 2s +I1012 11:10:44.229244 1 agent.go:361] Setting up node network +I1012 11:10:44.255925 1 agent.go:950] "Setting Node MTU" MTU=1450 +I1012 11:10:44.256765 1 ovs_client.go:113] Bridge exists: 0f59126c-82e4-45cf-bac0-0696844bdb40 +I1012 11:10:44.274651 1 agent.go:1091] Using round number 33 +I1012 11:10:44.275084 1 ofctrl.go:172] Initialize connection or re-connect to /var/run/openvswitch/br-int.mgmt. +I1012 11:10:44.364108 1 route_linux.go:163] Initialized iptables +I1012 11:10:45.275939 1 ofctrl.go:187] Connected to socket /var/run/openvswitch/br-int.mgmt +I1012 11:10:45.276371 1 ofctrl.go:249] New connection.. +I1012 11:10:45.276437 1 ofctrl.go:257] Sent hello with OF version: 6 +I1012 11:10:45.276552 1 ofctrl.go:269] Received Openflow 1.5 Hello message +I1012 11:10:45.277385 1 ofctrl.go:289] Received ofp1.5 Switch feature response: {Header:{Version:6 Type:6 Length:32 Xid:3} DPID:00:00:6e:12:59:0f:cf:45 Buffers:0 NumTables:254 AuxilaryId:0 pad:[0 0] Capabilities:591 Reserved:0} +I1012 11:10:45.277468 1 ofSwitch.go:85] Openflow Connection for new switch: 00:00:6e:12:59:0f:cf:45 +I1012 11:10:45.277981 1 ofctrl_bridge.go:325] OFSwitch is connected: 00:00:6e:12:59:0f:cf:45 +I1012 11:10:45.399849 1 agent.go:452] Agent initialized NodeConfig=NodeName: vcesd2, OVSBridge: br-int, PodIPv4CIDR: 172.25.0.0/24, PodIPv6CIDR: , NodeIPv4: 172.25.55.29/24, NodeIPv6: , TransportIPv4: 172.25.55.29/24, TransportIPv6: , Gateway: Name antrea-gw0: IPv4 172.25.0.1, IPv6 , MAC 62:3d:8d:a2:1b:bf, NetworkConfig=&{encap geneve 0 None {psk } [] true false} +I1012 11:10:45.402085 1 metrics.go:138] Registering Antrea Proxy prometheus metrics +I1012 11:10:45.408129 1 fqdn.go:186] "Using kube-dns Service for DNS requests" dnsServer="10.96.0.10:53" +I1012 11:10:45.408278 1 audit_logging.go:177] "Initialized Antrea-native Policy Logger for audit logging" logFile="/var/log/antrea/networkpolicy/np.log" +I1012 11:10:45.414392 1 server.go:743] Reconciliation for CNI server +I1012 11:10:45.441481 1 agent.go:609] Cleaning up flow-restore-wait config +I1012 11:10:45.442341 1 agent.go:622] Cleaned up flow-restore-wait config +I1012 11:10:45.442358 1 client.go:105] No antrea kubeconfig file was specified. Falling back to in-cluster config +I1012 11:10:45.442367 1 client.go:108] Didn't get CA certificate, skip updating Antrea Client +I1012 11:10:45.442411 1 client.go:87] No kubeconfig file was specified. Falling back to in-cluster config +I1012 11:10:45.442446 1 channel.go:83] "Starting SubscribableChannel" name="PodUpdate" +I1012 11:10:45.442493 1 log_file.go:121] Starting log file monitoring. Maximum log file number is 4 +I1012 11:10:45.442563 1 node_route_controller.go:362] Starting AntreaAgentNodeRouteController +I1012 11:10:45.442620 1 shared_informer.go:255] Waiting for caches to sync for AntreaAgentNodeRouteController +I1012 11:10:45.442669 1 route_linux.go:197] Starting iptables sync, with sync interval 1m0s +I1012 11:10:45.442692 1 server.go:677] Starting CNI server +I1012 11:10:45.442734 1 configmap_cafile_content.go:202] "Starting controller" name="antrea-ca::kube-system::antrea-ca::ca.crt" +I1012 11:10:45.442774 1 shared_informer.go:255] Waiting for caches to sync for antrea-ca::kube-system::antrea-ca::ca.crt +I1012 11:10:45.442938 1 networkpolicy_controller.go:447] Waiting for Antrea client to be ready +I1012 11:10:45.442981 1 server.go:687] CNI server is listening ... +I1012 11:10:45.442995 1 cluster.go:323] "Starting" controllerName="MemberListCluster" +I1012 11:10:45.443058 1 shared_informer.go:255] Waiting for caches to sync for MemberListCluster +I1012 11:10:45.443072 1 traceflow_controller.go:170] Starting AntreaAgentTraceflowController +I1012 11:10:45.443088 1 shared_informer.go:255] Waiting for caches to sync for AntreaAgentTraceflowController +I1012 11:10:45.443098 1 log_file.go:182] Deleted log file antrea-agent.vcesd2.root.log.INFO.20221012-104620.1 +I1012 11:10:45.443164 1 controller.go:168] Starting ExternalIPPoolController +I1012 11:10:45.443205 1 log_file.go:182] Deleted log file antrea-agent.vcesd2.root.log.WARNING.20221012-102701.1 +I1012 11:10:45.443226 1 shared_informer.go:255] Waiting for caches to sync for ExternalIPPoolController +I1012 11:10:45.443222 1 egress_controller.go:307] Starting AntreaAgentEgressController +I1012 11:10:45.443299 1 shared_informer.go:255] Waiting for caches to sync for AntreaAgentEgressController +I1012 11:10:45.443359 1 local_ip_detector_linux.go:59] Starting localIPDetector +I1012 11:10:45.443531 1 config.go:132] Starting endpoints config controller +I1012 11:10:45.443549 1 shared_informer.go:255] Waiting for caches to sync for endpoints config +I1012 11:10:45.443561 1 config.go:223] Starting service config controller +I1012 11:10:45.443619 1 shared_informer.go:255] Waiting for caches to sync for service config +I1012 11:10:45.443628 1 controller.go:454] "Starting " controller="SecondaryNetworkController" +I1012 11:10:45.443660 1 agent.go:49] Starting Antrea Agent Monitor +I1012 11:10:45.443699 1 shared_informer.go:255] Waiting for caches to sync for SecondaryNetworkController +I1012 11:10:45.443744 1 collector.go:86] Start collecting metrics +I1012 11:10:45.543192 1 shared_informer.go:262] Caches are synced for antrea-ca::kube-system::antrea-ca::ca.crt +I1012 11:10:45.543286 1 shared_informer.go:262] Caches are synced for AntreaAgentNodeRouteController +I1012 11:10:45.543330 1 node_route_controller.go:315] Reconciliation for AntreaAgentNodeRouteController +I1012 11:10:45.543338 1 shared_informer.go:262] Caches are synced for AntreaAgentTraceflowController +I1012 11:10:45.543412 1 shared_informer.go:262] Caches are synced for AntreaAgentEgressController +I1012 11:10:45.543497 1 shared_informer.go:262] Caches are synced for MemberListCluster +I1012 11:10:45.543595 1 shared_informer.go:262] Caches are synced for ExternalIPPoolController +I1012 11:10:45.543636 1 client.go:105] No antrea kubeconfig file was specified. Falling back to in-cluster config +I1012 11:10:45.543688 1 shared_informer.go:262] Caches are synced for endpoints config +I1012 11:10:45.543707 1 egress_controller.go:766] Starting watch for EgressGroup +W1012 11:10:45.543722 1 egress_controller.go:769] Failed to get antrea client: Antrea client is not ready +I1012 11:10:45.543746 1 shared_informer.go:262] Caches are synced for service config +I1012 11:10:45.543890 1 shared_informer.go:262] Caches are synced for SecondaryNetworkController +I1012 11:10:45.544014 1 client.go:130] Updating Antrea client with the new CA bundle +I1012 11:10:45.544210 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/etcd-vcesd2" +I1012 11:10:45.544231 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-controller-manager-vcesd2" +I1012 11:10:45.544264 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/coredns-64897985d-hzkht" +I1012 11:10:45.544274 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/antrea-controller-59cbc8f559-724q8" +I1012 11:10:45.544291 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-sriov-device-plugin-amd64-95srr" +I1012 11:10:45.544313 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-scheduler-vcesd2" +I1012 11:10:45.544337 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-proxy-xp5bq" +I1012 11:10:45.544345 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/coredns-64897985d-ffc47" +I1012 11:10:45.544313 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/kube-apiserver-vcesd2" +I1012 11:10:45.544426 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/antrea-agent-tx8dr" +I1012 11:10:45.544850 1 cluster.go:461] "Processed Node event" eventType=Join nodeName="vcesd2" affectedExternalIPPoolNum=0 +I1012 11:10:45.643764 1 networkpolicy_controller.go:458] Antrea client is ready +I1012 11:10:45.643822 1 networkpolicy_controller.go:473] Waiting for all watchers to complete full sync +I1012 11:10:45.643853 1 networkpolicy_controller.go:711] Starting watch for AddressGroup +I1012 11:10:45.643893 1 networkpolicy_controller.go:711] Starting watch for AppliedToGroup +I1012 11:10:45.643864 1 networkpolicy_controller.go:711] Starting watch for NetworkPolicy +I1012 11:10:45.932310 1 serving.go:348] Generated self-signed cert in-memory +I1012 11:10:46.219530 1 requestheader_controller.go:169] Starting RequestHeaderAuthRequestController +I1012 11:10:46.219564 1 shared_informer.go:255] Waiting for caches to sync for RequestHeaderAuthRequestController +I1012 11:10:46.219574 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" +I1012 11:10:46.219601 1 shared_informer.go:255] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file +I1012 11:10:46.219619 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" +I1012 11:10:46.219665 1 shared_informer.go:255] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file +I1012 11:10:46.219948 1 secure_serving.go:210] Serving securely on [::]:10350 +I1012 11:10:46.220010 1 tlsconfig.go:240] "Starting DynamicServingCertificateController" +I1012 11:10:46.319698 1 shared_informer.go:262] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file +I1012 11:10:46.319820 1 shared_informer.go:262] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file +I1012 11:10:46.319900 1 shared_informer.go:262] Caches are synced for RequestHeaderAuthRequestController +W1012 11:10:46.675566 1 networkpolicy_controller.go:714] Failed to start watch for AddressGroup: Get "https://10.107.224.207:443/apis/controlplane.antrea.io/v1beta2/addressgroups?fieldSelector=nodeName%3Dvcesd2&watch=true": dial tcp 10.107.224.207:443: connect: connection refused +W1012 11:10:46.675595 1 networkpolicy_controller.go:714] Failed to start watch for AppliedToGroup: Get "https://10.107.224.207:443/apis/controlplane.antrea.io/v1beta2/appliedtogroups?fieldSelector=nodeName%3Dvcesd2&watch=true": dial tcp 10.107.224.207:443: connect: connection refused +W1012 11:10:46.675636 1 networkpolicy_controller.go:714] Failed to start watch for NetworkPolicy: Get "https://10.107.224.207:443/apis/controlplane.antrea.io/v1beta2/networkpolicies?fieldSelector=nodeName%3Dvcesd2&watch=true": dial tcp 10.107.224.207:443: connect: connection refused +I1012 11:10:50.544624 1 egress_controller.go:766] Starting watch for EgressGroup +I1012 11:10:50.644362 1 networkpolicy_controller.go:711] Starting watch for AddressGroup +I1012 11:10:50.644457 1 networkpolicy_controller.go:711] Starting watch for AppliedToGroup +I1012 11:10:50.644532 1 networkpolicy_controller.go:711] Starting watch for NetworkPolicy +I1012 11:10:50.842769 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/antrea-controller-59cbc8f559-724q8" +I1012 11:10:51.591038 1 egress_controller.go:787] Started watch for EgressGroup +I1012 11:10:51.591326 1 networkpolicy_controller.go:724] Started watch for AppliedToGroup +I1012 11:10:51.591337 1 egress_controller.go:815] Received 0 init events for EgressGroup +I1012 11:10:51.591424 1 networkpolicy_controller.go:754] Received 0 init events for AppliedToGroup +I1012 11:10:51.591504 1 networkpolicy_controller.go:724] Started watch for NetworkPolicy +I1012 11:10:51.591533 1 networkpolicy_controller.go:724] Started watch for AddressGroup +I1012 11:10:51.591601 1 networkpolicy_controller.go:754] Received 0 init events for AddressGroup +I1012 11:10:51.591638 1 networkpolicy_controller.go:754] Received 0 init events for NetworkPolicy +I1012 11:10:51.591691 1 networkpolicy_controller.go:475] All watchers have completed full sync, installing flows for init events +I1012 11:10:51.592612 1 networkpolicy_controller.go:479] Starting NetworkPolicy workers now +I1012 11:10:51.592647 1 networkpolicy_controller.go:485] Starting IDAllocator worker to maintain the async rule cache +I1012 11:10:51.592681 1 status_controller.go:209] Starting NetworkPolicy StatusController +I1012 11:10:55.400565 1 agent.go:527] Deleting stale flows from previous round if any +I1012 11:10:55.400614 1 agent.go:459] Persisting round number 33 to OVSDB +I1012 11:10:55.401622 1 agent.go:464] Round number 33 was persisted to OVSDB +I1012 11:11:00.851364 1 controller.go:258] "Pod does not have a NetworkAttachmentDefinition" Pod="kube-system/antrea-agent-tx8dr" +I1012 11:20:45.444142 1 log_file.go:182] Deleted log file antrea-agent.vcesd2.root.log.WARNING.20221012-104622.1 +I1012 12:05:40.985451 1 server.go:425] Received CmdAdd request cni_args:{container_id:"1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8" netns:"/proc/3277680/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec2;K8S_POD_INFRA_CONTAINER_ID=1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:05:40.985815 1 server.go:425] Received CmdAdd request cni_args:{container_id:"4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c" netns:"/proc/3277670/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec3;K8S_POD_INFRA_CONTAINER_ID=4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:05:40.992493 1 server.go:495] "Allocated IP addresses" container="1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.88 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 12:05:40.992858 1 server.go:495] "Allocated IP addresses" container="4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.89 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 12:05:41.094857 1 server.go:425] Received CmdAdd request cni_args:{container_id:"ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50" netns:"/proc/3277699/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec1;K8S_POD_INFRA_CONTAINER_ID=ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:05:41.103371 1 server.go:495] "Allocated IP addresses" container="ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.90 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 12:05:41.163921 1 pod_configuration.go:265] Configured interfaces for container 1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8 +I1012 12:05:41.163960 1 server.go:522] CmdAdd for container 1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8 succeeded +I1012 12:05:41.163963 1 pod_configuration.go:265] Configured interfaces for container 4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c +I1012 12:05:41.163993 1 server.go:522] CmdAdd for container 4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c succeeded +I1012 12:05:41.180512 1 pod_configuration.go:265] Configured interfaces for container ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50 +I1012 12:05:41.180555 1 server.go:522] CmdAdd for container ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50 succeeded +I1012 12:05:41.434696 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:05:41.443588 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:05:41.443642 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:05:41.446876 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:05:41.449860 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:05:41.449898 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:05:42.499240 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:05:42.505125 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:05:42.505165 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:05:43.444051 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:05:43.450463 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:05:43.453030 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:05:43.453072 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:05:43.453396 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:05:43.453446 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:05:44.505866 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:05:44.511677 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:05:44.511721 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:05:47.453850 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:05:47.453922 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:05:47.462403 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:05:47.462447 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:05:47.462646 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:05:47.462675 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:05:48.512951 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:05:48.520540 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:05:48.520583 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:05:55.462988 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:05:55.463034 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:05:55.479525 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:05:55.479569 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:05:55.479606 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:05:55.479654 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:05:56.521285 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:05:56.531969 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:05:56.532012 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:06:11.480824 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:06:11.480863 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:06:11.488517 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:06:11.488562 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:06:11.488522 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:06:11.488620 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:06:12.532187 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:06:12.542697 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:06:12.542741 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:06:43.488834 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:06:43.488874 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:06:43.497187 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:06:43.497232 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:06:43.497512 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:06:43.497555 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:06:44.543226 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:06:44.549004 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:06:44.549055 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:07:47.497784 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:07:47.497848 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:07:47.507669 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:07:47.507742 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:07:47.508017 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:07:47.508068 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:07:48.549887 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:07:48.558654 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:07:48.558695 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:09:47.508871 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:09:47.508922 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:09:47.518239 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:09:47.518286 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:09:47.518609 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:09:47.518672 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:09:48.559792 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:09:48.565655 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:09:48.565704 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:11:47.519409 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:11:47.519461 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:11:47.528148 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec2" +I1012 12:11:47.528192 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec2" +I1012 12:11:47.528428 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec1" +I1012 12:11:47.528475 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec1" +I1012 12:11:48.566908 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:11:48.577596 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=&{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name: GenerateName: Namespace: SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[]} Spec:{Config:}} Pod="kube-system/testpodsec3" +I1012 12:11:48.577646 1 controller.go:410] "INTEL - netDefCRD NOT READ " netDefCRD="network-attachment-definitions.k8s.cni.cncf.io \"virtual-net1\" not found" Pod="kube-system/testpodsec3" +I1012 12:12:19.519860 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:12:19.541809 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec1" +I1012 12:12:19.541876 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 12:12:19.541949 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:12:19.542057 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:12:19.542074 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +I1012 12:12:19.648418 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:12:19.651926 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec2" +I1012 12:12:19.652025 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 12:12:19.652125 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:12:19.652174 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:12:19.652195 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T12:12:19Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T12:12:19Z [debug] Beginning IPAM for ContainerID: ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50 +2022-10-12T12:12:19Z [debug] Started leader election +I1012 12:12:19.616509 3994 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:12:19.630896 3994 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:12:19Z [debug] OnStartedLeading() called +2022-10-12T12:12:19Z [debug] Elected as leader, do processing +2022-10-12T12:12:19Z [debug] IPManagement -- mode: 0 / containerID: ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50 / podRef: kube-system/testpodsec1 +2022-10-12T12:12:19Z [error] IPAM error reading pool allocations (attempt: 0): k8s pool initialized +2022-10-12T12:12:19Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T12:12:19Z [debug] Reserving IP: |148.14.24.1 ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50| +2022-10-12T12:12:19Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.1 +2022-10-12T12:12:19Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.1 GenerateName: Namespace:kube-system SelfLink: UID:3bd77b2f-4a95-4966-8fe3-6e4895687987 ResourceVersion:9982 Generation:1 CreationTimestamp:2022-10-12 12:12:19 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:12:19 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50 PodRef:kube-system/testpodsec1}} +2022-10-12T12:12:19Z [debug] OnStoppedLeading() called +2022-10-12T12:12:19Z [debug] Finished leader election +2022-10-12T12:12:19Z [debug] IPManagement: {148.14.24.1 ffffff00}, +I1012 12:12:19.675848 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[] +I1012 12:12:19.757665 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:12:19.761079 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec3" +I1012 12:12:19.761243 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 12:12:19.761387 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:12:19.761462 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:12:19.761495 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T12:12:19Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T12:12:19Z [debug] Beginning IPAM for ContainerID: 1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8 +2022-10-12T12:12:19Z [debug] Started leader election +I1012 12:12:19.736046 4024 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:12:19.745156 4024 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:12:19Z [debug] OnStartedLeading() called +2022-10-12T12:12:19Z [debug] Elected as leader, do processing +2022-10-12T12:12:19Z [debug] IPManagement -- mode: 0 / containerID: 1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8 / podRef: kube-system/testpodsec2 +2022-10-12T12:12:19Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T12:12:19Z [debug] Reserving IP: |148.14.24.2 1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8| +2022-10-12T12:12:19Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.2 +2022-10-12T12:12:19Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.2 GenerateName: Namespace:kube-system SelfLink: UID:8ff6cda0-dc79-4a3c-8ca7-a4267a11d0e2 ResourceVersion:9990 Generation:1 CreationTimestamp:2022-10-12 12:12:19 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:12:19 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8 PodRef:kube-system/testpodsec2}} +2022-10-12T12:12:19Z [debug] OnStoppedLeading() called +2022-10-12T12:12:19Z [debug] Finished leader election +2022-10-12T12:12:19Z [debug] IPManagement: {148.14.24.2 ffffff00}, +I1012 12:12:19.778901 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[] +2022-10-12T12:12:19Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec3 PodNamespace:kube-system} +2022-10-12T12:12:19Z [debug] Beginning IPAM for ContainerID: 4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c +2022-10-12T12:12:19Z [debug] Started leader election +I1012 12:12:19.829385 4081 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:12:19.838506 4081 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:12:19Z [debug] OnStartedLeading() called +2022-10-12T12:12:19Z [debug] Elected as leader, do processing +2022-10-12T12:12:19Z [debug] IPManagement -- mode: 0 / containerID: 4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c / podRef: kube-system/testpodsec3 +2022-10-12T12:12:19Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T12:12:19Z [debug] Reserving IP: |148.14.24.3 4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c| +2022-10-12T12:12:19Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.3 +2022-10-12T12:12:19Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.3 GenerateName: Namespace:kube-system SelfLink: UID:14aa21b5-f321-4341-bb0f-3f5c9e0ba94b ResourceVersion:9995 Generation:1 CreationTimestamp:2022-10-12 12:12:19 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:12:19 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c PodRef:kube-system/testpodsec3}} +2022-10-12T12:12:19Z [debug] OnStoppedLeading() called +2022-10-12T12:12:19Z [debug] Finished leader election +2022-10-12T12:12:19Z [debug] IPManagement: {148.14.24.3 ffffff00}, +I1012 12:12:19.869993 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[] +2022-10-12T12:12:19Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec3 PodNamespace:kube-system} +2022-10-12T12:12:19Z [debug] Beginning delete for ContainerID: 4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c +2022-10-12T12:12:19Z [debug] Started leader election +I1012 12:12:19.938931 4137 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:12:19.955388 4137 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:12:19Z [debug] OnStartedLeading() called +2022-10-12T12:12:19Z [debug] Elected as leader, do processing +2022-10-12T12:12:19Z [debug] IPManagement -- mode: 1 / containerID: 4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c / podRef: kube-system/testpodsec3 +2022-10-12T12:12:19Z [debug] Deallocating given previously used IP: 148.14.24.3 +2022-10-12T12:12:19Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.3 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:12:19Z [debug] OnStoppedLeading() called +2022-10-12T12:12:19Z [debug] Finished leader election +2022-10-12T12:12:19Z [debug] IPManagement: { }, +I1012 12:12:19.983624 1 controller.go:440] "INTEL - secondary interface configuration FAILED!!!!!!!!!!!!!!!!!" err="SRIOV Interface creation failed: error getting the Pod SR-IOV VF device ID" +I1012 12:12:19.983736 1 controller.go:154] "Pod VF Cache cleared" pod="kube-system/testpodsec3" +2022-10-12T12:12:19Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T12:12:19Z [debug] Beginning delete for ContainerID: ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50 +2022-10-12T12:12:19Z [debug] Started leader election +I1012 12:12:19.747453 4037 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:12:20.629011 4037 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:12:20Z [debug] OnStartedLeading() called +2022-10-12T12:12:20Z [debug] Elected as leader, do processing +2022-10-12T12:12:20Z [debug] IPManagement -- mode: 1 / containerID: ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50 / podRef: kube-system/testpodsec1 +2022-10-12T12:12:20Z [debug] Deallocating given previously used IP: 148.14.24.1 +2022-10-12T12:12:20Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.1 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:12:20Z [debug] OnStoppedLeading() called +2022-10-12T12:12:20Z [debug] Finished leader election +2022-10-12T12:12:20Z [debug] IPManagement: { }, +I1012 12:12:20.663064 1 controller.go:440] "INTEL - secondary interface configuration FAILED!!!!!!!!!!!!!!!!!" err="SRIOV Interface creation failed: error getting the Pod SR-IOV VF device ID" +I1012 12:12:20.663174 1 controller.go:154] "Pod VF Cache cleared" pod="kube-system/testpodsec1" +2022-10-12T12:12:19Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T12:12:19Z [debug] Beginning delete for ContainerID: 1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8 +2022-10-12T12:12:19Z [debug] Started leader election +I1012 12:12:19.845556 4088 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:12:20.720232 4088 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:12:20Z [debug] OnStartedLeading() called +2022-10-12T12:12:20Z [debug] Elected as leader, do processing +2022-10-12T12:12:20Z [debug] IPManagement -- mode: 1 / containerID: 1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8 / podRef: kube-system/testpodsec2 +2022-10-12T12:12:20Z [debug] Deallocating given previously used IP: 148.14.24.2 +2022-10-12T12:12:20Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.2 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:12:20Z [debug] OnStoppedLeading() called +2022-10-12T12:12:20Z [debug] Finished leader election +2022-10-12T12:12:20Z [debug] IPManagement: { }, +I1012 12:12:20.752450 1 controller.go:440] "INTEL - secondary interface configuration FAILED!!!!!!!!!!!!!!!!!" err="SRIOV Interface creation failed: error getting the Pod SR-IOV VF device ID" +I1012 12:12:20.752554 1 controller.go:154] "Pod VF Cache cleared" pod="kube-system/testpodsec2" +I1012 12:12:39.019976 1 server.go:425] Received CmdAdd request cni_args:{container_id:"edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb" netns:"/proc/3283572/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec3;K8S_POD_INFRA_CONTAINER_ID=edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:12:39.026042 1 server.go:495] "Allocated IP addresses" container="edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.91 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 12:12:39.111538 1 server.go:425] Received CmdAdd request cni_args:{container_id:"62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed" netns:"/proc/3283583/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec1;K8S_POD_INFRA_CONTAINER_ID=62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:12:39.111713 1 server.go:425] Received CmdAdd request cni_args:{container_id:"e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da" netns:"/proc/3283590/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec2;K8S_POD_INFRA_CONTAINER_ID=e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:12:39.117985 1 server.go:495] "Allocated IP addresses" container="62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.92 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 12:12:39.118819 1 server.go:495] "Allocated IP addresses" container="e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.93 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 12:12:39.249560 1 pod_configuration.go:265] Configured interfaces for container edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb +I1012 12:12:39.249604 1 server.go:522] CmdAdd for container edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb succeeded +I1012 12:12:39.260774 1 pod_configuration.go:265] Configured interfaces for container 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed +I1012 12:12:39.260810 1 server.go:522] CmdAdd for container 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed succeeded +I1012 12:12:39.260848 1 pod_configuration.go:265] Configured interfaces for container e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da +I1012 12:12:39.260877 1 server.go:522] CmdAdd for container e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da succeeded +I1012 12:12:40.239577 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:12:40.246500 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec2" +I1012 12:12:40.246587 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 12:12:40.246732 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:12:40.246785 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:12:40.246802 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +I1012 12:12:40.249753 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:12:40.253557 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec1" +I1012 12:12:40.253652 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 12:12:40.253747 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:12:40.253798 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:12:40.253819 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +I1012 12:12:40.263355 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:12:40.267077 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec3" +I1012 12:12:40.267220 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 12:12:40.267354 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:12:40.267409 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:12:40.267427 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T12:12:40Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T12:12:40Z [debug] Beginning IPAM for ContainerID: e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da +2022-10-12T12:12:40Z [debug] Started leader election +I1012 12:12:40.333020 4194 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:12:40.346262 4194 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:12:40Z [debug] OnStartedLeading() called +2022-10-12T12:12:40Z [debug] Elected as leader, do processing +2022-10-12T12:12:40Z [debug] IPManagement -- mode: 0 / containerID: e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da / podRef: kube-system/testpodsec2 +2022-10-12T12:12:40Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T12:12:40Z [debug] Reserving IP: |148.14.24.1 e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da| +2022-10-12T12:12:40Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.1 +2022-10-12T12:12:40Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.1 GenerateName: Namespace:kube-system SelfLink: UID:b0df3b78-b1b2-4487-8d0a-780609bf5abf ResourceVersion:10063 Generation:1 CreationTimestamp:2022-10-12 12:12:40 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:12:40 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da PodRef:kube-system/testpodsec2}} +2022-10-12T12:12:40Z [debug] OnStoppedLeading() called +2022-10-12T12:12:40Z [debug] Finished leader election +2022-10-12T12:12:40Z [debug] IPManagement: {148.14.24.1 ffffff00}, +I1012 12:12:40.382347 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:03.7 ifName:} {vfDeviceID:0000:18:06.7 ifName:} {vfDeviceID:0000:18:05.3 ifName:}] +I1012 12:12:40.448450 1 sriov.go:118] Configured interfaces for container e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da; hostIface: {Name:ens785f0v23 Mac:e6:e8:c7:3b:7a:fc Sandbox:}, containerIface: {Name:eth2 Mac:e6:e8:c7:3b:7a:fc Sandbox:/host/proc/3283590/ns/net} +I1012 12:12:40.448529 1 controller.go:444] "INTEL - networklist ITERATED" +I1012 12:12:40.448570 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net2 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth3 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:12:40.453324 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:7d1f7d37-57cd-475e-a117-5f4c8b473f0e ResourceVersion:9962 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > Pod="kube-system/testpodsec2" +I1012 12:12:40.453427 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:7d1f7d37-57cd-475e-a117-5f4c8b473f0e ResourceVersion:9962 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > +I1012 12:12:40.453520 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.25.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net2\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:12:40.453568 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:12:40.453590 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T12:12:40Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T12:12:40Z [debug] Beginning IPAM for ContainerID: e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da +2022-10-12T12:12:40Z [debug] Started leader election +I1012 12:12:40.526613 4277 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:12:40.536870 4277 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:12:40Z [debug] OnStartedLeading() called +2022-10-12T12:12:40Z [debug] Elected as leader, do processing +2022-10-12T12:12:40Z [debug] IPManagement -- mode: 0 / containerID: e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da / podRef: kube-system/testpodsec2 +2022-10-12T12:12:40Z [error] IPAM error reading pool allocations (attempt: 0): k8s pool initialized +2022-10-12T12:12:40Z [debug] IterateForAssignment input >> ip: 148.14.25.0 | ipnet: {148.14.25.0 ffffff00} | first IP: 148.14.25.1 | last IP: 148.14.25.254 +2022-10-12T12:12:40Z [debug] Reserving IP: |148.14.25.1 e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da| +2022-10-12T12:12:40Z [debug] OverlappingRangewide allocation check for IP: 148.14.25.1 +2022-10-12T12:12:40Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.1 GenerateName: Namespace:kube-system SelfLink: UID:ecde1aef-06ca-4e2a-aea2-8adc66d8b556 ResourceVersion:10069 Generation:1 CreationTimestamp:2022-10-12 12:12:40 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:12:40 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da PodRef:kube-system/testpodsec2}} +2022-10-12T12:12:40Z [debug] OnStoppedLeading() called +2022-10-12T12:12:40Z [debug] Finished leader election +2022-10-12T12:12:40Z [debug] IPManagement: {148.14.25.1 ffffff00}, +I1012 12:12:40.588289 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:03.7 ifName:eth2} {vfDeviceID:0000:18:06.7 ifName:} {vfDeviceID:0000:18:05.3 ifName:}] +I1012 12:12:40.660277 1 sriov.go:118] Configured interfaces for container e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da; hostIface: {Name:ens785f0v47 Mac:7a:f8:bb:ea:1d:91 Sandbox:}, containerIface: {Name:eth3 Mac:7a:f8:bb:ea:1d:91 Sandbox:/host/proc/3283590/ns/net} +I1012 12:12:40.660358 1 controller.go:444] "INTEL - networklist ITERATED" +2022-10-12T12:12:40Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec3 PodNamespace:kube-system} +2022-10-12T12:12:40Z [debug] Beginning IPAM for ContainerID: edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb +2022-10-12T12:12:40Z [debug] Started leader election +I1012 12:12:40.347637 4210 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:12:41.222943 4210 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:12:41Z [debug] OnStartedLeading() called +2022-10-12T12:12:41Z [debug] Elected as leader, do processing +2022-10-12T12:12:41Z [debug] IPManagement -- mode: 0 / containerID: edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb / podRef: kube-system/testpodsec3 +2022-10-12T12:12:41Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T12:12:41Z [debug] Reserving IP: |148.14.24.2 edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb| +2022-10-12T12:12:41Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.2 +2022-10-12T12:12:41Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.2 GenerateName: Namespace:kube-system SelfLink: UID:ea9b115b-7bec-49fd-a465-6c66a3b19b3a ResourceVersion:10074 Generation:1 CreationTimestamp:2022-10-12 12:12:41 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:12:41 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb PodRef:kube-system/testpodsec3}} +2022-10-12T12:12:41Z [debug] OnStoppedLeading() called +2022-10-12T12:12:41Z [debug] Finished leader election +2022-10-12T12:12:41Z [debug] IPManagement: {148.14.24.2 ffffff00}, +I1012 12:12:41.262511 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:04.5 ifName:} {vfDeviceID:0000:18:07.1 ifName:} {vfDeviceID:0000:18:06.0 ifName:}] +I1012 12:12:41.324387 1 sriov.go:118] Configured interfaces for container edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb; hostIface: {Name:ens785f0v29 Mac:a2:1b:21:b8:59:ea Sandbox:}, containerIface: {Name:eth4 Mac:a2:1b:21:b8:59:ea Sandbox:/host/proc/3283572/ns/net} +I1012 12:12:41.324446 1 controller.go:444] "INTEL - networklist ITERATED" +2022-10-12T12:12:40Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T12:12:40Z [debug] Beginning IPAM for ContainerID: 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed +2022-10-12T12:12:40Z [debug] Started leader election +I1012 12:12:40.333157 4199 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +E1012 12:12:40.348292 4199 leaderelection.go:367] Failed to update lock: Operation cannot be fulfilled on leases.coordination.k8s.io "whereabouts": the object has been modified; please apply your changes to the latest version and try again +E1012 12:12:41.223926 4199 leaderelection.go:367] Failed to update lock: Operation cannot be fulfilled on leases.coordination.k8s.io "whereabouts": the object has been modified; please apply your changes to the latest version and try again +I1012 12:12:42.305395 4199 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:12:42Z [debug] OnStartedLeading() called +2022-10-12T12:12:42Z [debug] Elected as leader, do processing +2022-10-12T12:12:42Z [debug] IPManagement -- mode: 0 / containerID: 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed / podRef: kube-system/testpodsec1 +2022-10-12T12:12:42Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T12:12:42Z [debug] Reserving IP: |148.14.24.3 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed| +2022-10-12T12:12:42Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.3 +2022-10-12T12:12:42Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.3 GenerateName: Namespace:kube-system SelfLink: UID:13605e6d-6204-4e02-9617-3fe64c1e5eb8 ResourceVersion:10081 Generation:1 CreationTimestamp:2022-10-12 12:12:42 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:12:42 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed PodRef:kube-system/testpodsec1}} +2022-10-12T12:12:42Z [debug] OnStoppedLeading() called +2022-10-12T12:12:42Z [debug] Finished leader election +2022-10-12T12:12:42Z [debug] IPManagement: {148.14.24.3 ffffff00}, +I1012 12:12:42.346815 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:01.0 ifName:} {vfDeviceID:0000:18:07.5 ifName:} {vfDeviceID:0000:18:04.6 ifName:}] +I1012 12:12:42.412184 1 sriov.go:118] Configured interfaces for container 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed; hostIface: {Name:ens785f0v0 Mac:92:70:ea:e7:0e:fd Sandbox:}, containerIface: {Name:eth1 Mac:92:70:ea:e7:0e:fd Sandbox:/host/proc/3283583/ns/net} +I1012 12:12:42.412265 1 controller.go:444] "INTEL - networklist ITERATED" +I1012 12:12:42.412306 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net2 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:12:42.416914 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:7d1f7d37-57cd-475e-a117-5f4c8b473f0e ResourceVersion:9962 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > Pod="kube-system/testpodsec1" +I1012 12:12:42.417034 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:7d1f7d37-57cd-475e-a117-5f4c8b473f0e ResourceVersion:9962 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > +I1012 12:12:42.417134 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.25.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net2\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:12:42.417178 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:12:42.417199 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T12:12:42Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T12:12:42Z [debug] Beginning IPAM for ContainerID: 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed +2022-10-12T12:12:42Z [debug] Started leader election +I1012 12:12:42.486865 4312 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:12:42.498445 4312 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:12:42Z [debug] OnStartedLeading() called +2022-10-12T12:12:42Z [debug] Elected as leader, do processing +2022-10-12T12:12:42Z [debug] IPManagement -- mode: 0 / containerID: 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed / podRef: kube-system/testpodsec1 +2022-10-12T12:12:42Z [debug] IterateForAssignment input >> ip: 148.14.25.0 | ipnet: {148.14.25.0 ffffff00} | first IP: 148.14.25.1 | last IP: 148.14.25.254 +2022-10-12T12:12:42Z [debug] Reserving IP: |148.14.25.2 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed| +2022-10-12T12:12:42Z [debug] OverlappingRangewide allocation check for IP: 148.14.25.2 +2022-10-12T12:12:42Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.2 GenerateName: Namespace:kube-system SelfLink: UID:ba9faf8f-8961-4e54-8ded-e505aefd9684 ResourceVersion:10086 Generation:1 CreationTimestamp:2022-10-12 12:12:42 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:12:42 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed PodRef:kube-system/testpodsec1}} +2022-10-12T12:12:42Z [debug] OnStoppedLeading() called +2022-10-12T12:12:42Z [debug] Finished leader election +2022-10-12T12:12:42Z [debug] IPManagement: {148.14.25.2 ffffff00}, +I1012 12:12:42.532961 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:01.0 ifName:eth1} {vfDeviceID:0000:18:07.5 ifName:} {vfDeviceID:0000:18:04.6 ifName:}] +I1012 12:12:42.600356 1 sriov.go:118] Configured interfaces for container 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed; hostIface: {Name:ens785f0v53 Mac:5a:3e:03:40:80:80 Sandbox:}, containerIface: {Name:eth2 Mac:5a:3e:03:40:80:80 Sandbox:/host/proc/3283583/ns/net} +I1012 12:12:42.600419 1 controller.go:444] "INTEL - networklist ITERATED" +I1012 12:12:49.697542 1 server.go:539] Received CmdDel request cni_args:{container_id:"ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50" netns:"/proc/3277699/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec1;K8S_POD_INFRA_CONTAINER_ID=ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:12:49.703907 1 server.go:563] Deleted IP addresses for container ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50 +I1012 12:12:49.705773 1 pod_configuration.go:537] Removed interfaces for container ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50 +I1012 12:12:49.779443 1 server.go:569] CmdDel for container ba54ac6c0029fbbeae999eac3d75806507b36b16fb3fd4638cbc3e6624644f50 succeeded +I1012 12:12:49.785841 1 server.go:539] Received CmdDel request cni_args:{container_id:"1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8" netns:"/proc/3277680/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec2;K8S_POD_INFRA_CONTAINER_ID=1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:12:49.791949 1 server.go:563] Deleted IP addresses for container 1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8 +I1012 12:12:49.793440 1 pod_configuration.go:537] Removed interfaces for container 1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8 +I1012 12:12:49.895470 1 server.go:569] CmdDel for container 1b6436c91ebf82287b741960586ee756034055948a72bc80bafc52573cf1f9c8 succeeded +I1012 12:12:49.947053 1 server.go:539] Received CmdDel request cni_args:{container_id:"4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c" netns:"/proc/3277670/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec3;K8S_POD_INFRA_CONTAINER_ID=4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:12:49.952943 1 server.go:563] Deleted IP addresses for container 4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c +I1012 12:12:49.954466 1 pod_configuration.go:537] Removed interfaces for container 4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c +I1012 12:12:50.008323 1 server.go:569] CmdDel for container 4802fb637ae4b897984fca0e5e27565b61d225957cbd6a02702efd6ac0b7b99c succeeded +I1012 12:13:47.528637 1 controller.go:269] "Secondary network already configured on this Pod and annotation update not supported, skipping update" pod="kube-system/testpodsec2" +I1012 12:13:47.528692 1 controller.go:269] "Secondary network already configured on this Pod and annotation update not supported, skipping update" pod="kube-system/testpodsec1" +I1012 12:13:48.578776 1 controller.go:269] "Secondary network already configured on this Pod and annotation update not supported, skipping update" pod="kube-system/testpodsec3" +I1012 12:16:06.334734 1 controller.go:269] "Secondary network already configured on this Pod and annotation update not supported, skipping update" pod="kube-system/testpodsec1" +I1012 12:16:06.458094 1 controller.go:269] "Secondary network already configured on this Pod and annotation update not supported, skipping update" pod="kube-system/testpodsec2" +2022-10-12T12:16:06Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T12:16:06Z [debug] Beginning delete for ContainerID: 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed +2022-10-12T12:16:06Z [debug] Started leader election +I1012 12:16:06.431951 4574 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:16:06.449050 4574 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:16:06Z [debug] OnStartedLeading() called +2022-10-12T12:16:06Z [debug] Elected as leader, do processing +2022-10-12T12:16:06Z [debug] IPManagement -- mode: 1 / containerID: 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed / podRef: kube-system/testpodsec1 +2022-10-12T12:16:06Z [debug] Deallocating given previously used IP: 148.14.24.3 +2022-10-12T12:16:06Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.3 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:16:06Z [debug] OnStoppedLeading() called +2022-10-12T12:16:06Z [debug] Finished leader election +2022-10-12T12:16:06Z [debug] IPManagement: { }, +2022-10-12T12:16:06Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T12:16:06Z [debug] Beginning delete for ContainerID: e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da +2022-10-12T12:16:06Z [debug] Started leader election +I1012 12:16:06.531536 4601 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:16:06.540026 4601 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:16:06Z [debug] OnStartedLeading() called +2022-10-12T12:16:06Z [debug] Elected as leader, do processing +2022-10-12T12:16:06Z [debug] IPManagement -- mode: 1 / containerID: e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da / podRef: kube-system/testpodsec2 +2022-10-12T12:16:06Z [debug] Deallocating given previously used IP: 148.14.24.1 +2022-10-12T12:16:06Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.1 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:16:06Z [debug] OnStoppedLeading() called +2022-10-12T12:16:06Z [debug] Finished leader election +2022-10-12T12:16:06Z [debug] IPManagement: { }, +I1012 12:16:06.577753 1 controller.go:269] "Secondary network already configured on this Pod and annotation update not supported, skipping update" pod="kube-system/testpodsec3" +2022-10-12T12:16:06Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T12:16:06Z [debug] Beginning delete for ContainerID: e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da +2022-10-12T12:16:06Z [debug] Started leader election +I1012 12:16:06.647111 4658 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:16:06.656126 4658 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:16:06Z [debug] OnStartedLeading() called +2022-10-12T12:16:06Z [debug] Elected as leader, do processing +2022-10-12T12:16:06Z [debug] IPManagement -- mode: 1 / containerID: e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da / podRef: kube-system/testpodsec2 +2022-10-12T12:16:06Z [debug] Deallocating given previously used IP: 148.14.25.1 +2022-10-12T12:16:06Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.1 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:16:06Z [debug] OnStoppedLeading() called +2022-10-12T12:16:06Z [debug] Finished leader election +2022-10-12T12:16:06Z [debug] IPManagement: { }, +I1012 12:16:06.685128 1 controller.go:154] "Pod VF Cache cleared" pod="kube-system/testpodsec2" +2022-10-12T12:16:06Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T12:16:06Z [debug] Beginning delete for ContainerID: 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed +2022-10-12T12:16:06Z [debug] Started leader election +I1012 12:16:06.555659 4609 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:16:07.440189 4609 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:16:07Z [debug] OnStartedLeading() called +2022-10-12T12:16:07Z [debug] Elected as leader, do processing +2022-10-12T12:16:07Z [debug] IPManagement -- mode: 1 / containerID: 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed / podRef: kube-system/testpodsec1 +2022-10-12T12:16:07Z [debug] Deallocating given previously used IP: 148.14.25.2 +2022-10-12T12:16:07Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.2 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:16:07Z [debug] OnStoppedLeading() called +2022-10-12T12:16:07Z [debug] Finished leader election +2022-10-12T12:16:07Z [debug] IPManagement: { }, +I1012 12:16:07.473221 1 controller.go:154] "Pod VF Cache cleared" pod="kube-system/testpodsec1" +2022-10-12T12:16:06Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec3 PodNamespace:kube-system} +2022-10-12T12:16:06Z [debug] Beginning delete for ContainerID: edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb +2022-10-12T12:16:06Z [debug] Started leader election +I1012 12:16:06.658922 4659 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:16:07.533851 4659 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:16:07Z [debug] OnStartedLeading() called +2022-10-12T12:16:07Z [debug] Elected as leader, do processing +2022-10-12T12:16:07Z [debug] IPManagement -- mode: 1 / containerID: edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb / podRef: kube-system/testpodsec3 +2022-10-12T12:16:07Z [debug] Deallocating given previously used IP: 148.14.24.2 +2022-10-12T12:16:07Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.2 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:16:07Z [debug] OnStoppedLeading() called +2022-10-12T12:16:07Z [debug] Finished leader election +2022-10-12T12:16:07Z [debug] IPManagement: { }, +I1012 12:16:07.566213 1 controller.go:154] "Pod VF Cache cleared" pod="kube-system/testpodsec3" +I1012 12:16:36.518583 1 server.go:539] Received CmdDel request cni_args:{container_id:"62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed" netns:"/proc/3283583/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec1;K8S_POD_INFRA_CONTAINER_ID=62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:16:36.524608 1 server.go:563] Deleted IP addresses for container 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed +I1012 12:16:36.526384 1 pod_configuration.go:537] Removed interfaces for container 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed +I1012 12:16:36.595934 1 server.go:539] Received CmdDel request cni_args:{container_id:"e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da" netns:"/proc/3283590/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec2;K8S_POD_INFRA_CONTAINER_ID=e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:16:36.601784 1 server.go:563] Deleted IP addresses for container e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da +I1012 12:16:36.603311 1 pod_configuration.go:537] Removed interfaces for container e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da +I1012 12:16:36.695385 1 server.go:569] CmdDel for container e18a202cf19973b85b71db11957e3b4b3ff0ff5f49e30212fda765ecf06d84da succeeded +I1012 12:16:36.728038 1 server.go:539] Received CmdDel request cni_args:{container_id:"edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb" netns:"/proc/3283572/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec3;K8S_POD_INFRA_CONTAINER_ID=edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:16:36.734040 1 server.go:563] Deleted IP addresses for container edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb +I1012 12:16:36.735597 1 pod_configuration.go:537] Removed interfaces for container edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb +I1012 12:16:36.831381 1 server.go:569] CmdDel for container edddd4f04be1385f17710c41ca5291416cad3abf6d0c2212e1f9bd602229a9cb succeeded +I1012 12:16:36.855297 1 server.go:569] CmdDel for container 62b89a9ba0590a5b00cfd5d06a578e210edb78002069945c4c309bf8e46259ed succeeded +I1012 12:25:38.994751 1 server.go:425] Received CmdAdd request cni_args:{container_id:"fbaf8b1aa05c82712afebf84f4578c71fdd683820a91c8434f36291c0db2d473" netns:"/proc/3297384/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec2;K8S_POD_INFRA_CONTAINER_ID=fbaf8b1aa05c82712afebf84f4578c71fdd683820a91c8434f36291c0db2d473" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:25:39.000828 1 server.go:495] "Allocated IP addresses" container="fbaf8b1aa05c82712afebf84f4578c71fdd683820a91c8434f36291c0db2d473" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.94 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 12:25:39.005561 1 server.go:425] Received CmdAdd request cni_args:{container_id:"7993e1055160d42a8e8b92914f3deaf98f42e47d7f68d593c2ca2c969cbfbb20" netns:"/proc/3297368/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec1;K8S_POD_INFRA_CONTAINER_ID=7993e1055160d42a8e8b92914f3deaf98f42e47d7f68d593c2ca2c969cbfbb20" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:25:39.008698 1 server.go:425] Received CmdAdd request cni_args:{container_id:"4cdc93eed6e6fc074a0853dbfffa6277cfc4c1ff63a48ebb5ab7b6a07e0cb016" netns:"/proc/3297356/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec3;K8S_POD_INFRA_CONTAINER_ID=4cdc93eed6e6fc074a0853dbfffa6277cfc4c1ff63a48ebb5ab7b6a07e0cb016" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:25:39.011726 1 server.go:495] "Allocated IP addresses" container="7993e1055160d42a8e8b92914f3deaf98f42e47d7f68d593c2ca2c969cbfbb20" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.95 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 12:25:39.014655 1 server.go:495] "Allocated IP addresses" container="4cdc93eed6e6fc074a0853dbfffa6277cfc4c1ff63a48ebb5ab7b6a07e0cb016" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.96 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 12:25:39.150539 1 pod_configuration.go:265] Configured interfaces for container fbaf8b1aa05c82712afebf84f4578c71fdd683820a91c8434f36291c0db2d473 +I1012 12:25:39.150578 1 server.go:522] CmdAdd for container fbaf8b1aa05c82712afebf84f4578c71fdd683820a91c8434f36291c0db2d473 succeeded +I1012 12:25:39.150614 1 pod_configuration.go:265] Configured interfaces for container 4cdc93eed6e6fc074a0853dbfffa6277cfc4c1ff63a48ebb5ab7b6a07e0cb016 +I1012 12:25:39.150645 1 server.go:522] CmdAdd for container 4cdc93eed6e6fc074a0853dbfffa6277cfc4c1ff63a48ebb5ab7b6a07e0cb016 succeeded +I1012 12:25:39.150678 1 pod_configuration.go:265] Configured interfaces for container 7993e1055160d42a8e8b92914f3deaf98f42e47d7f68d593c2ca2c969cbfbb20 +I1012 12:25:39.150707 1 server.go:522] CmdAdd for container 7993e1055160d42a8e8b92914f3deaf98f42e47d7f68d593c2ca2c969cbfbb20 succeeded +I1012 12:25:40.163805 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:25:40.173953 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:25:40.175066 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec2" +I1012 12:25:40.175176 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 12:25:40.175270 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:25:40.175318 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:25:40.175339 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +I1012 12:25:40.177417 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec3" +I1012 12:25:40.177511 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 12:25:40.177594 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:25:40.177638 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:25:40.177657 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +I1012 12:25:40.188263 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:25:40.192359 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec1" +I1012 12:25:40.192457 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 12:25:40.192547 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:25:40.192591 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:25:40.192607 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T12:25:40Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec3 PodNamespace:kube-system} +2022-10-12T12:25:40Z [debug] Beginning IPAM for ContainerID: 4cdc93eed6e6fc074a0853dbfffa6277cfc4c1ff63a48ebb5ab7b6a07e0cb016 +2022-10-12T12:25:40Z [debug] Started leader election +I1012 12:25:40.250921 5335 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:25:40.266053 5335 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:25:40Z [debug] OnStartedLeading() called +2022-10-12T12:25:40Z [debug] Elected as leader, do processing +2022-10-12T12:25:40Z [debug] IPManagement -- mode: 0 / containerID: 4cdc93eed6e6fc074a0853dbfffa6277cfc4c1ff63a48ebb5ab7b6a07e0cb016 / podRef: kube-system/testpodsec3 +2022-10-12T12:25:40Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T12:25:40Z [debug] Reserving IP: |148.14.24.1 4cdc93eed6e6fc074a0853dbfffa6277cfc4c1ff63a48ebb5ab7b6a07e0cb016| +2022-10-12T12:25:40Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.1 +2022-10-12T12:25:40Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.1 GenerateName: Namespace:kube-system SelfLink: UID:d57aa93c-c9fa-4e40-912d-babcf0125156 ResourceVersion:11208 Generation:1 CreationTimestamp:2022-10-12 12:25:40 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:25:40 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:4cdc93eed6e6fc074a0853dbfffa6277cfc4c1ff63a48ebb5ab7b6a07e0cb016 PodRef:kube-system/testpodsec3}} +2022-10-12T12:25:40Z [debug] OnStoppedLeading() called +2022-10-12T12:25:40Z [debug] Finished leader election +2022-10-12T12:25:40Z [debug] IPManagement: {148.14.24.1 ffffff00}, +I1012 12:25:40.305608 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:01.6 ifName:} {vfDeviceID:0000:18:01.5 ifName:} {vfDeviceID:0000:18:04.0 ifName:}] +I1012 12:25:40.376439 1 sriov.go:118] Configured interfaces for container 4cdc93eed6e6fc074a0853dbfffa6277cfc4c1ff63a48ebb5ab7b6a07e0cb016; hostIface: {Name:ens785f0v6 Mac:fe:da:f2:f8:4b:77 Sandbox:}, containerIface: {Name:eth4 Mac:fe:da:f2:f8:4b:77 Sandbox:/host/proc/3297356/ns/net} +I1012 12:25:40.376512 1 controller.go:444] "INTEL - networklist ITERATED" +2022-10-12T12:25:40Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T12:25:40Z [debug] Beginning IPAM for ContainerID: fbaf8b1aa05c82712afebf84f4578c71fdd683820a91c8434f36291c0db2d473 +2022-10-12T12:25:40Z [debug] Started leader election +I1012 12:25:40.272140 5334 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:25:41.153353 5334 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:25:41Z [debug] OnStartedLeading() called +2022-10-12T12:25:41Z [debug] Elected as leader, do processing +2022-10-12T12:25:41Z [debug] IPManagement -- mode: 0 / containerID: fbaf8b1aa05c82712afebf84f4578c71fdd683820a91c8434f36291c0db2d473 / podRef: kube-system/testpodsec2 +2022-10-12T12:25:41Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T12:25:41Z [debug] Reserving IP: |148.14.24.2 fbaf8b1aa05c82712afebf84f4578c71fdd683820a91c8434f36291c0db2d473| +2022-10-12T12:25:41Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.2 +2022-10-12T12:25:41Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.2 GenerateName: Namespace:kube-system SelfLink: UID:f5494b24-0e6f-4ed1-bdb0-c8d18629e157 ResourceVersion:11213 Generation:1 CreationTimestamp:2022-10-12 12:25:41 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:25:41 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:fbaf8b1aa05c82712afebf84f4578c71fdd683820a91c8434f36291c0db2d473 PodRef:kube-system/testpodsec2}} +2022-10-12T12:25:41Z [debug] OnStoppedLeading() called +2022-10-12T12:25:41Z [debug] Finished leader election +2022-10-12T12:25:41Z [debug] IPManagement: {148.14.24.2 ffffff00}, +I1012 12:25:41.190393 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:02.0 ifName:} {vfDeviceID:0000:18:03.6 ifName:} {vfDeviceID:0000:18:03.0 ifName:}] +I1012 12:25:41.272340 1 sriov.go:118] Configured interfaces for container fbaf8b1aa05c82712afebf84f4578c71fdd683820a91c8434f36291c0db2d473; hostIface: {Name:ens785f0v8 Mac:8a:06:e6:9c:d9:de Sandbox:}, containerIface: {Name:eth2 Mac:8a:06:e6:9c:d9:de Sandbox:/host/proc/3297384/ns/net} +I1012 12:25:41.272420 1 controller.go:444] "INTEL - networklist ITERATED" +I1012 12:25:41.272460 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net2 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth3 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:25:41.277259 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:7d1f7d37-57cd-475e-a117-5f4c8b473f0e ResourceVersion:9962 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > Pod="kube-system/testpodsec2" +I1012 12:25:41.277355 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:7d1f7d37-57cd-475e-a117-5f4c8b473f0e ResourceVersion:9962 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > +I1012 12:25:41.277443 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.25.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net2\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:25:41.277491 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:25:41.277512 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T12:25:41Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T12:25:41Z [debug] Beginning IPAM for ContainerID: fbaf8b1aa05c82712afebf84f4578c71fdd683820a91c8434f36291c0db2d473 +2022-10-12T12:25:41Z [debug] Started leader election +I1012 12:25:41.351508 5429 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:25:41.361832 5429 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:25:41Z [debug] OnStartedLeading() called +2022-10-12T12:25:41Z [debug] Elected as leader, do processing +2022-10-12T12:25:41Z [debug] IPManagement -- mode: 0 / containerID: fbaf8b1aa05c82712afebf84f4578c71fdd683820a91c8434f36291c0db2d473 / podRef: kube-system/testpodsec2 +2022-10-12T12:25:41Z [debug] IterateForAssignment input >> ip: 148.14.25.0 | ipnet: {148.14.25.0 ffffff00} | first IP: 148.14.25.1 | last IP: 148.14.25.254 +2022-10-12T12:25:41Z [debug] Reserving IP: |148.14.25.1 fbaf8b1aa05c82712afebf84f4578c71fdd683820a91c8434f36291c0db2d473| +2022-10-12T12:25:41Z [debug] OverlappingRangewide allocation check for IP: 148.14.25.1 +2022-10-12T12:25:41Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.1 GenerateName: Namespace:kube-system SelfLink: UID:76d0eeea-911d-403a-9019-8189c5f40c29 ResourceVersion:11218 Generation:1 CreationTimestamp:2022-10-12 12:25:41 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:25:41 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:fbaf8b1aa05c82712afebf84f4578c71fdd683820a91c8434f36291c0db2d473 PodRef:kube-system/testpodsec2}} +2022-10-12T12:25:41Z [debug] OnStoppedLeading() called +2022-10-12T12:25:41Z [debug] Finished leader election +2022-10-12T12:25:41Z [debug] IPManagement: {148.14.25.1 ffffff00}, +I1012 12:25:41.397869 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:02.0 ifName:eth2} {vfDeviceID:0000:18:03.6 ifName:} {vfDeviceID:0000:18:03.0 ifName:}] +I1012 12:25:41.476221 1 sriov.go:118] Configured interfaces for container fbaf8b1aa05c82712afebf84f4578c71fdd683820a91c8434f36291c0db2d473; hostIface: {Name:ens785f0v22 Mac:b6:eb:f3:3a:df:8e Sandbox:}, containerIface: {Name:eth3 Mac:b6:eb:f3:3a:df:8e Sandbox:/host/proc/3297384/ns/net} +I1012 12:25:41.476289 1 controller.go:444] "INTEL - networklist ITERATED" +2022-10-12T12:25:40Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T12:25:40Z [debug] Beginning IPAM for ContainerID: 7993e1055160d42a8e8b92914f3deaf98f42e47d7f68d593c2ca2c969cbfbb20 +2022-10-12T12:25:40Z [debug] Started leader election +I1012 12:25:40.271864 5345 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +E1012 12:25:41.155526 5345 leaderelection.go:367] Failed to update lock: Operation cannot be fulfilled on leases.coordination.k8s.io "whereabouts": the object has been modified; please apply your changes to the latest version and try again +I1012 12:25:42.235516 5345 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:25:42Z [debug] OnStartedLeading() called +2022-10-12T12:25:42Z [debug] Elected as leader, do processing +2022-10-12T12:25:42Z [debug] IPManagement -- mode: 0 / containerID: 7993e1055160d42a8e8b92914f3deaf98f42e47d7f68d593c2ca2c969cbfbb20 / podRef: kube-system/testpodsec1 +2022-10-12T12:25:42Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T12:25:42Z [debug] Reserving IP: |148.14.24.3 7993e1055160d42a8e8b92914f3deaf98f42e47d7f68d593c2ca2c969cbfbb20| +2022-10-12T12:25:42Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.3 +2022-10-12T12:25:42Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.3 GenerateName: Namespace:kube-system SelfLink: UID:bdab564e-3275-401f-bdbf-064a9eefbcc6 ResourceVersion:11225 Generation:1 CreationTimestamp:2022-10-12 12:25:42 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:25:42 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:7993e1055160d42a8e8b92914f3deaf98f42e47d7f68d593c2ca2c969cbfbb20 PodRef:kube-system/testpodsec1}} +2022-10-12T12:25:42Z [debug] OnStoppedLeading() called +2022-10-12T12:25:42Z [debug] Finished leader election +2022-10-12T12:25:42Z [debug] IPManagement: {148.14.24.3 ffffff00}, +I1012 12:25:42.279273 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:06.1 ifName:} {vfDeviceID:0000:18:08.0 ifName:} {vfDeviceID:0000:18:02.6 ifName:}] +I1012 12:25:42.356301 1 sriov.go:118] Configured interfaces for container 7993e1055160d42a8e8b92914f3deaf98f42e47d7f68d593c2ca2c969cbfbb20; hostIface: {Name:ens785f0v41 Mac:46:60:46:9e:01:eb Sandbox:}, containerIface: {Name:eth1 Mac:46:60:46:9e:01:eb Sandbox:/host/proc/3297368/ns/net} +I1012 12:25:42.356361 1 controller.go:444] "INTEL - networklist ITERATED" +I1012 12:25:42.356401 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net2 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:25:42.361169 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:7d1f7d37-57cd-475e-a117-5f4c8b473f0e ResourceVersion:9962 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > Pod="kube-system/testpodsec1" +I1012 12:25:42.361258 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:7d1f7d37-57cd-475e-a117-5f4c8b473f0e ResourceVersion:9962 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > +I1012 12:25:42.361355 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.25.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net2\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:25:42.361407 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:25:42.361424 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T12:25:42Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T12:25:42Z [debug] Beginning IPAM for ContainerID: 7993e1055160d42a8e8b92914f3deaf98f42e47d7f68d593c2ca2c969cbfbb20 +2022-10-12T12:25:42Z [debug] Started leader election +I1012 12:25:42.435515 5456 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:25:42.445545 5456 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:25:42Z [debug] OnStartedLeading() called +2022-10-12T12:25:42Z [debug] Elected as leader, do processing +2022-10-12T12:25:42Z [debug] IPManagement -- mode: 0 / containerID: 7993e1055160d42a8e8b92914f3deaf98f42e47d7f68d593c2ca2c969cbfbb20 / podRef: kube-system/testpodsec1 +2022-10-12T12:25:42Z [debug] IterateForAssignment input >> ip: 148.14.25.0 | ipnet: {148.14.25.0 ffffff00} | first IP: 148.14.25.1 | last IP: 148.14.25.254 +2022-10-12T12:25:42Z [debug] Reserving IP: |148.14.25.2 7993e1055160d42a8e8b92914f3deaf98f42e47d7f68d593c2ca2c969cbfbb20| +2022-10-12T12:25:42Z [debug] OverlappingRangewide allocation check for IP: 148.14.25.2 +2022-10-12T12:25:42Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.2 GenerateName: Namespace:kube-system SelfLink: UID:a31caa4b-2a3b-45fe-a71c-5e08342e8ace ResourceVersion:11230 Generation:1 CreationTimestamp:2022-10-12 12:25:42 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:25:42 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:7993e1055160d42a8e8b92914f3deaf98f42e47d7f68d593c2ca2c969cbfbb20 PodRef:kube-system/testpodsec1}} +2022-10-12T12:25:42Z [debug] OnStoppedLeading() called +2022-10-12T12:25:42Z [debug] Finished leader election +2022-10-12T12:25:42Z [debug] IPManagement: {148.14.25.2 ffffff00}, +I1012 12:25:42.481207 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:06.1 ifName:eth1} {vfDeviceID:0000:18:08.0 ifName:} {vfDeviceID:0000:18:02.6 ifName:}] +I1012 12:25:42.564288 1 sriov.go:118] Configured interfaces for container 7993e1055160d42a8e8b92914f3deaf98f42e47d7f68d593c2ca2c969cbfbb20; hostIface: {Name:ens785f0v56 Mac:7a:78:a6:0f:a1:02 Sandbox:}, containerIface: {Name:eth2 Mac:7a:78:a6:0f:a1:02 Sandbox:/host/proc/3297368/ns/net} +I1012 12:25:42.564353 1 controller.go:444] "INTEL - networklist ITERATED" +I1012 12:32:54.656740 1 controller.go:269] "Secondary network already configured on this Pod and annotation update not supported, skipping update" pod="kube-system/testpodsec1" +I1012 12:32:54.779618 1 controller.go:269] "Secondary network already configured on this Pod and annotation update not supported, skipping update" pod="kube-system/testpodsec2" +2022-10-12T12:32:54Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T12:32:54Z [debug] Beginning delete for ContainerID: 7993e1055160d42a8e8b92914f3deaf98f42e47d7f68d593c2ca2c969cbfbb20 +2022-10-12T12:32:54Z [debug] Started leader election +I1012 12:32:54.745750 5953 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:32:54.758183 5953 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:32:54Z [debug] OnStartedLeading() called +2022-10-12T12:32:54Z [debug] Elected as leader, do processing +2022-10-12T12:32:54Z [debug] IPManagement -- mode: 1 / containerID: 7993e1055160d42a8e8b92914f3deaf98f42e47d7f68d593c2ca2c969cbfbb20 / podRef: kube-system/testpodsec1 +2022-10-12T12:32:54Z [debug] Deallocating given previously used IP: 148.14.24.3 +2022-10-12T12:32:54Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.3 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:32:54Z [debug] OnStoppedLeading() called +2022-10-12T12:32:54Z [debug] Finished leader election +2022-10-12T12:32:54Z [debug] IPManagement: { }, +2022-10-12T12:32:54Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T12:32:54Z [debug] Beginning delete for ContainerID: fbaf8b1aa05c82712afebf84f4578c71fdd683820a91c8434f36291c0db2d473 +2022-10-12T12:32:54Z [debug] Started leader election +I1012 12:32:54.856419 5982 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:32:54.866349 5982 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:32:54Z [debug] OnStartedLeading() called +2022-10-12T12:32:54Z [debug] Elected as leader, do processing +2022-10-12T12:32:54Z [debug] IPManagement -- mode: 1 / containerID: fbaf8b1aa05c82712afebf84f4578c71fdd683820a91c8434f36291c0db2d473 / podRef: kube-system/testpodsec2 +2022-10-12T12:32:54Z [debug] Deallocating given previously used IP: 148.14.24.2 +2022-10-12T12:32:54Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.2 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:32:54Z [debug] OnStoppedLeading() called +2022-10-12T12:32:54Z [debug] Finished leader election +2022-10-12T12:32:54Z [debug] IPManagement: { }, +I1012 12:32:54.897796 1 controller.go:269] "Secondary network already configured on this Pod and annotation update not supported, skipping update" pod="kube-system/testpodsec3" +2022-10-12T12:32:54Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec3 PodNamespace:kube-system} +2022-10-12T12:32:54Z [debug] Beginning delete for ContainerID: 4cdc93eed6e6fc074a0853dbfffa6277cfc4c1ff63a48ebb5ab7b6a07e0cb016 +2022-10-12T12:32:54Z [debug] Started leader election +I1012 12:32:54.976374 6042 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:32:54.988114 6042 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:32:54Z [debug] OnStartedLeading() called +2022-10-12T12:32:54Z [debug] Elected as leader, do processing +2022-10-12T12:32:54Z [debug] IPManagement -- mode: 1 / containerID: 4cdc93eed6e6fc074a0853dbfffa6277cfc4c1ff63a48ebb5ab7b6a07e0cb016 / podRef: kube-system/testpodsec3 +2022-10-12T12:32:54Z [debug] Deallocating given previously used IP: 148.14.24.1 +2022-10-12T12:32:55Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.1 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:32:55Z [debug] OnStoppedLeading() called +2022-10-12T12:32:55Z [debug] Finished leader election +2022-10-12T12:32:55Z [debug] IPManagement: { }, +I1012 12:32:55.015709 1 controller.go:154] "Pod VF Cache cleared" pod="kube-system/testpodsec3" +2022-10-12T12:32:54Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T12:32:54Z [debug] Beginning delete for ContainerID: 7993e1055160d42a8e8b92914f3deaf98f42e47d7f68d593c2ca2c969cbfbb20 +2022-10-12T12:32:54Z [debug] Started leader election +I1012 12:32:54.868941 5987 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:32:55.750775 5987 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:32:55Z [debug] OnStartedLeading() called +2022-10-12T12:32:55Z [debug] Elected as leader, do processing +2022-10-12T12:32:55Z [debug] IPManagement -- mode: 1 / containerID: 7993e1055160d42a8e8b92914f3deaf98f42e47d7f68d593c2ca2c969cbfbb20 / podRef: kube-system/testpodsec1 +2022-10-12T12:32:55Z [debug] Deallocating given previously used IP: 148.14.25.2 +2022-10-12T12:32:55Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.2 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:32:55Z [debug] OnStoppedLeading() called +2022-10-12T12:32:55Z [debug] Finished leader election +2022-10-12T12:32:55Z [debug] IPManagement: { }, +I1012 12:32:55.787219 1 controller.go:154] "Pod VF Cache cleared" pod="kube-system/testpodsec1" +2022-10-12T12:32:54Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T12:32:54Z [debug] Beginning delete for ContainerID: fbaf8b1aa05c82712afebf84f4578c71fdd683820a91c8434f36291c0db2d473 +2022-10-12T12:32:54Z [debug] Started leader election +I1012 12:32:54.976492 6036 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +E1012 12:32:54.989522 6036 leaderelection.go:367] Failed to update lock: Operation cannot be fulfilled on leases.coordination.k8s.io "whereabouts": the object has been modified; please apply your changes to the latest version and try again +I1012 12:32:55.860654 6036 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:32:55Z [debug] OnStartedLeading() called +2022-10-12T12:32:55Z [debug] Elected as leader, do processing +2022-10-12T12:32:55Z [debug] IPManagement -- mode: 1 / containerID: fbaf8b1aa05c82712afebf84f4578c71fdd683820a91c8434f36291c0db2d473 / podRef: kube-system/testpodsec2 +2022-10-12T12:32:55Z [debug] Deallocating given previously used IP: 148.14.25.1 +2022-10-12T12:32:55Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.1 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:32:55Z [debug] OnStoppedLeading() called +2022-10-12T12:32:55Z [debug] Finished leader election +2022-10-12T12:32:55Z [debug] IPManagement: { }, +I1012 12:32:55.892114 1 controller.go:154] "Pod VF Cache cleared" pod="kube-system/testpodsec2" +I1012 12:33:24.834922 1 server.go:539] Received CmdDel request cni_args:{container_id:"7993e1055160d42a8e8b92914f3deaf98f42e47d7f68d593c2ca2c969cbfbb20" netns:"/proc/3297368/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec1;K8S_POD_INFRA_CONTAINER_ID=7993e1055160d42a8e8b92914f3deaf98f42e47d7f68d593c2ca2c969cbfbb20" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:33:24.840827 1 server.go:563] Deleted IP addresses for container 7993e1055160d42a8e8b92914f3deaf98f42e47d7f68d593c2ca2c969cbfbb20 +I1012 12:33:24.842688 1 pod_configuration.go:537] Removed interfaces for container 7993e1055160d42a8e8b92914f3deaf98f42e47d7f68d593c2ca2c969cbfbb20 +I1012 12:33:24.936841 1 server.go:539] Received CmdDel request cni_args:{container_id:"fbaf8b1aa05c82712afebf84f4578c71fdd683820a91c8434f36291c0db2d473" netns:"/proc/3297384/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec2;K8S_POD_INFRA_CONTAINER_ID=fbaf8b1aa05c82712afebf84f4578c71fdd683820a91c8434f36291c0db2d473" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:33:24.943025 1 server.go:563] Deleted IP addresses for container fbaf8b1aa05c82712afebf84f4578c71fdd683820a91c8434f36291c0db2d473 +I1012 12:33:24.944732 1 pod_configuration.go:537] Removed interfaces for container fbaf8b1aa05c82712afebf84f4578c71fdd683820a91c8434f36291c0db2d473 +I1012 12:33:25.019403 1 server.go:569] CmdDel for container 7993e1055160d42a8e8b92914f3deaf98f42e47d7f68d593c2ca2c969cbfbb20 succeeded +I1012 12:33:25.036711 1 server.go:539] Received CmdDel request cni_args:{container_id:"4cdc93eed6e6fc074a0853dbfffa6277cfc4c1ff63a48ebb5ab7b6a07e0cb016" netns:"/proc/3297356/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec3;K8S_POD_INFRA_CONTAINER_ID=4cdc93eed6e6fc074a0853dbfffa6277cfc4c1ff63a48ebb5ab7b6a07e0cb016" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:33:25.042431 1 server.go:563] Deleted IP addresses for container 4cdc93eed6e6fc074a0853dbfffa6277cfc4c1ff63a48ebb5ab7b6a07e0cb016 +I1012 12:33:25.044195 1 pod_configuration.go:537] Removed interfaces for container 4cdc93eed6e6fc074a0853dbfffa6277cfc4c1ff63a48ebb5ab7b6a07e0cb016 +I1012 12:33:25.135495 1 server.go:569] CmdDel for container fbaf8b1aa05c82712afebf84f4578c71fdd683820a91c8434f36291c0db2d473 succeeded +I1012 12:33:25.135516 1 server.go:569] CmdDel for container 4cdc93eed6e6fc074a0853dbfffa6277cfc4c1ff63a48ebb5ab7b6a07e0cb016 succeeded +I1012 12:33:50.724591 1 server.go:425] Received CmdAdd request cni_args:{container_id:"ee261b15f2ae73bdb4c43f68b6f764413491028a7b080f7554b45a69d67ef052" netns:"/proc/3307384/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec3;K8S_POD_INFRA_CONTAINER_ID=ee261b15f2ae73bdb4c43f68b6f764413491028a7b080f7554b45a69d67ef052" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:33:50.731065 1 server.go:495] "Allocated IP addresses" container="ee261b15f2ae73bdb4c43f68b6f764413491028a7b080f7554b45a69d67ef052" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.97 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 12:33:50.732365 1 server.go:425] Received CmdAdd request cni_args:{container_id:"b8ae73ef1f9b58fba2607dd7e2fafcb3179d87c3370f1cd0fa2a3d47842143b0" netns:"/proc/3307352/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec2;K8S_POD_INFRA_CONTAINER_ID=b8ae73ef1f9b58fba2607dd7e2fafcb3179d87c3370f1cd0fa2a3d47842143b0" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:33:50.737301 1 server.go:425] Received CmdAdd request cni_args:{container_id:"71e657d22f15bcc350d9036df343d5ed886df9cd0de2be44c59eef3615e86396" netns:"/proc/3307364/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec1;K8S_POD_INFRA_CONTAINER_ID=71e657d22f15bcc350d9036df343d5ed886df9cd0de2be44c59eef3615e86396" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:33:50.738527 1 server.go:495] "Allocated IP addresses" container="b8ae73ef1f9b58fba2607dd7e2fafcb3179d87c3370f1cd0fa2a3d47842143b0" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.98 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 12:33:50.744325 1 server.go:495] "Allocated IP addresses" container="71e657d22f15bcc350d9036df343d5ed886df9cd0de2be44c59eef3615e86396" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.99 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 12:33:50.908970 1 pod_configuration.go:265] Configured interfaces for container ee261b15f2ae73bdb4c43f68b6f764413491028a7b080f7554b45a69d67ef052 +I1012 12:33:50.909004 1 pod_configuration.go:265] Configured interfaces for container b8ae73ef1f9b58fba2607dd7e2fafcb3179d87c3370f1cd0fa2a3d47842143b0 +I1012 12:33:50.909041 1 server.go:522] CmdAdd for container b8ae73ef1f9b58fba2607dd7e2fafcb3179d87c3370f1cd0fa2a3d47842143b0 succeeded +I1012 12:33:50.909044 1 pod_configuration.go:265] Configured interfaces for container 71e657d22f15bcc350d9036df343d5ed886df9cd0de2be44c59eef3615e86396 +I1012 12:33:50.909080 1 server.go:522] CmdAdd for container 71e657d22f15bcc350d9036df343d5ed886df9cd0de2be44c59eef3615e86396 succeeded +I1012 12:33:50.909011 1 server.go:522] CmdAdd for container ee261b15f2ae73bdb4c43f68b6f764413491028a7b080f7554b45a69d67ef052 succeeded +I1012 12:33:51.774487 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:33:51.782253 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec2" +I1012 12:33:51.782343 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 12:33:51.782435 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:33:51.782477 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:33:51.782500 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +I1012 12:33:51.785564 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:33:51.789903 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec3" +I1012 12:33:51.790017 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 12:33:51.790137 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:33:51.790201 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:33:51.790240 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +I1012 12:33:51.803393 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:33:51.807808 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec1" +I1012 12:33:51.807897 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 12:33:51.808007 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:33:51.808057 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:33:51.808075 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T12:33:51Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T12:33:51Z [debug] Beginning IPAM for ContainerID: b8ae73ef1f9b58fba2607dd7e2fafcb3179d87c3370f1cd0fa2a3d47842143b0 +2022-10-12T12:33:51Z [debug] Started leader election +I1012 12:33:51.872776 6181 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:33:51.884925 6181 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:33:51Z [debug] OnStartedLeading() called +2022-10-12T12:33:51Z [debug] Elected as leader, do processing +2022-10-12T12:33:51Z [debug] IPManagement -- mode: 0 / containerID: b8ae73ef1f9b58fba2607dd7e2fafcb3179d87c3370f1cd0fa2a3d47842143b0 / podRef: kube-system/testpodsec2 +2022-10-12T12:33:51Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T12:33:51Z [debug] Reserving IP: |148.14.24.1 b8ae73ef1f9b58fba2607dd7e2fafcb3179d87c3370f1cd0fa2a3d47842143b0| +2022-10-12T12:33:51Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.1 +2022-10-12T12:33:51Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.1 GenerateName: Namespace:kube-system SelfLink: UID:268ba05c-718f-4c40-a276-6050919dc07c ResourceVersion:11978 Generation:1 CreationTimestamp:2022-10-12 12:33:51 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:33:51 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:b8ae73ef1f9b58fba2607dd7e2fafcb3179d87c3370f1cd0fa2a3d47842143b0 PodRef:kube-system/testpodsec2}} +2022-10-12T12:33:51Z [debug] OnStoppedLeading() called +2022-10-12T12:33:51Z [debug] Finished leader election +2022-10-12T12:33:51Z [debug] IPManagement: {148.14.24.1 ffffff00}, +I1012 12:33:51.918428 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:01.5 ifName:} {vfDeviceID:0000:18:06.2 ifName:} {vfDeviceID:0000:18:07.2 ifName:}] +I1012 12:33:51.985350 1 sriov.go:118] Configured interfaces for container b8ae73ef1f9b58fba2607dd7e2fafcb3179d87c3370f1cd0fa2a3d47842143b0; hostIface: {Name:ens785f0v5 Mac:06:29:c9:fa:7e:c9 Sandbox:}, containerIface: {Name:eth2 Mac:06:29:c9:fa:7e:c9 Sandbox:/host/proc/3307352/ns/net} +I1012 12:33:51.985427 1 controller.go:444] "INTEL - networklist ITERATED" +I1012 12:33:51.985482 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net2 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth3 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:33:51.990220 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:7d1f7d37-57cd-475e-a117-5f4c8b473f0e ResourceVersion:9962 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > Pod="kube-system/testpodsec2" +I1012 12:33:51.990327 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:7d1f7d37-57cd-475e-a117-5f4c8b473f0e ResourceVersion:9962 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > +I1012 12:33:51.990425 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.25.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net2\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:33:51.990473 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:33:51.990492 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T12:33:52Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T12:33:52Z [debug] Beginning IPAM for ContainerID: b8ae73ef1f9b58fba2607dd7e2fafcb3179d87c3370f1cd0fa2a3d47842143b0 +2022-10-12T12:33:52Z [debug] Started leader election +I1012 12:33:52.065687 6263 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:33:52.075430 6263 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:33:52Z [debug] OnStartedLeading() called +2022-10-12T12:33:52Z [debug] Elected as leader, do processing +2022-10-12T12:33:52Z [debug] IPManagement -- mode: 0 / containerID: b8ae73ef1f9b58fba2607dd7e2fafcb3179d87c3370f1cd0fa2a3d47842143b0 / podRef: kube-system/testpodsec2 +2022-10-12T12:33:52Z [debug] IterateForAssignment input >> ip: 148.14.25.0 | ipnet: {148.14.25.0 ffffff00} | first IP: 148.14.25.1 | last IP: 148.14.25.254 +2022-10-12T12:33:52Z [debug] Reserving IP: |148.14.25.1 b8ae73ef1f9b58fba2607dd7e2fafcb3179d87c3370f1cd0fa2a3d47842143b0| +2022-10-12T12:33:52Z [debug] OverlappingRangewide allocation check for IP: 148.14.25.1 +2022-10-12T12:33:52Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.1 GenerateName: Namespace:kube-system SelfLink: UID:b69a7270-fc5f-492a-b545-a8386ed575ac ResourceVersion:11983 Generation:1 CreationTimestamp:2022-10-12 12:33:52 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:33:52 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:b8ae73ef1f9b58fba2607dd7e2fafcb3179d87c3370f1cd0fa2a3d47842143b0 PodRef:kube-system/testpodsec2}} +2022-10-12T12:33:52Z [debug] OnStoppedLeading() called +2022-10-12T12:33:52Z [debug] Finished leader election +2022-10-12T12:33:52Z [debug] IPManagement: {148.14.25.1 ffffff00}, +I1012 12:33:52.107382 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:01.5 ifName:eth2} {vfDeviceID:0000:18:06.2 ifName:} {vfDeviceID:0000:18:07.2 ifName:}] +I1012 12:33:52.204461 1 sriov.go:118] Configured interfaces for container b8ae73ef1f9b58fba2607dd7e2fafcb3179d87c3370f1cd0fa2a3d47842143b0; hostIface: {Name:ens785f0v42 Mac:72:f4:80:0a:c1:ef Sandbox:}, containerIface: {Name:eth3 Mac:72:f4:80:0a:c1:ef Sandbox:/host/proc/3307352/ns/net} +I1012 12:33:52.204538 1 controller.go:444] "INTEL - networklist ITERATED" +2022-10-12T12:33:51Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec3 PodNamespace:kube-system} +2022-10-12T12:33:51Z [debug] Beginning IPAM for ContainerID: ee261b15f2ae73bdb4c43f68b6f764413491028a7b080f7554b45a69d67ef052 +2022-10-12T12:33:51Z [debug] Started leader election +I1012 12:33:51.872776 6186 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +E1012 12:33:51.886587 6186 leaderelection.go:367] Failed to update lock: Operation cannot be fulfilled on leases.coordination.k8s.io "whereabouts": the object has been modified; please apply your changes to the latest version and try again +I1012 12:33:52.758413 6186 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:33:52Z [debug] OnStartedLeading() called +2022-10-12T12:33:52Z [debug] Elected as leader, do processing +2022-10-12T12:33:52Z [debug] IPManagement -- mode: 0 / containerID: ee261b15f2ae73bdb4c43f68b6f764413491028a7b080f7554b45a69d67ef052 / podRef: kube-system/testpodsec3 +2022-10-12T12:33:52Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T12:33:52Z [debug] Reserving IP: |148.14.24.2 ee261b15f2ae73bdb4c43f68b6f764413491028a7b080f7554b45a69d67ef052| +2022-10-12T12:33:52Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.2 +2022-10-12T12:33:52Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.2 GenerateName: Namespace:kube-system SelfLink: UID:823ae6a2-9c60-47b7-b587-2d49bbf45050 ResourceVersion:11990 Generation:1 CreationTimestamp:2022-10-12 12:33:52 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:33:52 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:ee261b15f2ae73bdb4c43f68b6f764413491028a7b080f7554b45a69d67ef052 PodRef:kube-system/testpodsec3}} +2022-10-12T12:33:52Z [debug] OnStoppedLeading() called +2022-10-12T12:33:52Z [debug] Finished leader election +2022-10-12T12:33:52Z [debug] IPManagement: {148.14.24.2 ffffff00}, +I1012 12:33:52.796746 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:06.4 ifName:} {vfDeviceID:0000:18:01.4 ifName:} {vfDeviceID:0000:18:03.5 ifName:}] +I1012 12:33:52.872143 1 sriov.go:118] Configured interfaces for container ee261b15f2ae73bdb4c43f68b6f764413491028a7b080f7554b45a69d67ef052; hostIface: {Name:ens785f0v44 Mac:c6:7e:33:31:3e:54 Sandbox:}, containerIface: {Name:eth4 Mac:c6:7e:33:31:3e:54 Sandbox:/host/proc/3307384/ns/net} +I1012 12:33:52.872221 1 controller.go:444] "INTEL - networklist ITERATED" +2022-10-12T12:33:51Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T12:33:51Z [debug] Beginning IPAM for ContainerID: 71e657d22f15bcc350d9036df343d5ed886df9cd0de2be44c59eef3615e86396 +2022-10-12T12:33:51Z [debug] Started leader election +I1012 12:33:51.889179 6200 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:33:53.843125 6200 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:33:53Z [debug] OnStartedLeading() called +2022-10-12T12:33:53Z [debug] Elected as leader, do processing +2022-10-12T12:33:53Z [debug] IPManagement -- mode: 0 / containerID: 71e657d22f15bcc350d9036df343d5ed886df9cd0de2be44c59eef3615e86396 / podRef: kube-system/testpodsec1 +2022-10-12T12:33:53Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T12:33:53Z [debug] Reserving IP: |148.14.24.3 71e657d22f15bcc350d9036df343d5ed886df9cd0de2be44c59eef3615e86396| +2022-10-12T12:33:53Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.3 +2022-10-12T12:33:53Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.3 GenerateName: Namespace:kube-system SelfLink: UID:c4699f89-8a6b-47bc-809b-604d2e745369 ResourceVersion:11995 Generation:1 CreationTimestamp:2022-10-12 12:33:53 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:33:53 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:71e657d22f15bcc350d9036df343d5ed886df9cd0de2be44c59eef3615e86396 PodRef:kube-system/testpodsec1}} +2022-10-12T12:33:53Z [debug] OnStoppedLeading() called +2022-10-12T12:33:53Z [debug] Finished leader election +2022-10-12T12:33:53Z [debug] IPManagement: {148.14.24.3 ffffff00}, +I1012 12:33:53.884363 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:05.5 ifName:} {vfDeviceID:0000:18:01.2 ifName:} {vfDeviceID:0000:18:05.7 ifName:}] +I1012 12:33:53.964423 1 sriov.go:118] Configured interfaces for container 71e657d22f15bcc350d9036df343d5ed886df9cd0de2be44c59eef3615e86396; hostIface: {Name:ens785f0v37 Mac:6e:90:eb:c9:0a:bc Sandbox:}, containerIface: {Name:eth1 Mac:6e:90:eb:c9:0a:bc Sandbox:/host/proc/3307364/ns/net} +I1012 12:33:53.964483 1 controller.go:444] "INTEL - networklist ITERATED" +I1012 12:33:53.964522 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net2 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:33:53.969331 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:7d1f7d37-57cd-475e-a117-5f4c8b473f0e ResourceVersion:9962 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > Pod="kube-system/testpodsec1" +I1012 12:33:53.969431 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:7d1f7d37-57cd-475e-a117-5f4c8b473f0e ResourceVersion:9962 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > +I1012 12:33:53.969526 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.25.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net2\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:33:53.969573 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:33:53.969593 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T12:33:53Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T12:33:53Z [debug] Beginning IPAM for ContainerID: 71e657d22f15bcc350d9036df343d5ed886df9cd0de2be44c59eef3615e86396 +2022-10-12T12:33:54Z [debug] Started leader election +I1012 12:33:54.040236 6290 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:33:54.050043 6290 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:33:54Z [debug] OnStartedLeading() called +2022-10-12T12:33:54Z [debug] Elected as leader, do processing +2022-10-12T12:33:54Z [debug] IPManagement -- mode: 0 / containerID: 71e657d22f15bcc350d9036df343d5ed886df9cd0de2be44c59eef3615e86396 / podRef: kube-system/testpodsec1 +2022-10-12T12:33:54Z [debug] IterateForAssignment input >> ip: 148.14.25.0 | ipnet: {148.14.25.0 ffffff00} | first IP: 148.14.25.1 | last IP: 148.14.25.254 +2022-10-12T12:33:54Z [debug] Reserving IP: |148.14.25.2 71e657d22f15bcc350d9036df343d5ed886df9cd0de2be44c59eef3615e86396| +2022-10-12T12:33:54Z [debug] OverlappingRangewide allocation check for IP: 148.14.25.2 +2022-10-12T12:33:54Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.2 GenerateName: Namespace:kube-system SelfLink: UID:0eb789e5-64f3-40d7-9180-077555cdbbc2 ResourceVersion:12000 Generation:1 CreationTimestamp:2022-10-12 12:33:54 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:33:54 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:71e657d22f15bcc350d9036df343d5ed886df9cd0de2be44c59eef3615e86396 PodRef:kube-system/testpodsec1}} +2022-10-12T12:33:54Z [debug] OnStoppedLeading() called +2022-10-12T12:33:54Z [debug] Finished leader election +2022-10-12T12:33:54Z [debug] IPManagement: {148.14.25.2 ffffff00}, +I1012 12:33:54.084145 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:05.5 ifName:eth1} {vfDeviceID:0000:18:01.2 ifName:} {vfDeviceID:0000:18:05.7 ifName:}] +I1012 12:33:54.164430 1 sriov.go:118] Configured interfaces for container 71e657d22f15bcc350d9036df343d5ed886df9cd0de2be44c59eef3615e86396; hostIface: {Name:ens785f0v2 Mac:1a:dc:0b:2a:a2:60 Sandbox:}, containerIface: {Name:eth2 Mac:1a:dc:0b:2a:a2:60 Sandbox:/host/proc/3307364/ns/net} +I1012 12:33:54.164489 1 controller.go:444] "INTEL - networklist ITERATED" +I1012 12:39:37.514533 1 controller.go:269] "Secondary network already configured on this Pod and annotation update not supported, skipping update" pod="kube-system/testpodsec1" +I1012 12:39:37.631219 1 controller.go:269] "Secondary network already configured on this Pod and annotation update not supported, skipping update" pod="kube-system/testpodsec2" +2022-10-12T12:39:37Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T12:39:37Z [debug] Beginning delete for ContainerID: 71e657d22f15bcc350d9036df343d5ed886df9cd0de2be44c59eef3615e86396 +2022-10-12T12:39:37Z [debug] Started leader election +I1012 12:39:37.593894 6657 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:39:37.609469 6657 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:39:37Z [debug] OnStartedLeading() called +2022-10-12T12:39:37Z [debug] Elected as leader, do processing +2022-10-12T12:39:37Z [debug] IPManagement -- mode: 1 / containerID: 71e657d22f15bcc350d9036df343d5ed886df9cd0de2be44c59eef3615e86396 / podRef: kube-system/testpodsec1 +2022-10-12T12:39:37Z [debug] Deallocating given previously used IP: 148.14.24.3 +2022-10-12T12:39:37Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.3 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:39:37Z [debug] OnStoppedLeading() called +2022-10-12T12:39:37Z [debug] Finished leader election +2022-10-12T12:39:37Z [debug] IPManagement: { }, +I1012 12:39:37.746527 1 controller.go:269] "Secondary network already configured on this Pod and annotation update not supported, skipping update" pod="kube-system/testpodsec3" +2022-10-12T12:39:37Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T12:39:37Z [debug] Beginning delete for ContainerID: 71e657d22f15bcc350d9036df343d5ed886df9cd0de2be44c59eef3615e86396 +2022-10-12T12:39:37Z [debug] Started leader election +I1012 12:39:37.712657 6689 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:39:37.721725 6689 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:39:37Z [debug] OnStartedLeading() called +2022-10-12T12:39:37Z [debug] Elected as leader, do processing +2022-10-12T12:39:37Z [debug] IPManagement -- mode: 1 / containerID: 71e657d22f15bcc350d9036df343d5ed886df9cd0de2be44c59eef3615e86396 / podRef: kube-system/testpodsec1 +2022-10-12T12:39:37Z [debug] Deallocating given previously used IP: 148.14.25.2 +2022-10-12T12:39:37Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.2 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:39:37Z [debug] OnStoppedLeading() called +2022-10-12T12:39:37Z [debug] Finished leader election +2022-10-12T12:39:37Z [debug] IPManagement: { }, +I1012 12:39:37.753967 1 controller.go:154] "Pod VF Cache cleared" pod="kube-system/testpodsec1" +2022-10-12T12:39:37Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec3 PodNamespace:kube-system} +2022-10-12T12:39:37Z [debug] Beginning delete for ContainerID: ee261b15f2ae73bdb4c43f68b6f764413491028a7b080f7554b45a69d67ef052 +2022-10-12T12:39:37Z [debug] Started leader election +I1012 12:39:37.820196 6741 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:39:37.834721 6741 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:39:37Z [debug] OnStartedLeading() called +2022-10-12T12:39:37Z [debug] Elected as leader, do processing +2022-10-12T12:39:37Z [debug] IPManagement -- mode: 1 / containerID: ee261b15f2ae73bdb4c43f68b6f764413491028a7b080f7554b45a69d67ef052 / podRef: kube-system/testpodsec3 +2022-10-12T12:39:37Z [debug] Deallocating given previously used IP: 148.14.24.2 +2022-10-12T12:39:37Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.2 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:39:37Z [debug] OnStoppedLeading() called +2022-10-12T12:39:37Z [debug] Finished leader election +2022-10-12T12:39:37Z [debug] IPManagement: { }, +I1012 12:39:37.863829 1 controller.go:154] "Pod VF Cache cleared" pod="kube-system/testpodsec3" +2022-10-12T12:39:37Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T12:39:37Z [debug] Beginning delete for ContainerID: b8ae73ef1f9b58fba2607dd7e2fafcb3179d87c3370f1cd0fa2a3d47842143b0 +2022-10-12T12:39:37Z [debug] Started leader election +I1012 12:39:37.712402 6684 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +E1012 12:39:37.722832 6684 leaderelection.go:367] Failed to update lock: Operation cannot be fulfilled on leases.coordination.k8s.io "whereabouts": the object has been modified; please apply your changes to the latest version and try again +I1012 12:39:38.596390 6684 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:39:38Z [debug] OnStartedLeading() called +2022-10-12T12:39:38Z [debug] Elected as leader, do processing +2022-10-12T12:39:38Z [debug] IPManagement -- mode: 1 / containerID: b8ae73ef1f9b58fba2607dd7e2fafcb3179d87c3370f1cd0fa2a3d47842143b0 / podRef: kube-system/testpodsec2 +2022-10-12T12:39:38Z [debug] Deallocating given previously used IP: 148.14.24.1 +2022-10-12T12:39:38Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.1 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:39:38Z [debug] OnStoppedLeading() called +2022-10-12T12:39:38Z [debug] Finished leader election +2022-10-12T12:39:38Z [debug] IPManagement: { }, +2022-10-12T12:39:38Z [debug] DEL - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T12:39:38Z [debug] Beginning delete for ContainerID: b8ae73ef1f9b58fba2607dd7e2fafcb3179d87c3370f1cd0fa2a3d47842143b0 +2022-10-12T12:39:38Z [debug] Started leader election +I1012 12:39:38.704868 6769 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:39:38.714776 6769 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:39:38Z [debug] OnStartedLeading() called +2022-10-12T12:39:38Z [debug] Elected as leader, do processing +2022-10-12T12:39:38Z [debug] IPManagement -- mode: 1 / containerID: b8ae73ef1f9b58fba2607dd7e2fafcb3179d87c3370f1cd0fa2a3d47842143b0 / podRef: kube-system/testpodsec2 +2022-10-12T12:39:38Z [debug] Deallocating given previously used IP: 148.14.25.1 +2022-10-12T12:39:38Z [debug] K8s UpdateOverlappingRangeAllocation success on deallocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.1 GenerateName: Namespace:kube-system SelfLink: UID: ResourceVersion: Generation:0 CreationTimestamp:0001-01-01 00:00:00 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[]} Spec:{ContainerID: PodRef:}} +2022-10-12T12:39:38Z [debug] OnStoppedLeading() called +2022-10-12T12:39:38Z [debug] Finished leader election +2022-10-12T12:39:38Z [debug] IPManagement: { }, +I1012 12:39:38.746508 1 controller.go:154] "Pod VF Cache cleared" pod="kube-system/testpodsec2" +I1012 12:40:07.699460 1 server.go:539] Received CmdDel request cni_args:{container_id:"71e657d22f15bcc350d9036df343d5ed886df9cd0de2be44c59eef3615e86396" netns:"/proc/3307364/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec1;K8S_POD_INFRA_CONTAINER_ID=71e657d22f15bcc350d9036df343d5ed886df9cd0de2be44c59eef3615e86396" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:40:07.705109 1 server.go:563] Deleted IP addresses for container 71e657d22f15bcc350d9036df343d5ed886df9cd0de2be44c59eef3615e86396 +I1012 12:40:07.706752 1 pod_configuration.go:537] Removed interfaces for container 71e657d22f15bcc350d9036df343d5ed886df9cd0de2be44c59eef3615e86396 +I1012 12:40:07.767415 1 server.go:569] CmdDel for container 71e657d22f15bcc350d9036df343d5ed886df9cd0de2be44c59eef3615e86396 succeeded +I1012 12:40:07.774574 1 server.go:539] Received CmdDel request cni_args:{container_id:"b8ae73ef1f9b58fba2607dd7e2fafcb3179d87c3370f1cd0fa2a3d47842143b0" netns:"/proc/3307352/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec2;K8S_POD_INFRA_CONTAINER_ID=b8ae73ef1f9b58fba2607dd7e2fafcb3179d87c3370f1cd0fa2a3d47842143b0" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:40:07.780357 1 server.go:563] Deleted IP addresses for container b8ae73ef1f9b58fba2607dd7e2fafcb3179d87c3370f1cd0fa2a3d47842143b0 +I1012 12:40:07.781870 1 pod_configuration.go:537] Removed interfaces for container b8ae73ef1f9b58fba2607dd7e2fafcb3179d87c3370f1cd0fa2a3d47842143b0 +I1012 12:40:07.899591 1 server.go:569] CmdDel for container b8ae73ef1f9b58fba2607dd7e2fafcb3179d87c3370f1cd0fa2a3d47842143b0 succeeded +I1012 12:40:07.915040 1 server.go:539] Received CmdDel request cni_args:{container_id:"ee261b15f2ae73bdb4c43f68b6f764413491028a7b080f7554b45a69d67ef052" netns:"/proc/3307384/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec3;K8S_POD_INFRA_CONTAINER_ID=ee261b15f2ae73bdb4c43f68b6f764413491028a7b080f7554b45a69d67ef052" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:40:07.921290 1 server.go:563] Deleted IP addresses for container ee261b15f2ae73bdb4c43f68b6f764413491028a7b080f7554b45a69d67ef052 +I1012 12:40:07.922891 1 pod_configuration.go:537] Removed interfaces for container ee261b15f2ae73bdb4c43f68b6f764413491028a7b080f7554b45a69d67ef052 +I1012 12:40:08.023389 1 server.go:569] CmdDel for container ee261b15f2ae73bdb4c43f68b6f764413491028a7b080f7554b45a69d67ef052 succeeded +I1012 12:40:29.489446 1 server.go:425] Received CmdAdd request cni_args:{container_id:"3c4e1337cb4933dad817d99f521db209e1431686ba0227bca5db7a6957a474af" netns:"/proc/3315637/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec3;K8S_POD_INFRA_CONTAINER_ID=3c4e1337cb4933dad817d99f521db209e1431686ba0227bca5db7a6957a474af" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:40:29.490275 1 server.go:425] Received CmdAdd request cni_args:{container_id:"a54da08aed9c33cc742bae938969554c93dbe619678ceed960be0d10e9965a2c" netns:"/proc/3315644/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec1;K8S_POD_INFRA_CONTAINER_ID=a54da08aed9c33cc742bae938969554c93dbe619678ceed960be0d10e9965a2c" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:40:29.495773 1 server.go:495] "Allocated IP addresses" container="3c4e1337cb4933dad817d99f521db209e1431686ba0227bca5db7a6957a474af" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.100 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 12:40:29.496193 1 server.go:425] Received CmdAdd request cni_args:{container_id:"bc4fac1737e0ae275fba7f017a4ed5965115e771104e96108e944f0041b0d301" netns:"/proc/3315662/ns/net" ifname:"eth0" args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=kube-system;K8S_POD_NAME=testpodsec2;K8S_POD_INFRA_CONTAINER_ID=bc4fac1737e0ae275fba7f017a4ed5965115e771104e96108e944f0041b0d301" path:"/opt/cni/bin" network_configuration:"{\"cniVersion\":\"0.3.0\",\"ipam\":{\"type\":\"host-local\"},\"name\":\"antrea\",\"type\":\"antrea\"}"} +I1012 12:40:29.496350 1 server.go:495] "Allocated IP addresses" container="a54da08aed9c33cc742bae938969554c93dbe619678ceed960be0d10e9965a2c" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.101 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 12:40:29.502010 1 server.go:495] "Allocated IP addresses" container="bc4fac1737e0ae275fba7f017a4ed5965115e771104e96108e944f0041b0d301" result=&{Result:{CNIVersion:0.4.0 Interfaces:[] IPs:[{Version:4 Interface: Address:{IP:172.25.0.102 Mask:ffffff00} Gateway:172.25.0.1}] Routes:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]}} VLANID:0} +I1012 12:40:29.653158 1 pod_configuration.go:265] Configured interfaces for container 3c4e1337cb4933dad817d99f521db209e1431686ba0227bca5db7a6957a474af +I1012 12:40:29.653198 1 server.go:522] CmdAdd for container 3c4e1337cb4933dad817d99f521db209e1431686ba0227bca5db7a6957a474af succeeded +I1012 12:40:29.653219 1 pod_configuration.go:265] Configured interfaces for container a54da08aed9c33cc742bae938969554c93dbe619678ceed960be0d10e9965a2c +I1012 12:40:29.653248 1 server.go:522] CmdAdd for container a54da08aed9c33cc742bae938969554c93dbe619678ceed960be0d10e9965a2c succeeded +I1012 12:40:29.653252 1 pod_configuration.go:265] Configured interfaces for container bc4fac1737e0ae275fba7f017a4ed5965115e771104e96108e944f0041b0d301 +I1012 12:40:29.653283 1 server.go:522] CmdAdd for container bc4fac1737e0ae275fba7f017a4ed5965115e771104e96108e944f0041b0d301 succeeded +I1012 12:40:30.537833 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth4 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec3" +I1012 12:40:30.546565 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec3" +I1012 12:40:30.546686 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 12:40:30.546779 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:40:30.546830 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:40:30.546871 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +I1012 12:40:30.548820 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:40:30.552590 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec2" +I1012 12:40:30.552715 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 12:40:30.552825 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:40:30.552890 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:40:30.552921 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +I1012 12:40:30.561199 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net1 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth1 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:40:30.565489 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > Pod="kube-system/testpodsec1" +I1012 12:40:30.565628 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net1 GenerateName: Namespace:kube-system SelfLink: UID:fe713b40-1a3d-40f8-9984-11791d6712c0 ResourceVersion:9961 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net1","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.24.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.24.0/24" } }}} + > +I1012 12:40:30.565816 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.24.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net1\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:40:30.565886 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:40:30.565916 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T12:40:30Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec3 PodNamespace:kube-system} +2022-10-12T12:40:30Z [debug] Beginning IPAM for ContainerID: 3c4e1337cb4933dad817d99f521db209e1431686ba0227bca5db7a6957a474af +2022-10-12T12:40:30Z [debug] Started leader election +I1012 12:40:30.624535 6882 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:40:30.645747 6882 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:40:30Z [debug] OnStartedLeading() called +2022-10-12T12:40:30Z [debug] Elected as leader, do processing +2022-10-12T12:40:30Z [debug] IPManagement -- mode: 0 / containerID: 3c4e1337cb4933dad817d99f521db209e1431686ba0227bca5db7a6957a474af / podRef: kube-system/testpodsec3 +2022-10-12T12:40:30Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T12:40:30Z [debug] Reserving IP: |148.14.24.1 3c4e1337cb4933dad817d99f521db209e1431686ba0227bca5db7a6957a474af| +2022-10-12T12:40:30Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.1 +2022-10-12T12:40:30Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.1 GenerateName: Namespace:kube-system SelfLink: UID:eac0067e-8809-44da-aee6-12614ef0cf1d ResourceVersion:12596 Generation:1 CreationTimestamp:2022-10-12 12:40:30 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:40:30 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:3c4e1337cb4933dad817d99f521db209e1431686ba0227bca5db7a6957a474af PodRef:kube-system/testpodsec3}} +2022-10-12T12:40:30Z [debug] OnStoppedLeading() called +2022-10-12T12:40:30Z [debug] Finished leader election +2022-10-12T12:40:30Z [debug] IPManagement: {148.14.24.1 ffffff00}, +I1012 12:40:30.683965 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:03.6 ifName:} {vfDeviceID:0000:18:05.5 ifName:} {vfDeviceID:0000:18:05.7 ifName:}] +I1012 12:40:30.776306 1 sriov.go:118] Configured interfaces for container 3c4e1337cb4933dad817d99f521db209e1431686ba0227bca5db7a6957a474af; hostIface: {Name:dev475 Mac:b6:eb:f3:3a:df:8e Sandbox:}, containerIface: {Name:eth4 Mac:b6:eb:f3:3a:df:8e Sandbox:/host/proc/3315637/ns/net} +I1012 12:40:30.776385 1 controller.go:444] "INTEL - networklist ITERATED" +2022-10-12T12:40:30Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T12:40:30Z [debug] Beginning IPAM for ContainerID: bc4fac1737e0ae275fba7f017a4ed5965115e771104e96108e944f0041b0d301 +2022-10-12T12:40:30Z [debug] Started leader election +I1012 12:40:30.638112 6887 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +E1012 12:40:30.647187 6887 leaderelection.go:367] Failed to update lock: Operation cannot be fulfilled on leases.coordination.k8s.io "whereabouts": the object has been modified; please apply your changes to the latest version and try again +I1012 12:40:31.523981 6887 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:40:31Z [debug] OnStartedLeading() called +2022-10-12T12:40:31Z [debug] Elected as leader, do processing +2022-10-12T12:40:31Z [debug] IPManagement -- mode: 0 / containerID: bc4fac1737e0ae275fba7f017a4ed5965115e771104e96108e944f0041b0d301 / podRef: kube-system/testpodsec2 +2022-10-12T12:40:31Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T12:40:31Z [debug] Reserving IP: |148.14.24.2 bc4fac1737e0ae275fba7f017a4ed5965115e771104e96108e944f0041b0d301| +2022-10-12T12:40:31Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.2 +2022-10-12T12:40:31Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.2 GenerateName: Namespace:kube-system SelfLink: UID:592c144b-3072-4ddd-9a75-a37d74ac2d6e ResourceVersion:12603 Generation:1 CreationTimestamp:2022-10-12 12:40:31 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:40:31 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:bc4fac1737e0ae275fba7f017a4ed5965115e771104e96108e944f0041b0d301 PodRef:kube-system/testpodsec2}} +2022-10-12T12:40:31Z [debug] OnStoppedLeading() called +2022-10-12T12:40:31Z [debug] Finished leader election +2022-10-12T12:40:31Z [debug] IPManagement: {148.14.24.2 ffffff00}, +I1012 12:40:31.563938 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:03.0 ifName:} {vfDeviceID:0000:18:06.0 ifName:} {vfDeviceID:0000:18:05.6 ifName:}] +I1012 12:40:31.628356 1 sriov.go:118] Configured interfaces for container bc4fac1737e0ae275fba7f017a4ed5965115e771104e96108e944f0041b0d301; hostIface: {Name:ens785f0v16 Mac:36:c9:71:5e:df:0b Sandbox:}, containerIface: {Name:eth2 Mac:36:c9:71:5e:df:0b Sandbox:/host/proc/3315662/ns/net} +I1012 12:40:31.628429 1 controller.go:444] "INTEL - networklist ITERATED" +I1012 12:40:31.628470 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net2 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth3 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec2" +I1012 12:40:31.633129 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:7d1f7d37-57cd-475e-a117-5f4c8b473f0e ResourceVersion:9962 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > Pod="kube-system/testpodsec2" +I1012 12:40:31.633228 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:7d1f7d37-57cd-475e-a117-5f4c8b473f0e ResourceVersion:9962 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > +I1012 12:40:31.633317 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.25.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net2\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:40:31.633363 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:40:31.633392 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T12:40:31Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec2 PodNamespace:kube-system} +2022-10-12T12:40:31Z [debug] Beginning IPAM for ContainerID: bc4fac1737e0ae275fba7f017a4ed5965115e771104e96108e944f0041b0d301 +2022-10-12T12:40:31Z [debug] Started leader election +I1012 12:40:31.705779 6970 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:40:31.715489 6970 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:40:31Z [debug] OnStartedLeading() called +2022-10-12T12:40:31Z [debug] Elected as leader, do processing +2022-10-12T12:40:31Z [debug] IPManagement -- mode: 0 / containerID: bc4fac1737e0ae275fba7f017a4ed5965115e771104e96108e944f0041b0d301 / podRef: kube-system/testpodsec2 +2022-10-12T12:40:31Z [debug] IterateForAssignment input >> ip: 148.14.25.0 | ipnet: {148.14.25.0 ffffff00} | first IP: 148.14.25.1 | last IP: 148.14.25.254 +2022-10-12T12:40:31Z [debug] Reserving IP: |148.14.25.1 bc4fac1737e0ae275fba7f017a4ed5965115e771104e96108e944f0041b0d301| +2022-10-12T12:40:31Z [debug] OverlappingRangewide allocation check for IP: 148.14.25.1 +2022-10-12T12:40:31Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.1 GenerateName: Namespace:kube-system SelfLink: UID:4e228908-82a9-46f4-997a-dbdf07c03382 ResourceVersion:12608 Generation:1 CreationTimestamp:2022-10-12 12:40:31 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:40:31 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:bc4fac1737e0ae275fba7f017a4ed5965115e771104e96108e944f0041b0d301 PodRef:kube-system/testpodsec2}} +2022-10-12T12:40:31Z [debug] OnStoppedLeading() called +2022-10-12T12:40:31Z [debug] Finished leader election +2022-10-12T12:40:31Z [debug] IPManagement: {148.14.25.1 ffffff00}, +I1012 12:40:31.748016 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:03.0 ifName:eth2} {vfDeviceID:0000:18:06.0 ifName:} {vfDeviceID:0000:18:05.6 ifName:}] +I1012 12:40:31.816322 1 sriov.go:118] Configured interfaces for container bc4fac1737e0ae275fba7f017a4ed5965115e771104e96108e944f0041b0d301; hostIface: {Name:ens785f0v40 Mac:8a:99:dc:02:a2:80 Sandbox:}, containerIface: {Name:eth3 Mac:8a:99:dc:02:a2:80 Sandbox:/host/proc/3315662/ns/net} +I1012 12:40:31.816391 1 controller.go:444] "INTEL - networklist ITERATED" +2022-10-12T12:40:30Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net1 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.24.0/24 RangeStart:148.14.24.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T12:40:30Z [debug] Beginning IPAM for ContainerID: a54da08aed9c33cc742bae938969554c93dbe619678ceed960be0d10e9965a2c +2022-10-12T12:40:30Z [debug] Started leader election +I1012 12:40:30.639863 6895 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +E1012 12:40:30.648831 6895 leaderelection.go:367] Failed to update lock: Operation cannot be fulfilled on leases.coordination.k8s.io "whereabouts": the object has been modified; please apply your changes to the latest version and try again +E1012 12:40:31.524826 6895 leaderelection.go:367] Failed to update lock: Operation cannot be fulfilled on leases.coordination.k8s.io "whereabouts": the object has been modified; please apply your changes to the latest version and try again +I1012 12:40:32.607256 6895 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:40:32Z [debug] OnStartedLeading() called +2022-10-12T12:40:32Z [debug] Elected as leader, do processing +2022-10-12T12:40:32Z [debug] IPManagement -- mode: 0 / containerID: a54da08aed9c33cc742bae938969554c93dbe619678ceed960be0d10e9965a2c / podRef: kube-system/testpodsec1 +2022-10-12T12:40:32Z [debug] IterateForAssignment input >> ip: 148.14.24.0 | ipnet: {148.14.24.0 ffffff00} | first IP: 148.14.24.1 | last IP: 148.14.24.254 +2022-10-12T12:40:32Z [debug] Reserving IP: |148.14.24.3 a54da08aed9c33cc742bae938969554c93dbe619678ceed960be0d10e9965a2c| +2022-10-12T12:40:32Z [debug] OverlappingRangewide allocation check for IP: 148.14.24.3 +2022-10-12T12:40:32Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.24.3 GenerateName: Namespace:kube-system SelfLink: UID:e06adc6f-86c9-4a17-80f1-282f983f2167 ResourceVersion:12613 Generation:1 CreationTimestamp:2022-10-12 12:40:32 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:40:32 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:a54da08aed9c33cc742bae938969554c93dbe619678ceed960be0d10e9965a2c PodRef:kube-system/testpodsec1}} +2022-10-12T12:40:32Z [debug] OnStoppedLeading() called +2022-10-12T12:40:32Z [debug] Finished leader election +2022-10-12T12:40:32Z [debug] IPManagement: {148.14.24.3 ffffff00}, +I1012 12:40:32.652399 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:06.5 ifName:} {vfDeviceID:0000:18:07.6 ifName:} {vfDeviceID:0000:18:03.3 ifName:}] +I1012 12:40:32.720430 1 sriov.go:118] Configured interfaces for container a54da08aed9c33cc742bae938969554c93dbe619678ceed960be0d10e9965a2c; hostIface: {Name:ens785f0v45 Mac:d6:47:43:55:04:f0 Sandbox:}, containerIface: {Name:eth1 Mac:d6:47:43:55:04:f0 Sandbox:/host/proc/3315644/ns/net} +I1012 12:40:32.720512 1 controller.go:444] "INTEL - networklist ITERATED" +I1012 12:40:32.720553 1 controller.go:406] "Secondary Network attached to Pod" network=&{Name:virtual-net2 Namespace:kube-system IPRequest:[] MacRequest: InfinibandGUIDRequest: InterfaceRequest:eth2 PortMappingsRequest:[] BandwidthRequest: CNIArgs: GatewayRequest:[]} Pod="kube-system/testpodsec1" +I1012 12:40:32.725431 1 controller.go:408] "INTEL - netDefCRD " netDefCRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:7d1f7d37-57cd-475e-a117-5f4c8b473f0e ResourceVersion:9962 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > Pod="kube-system/testpodsec1" +I1012 12:40:32.725523 1 controller.go:414] "INTEL - NetworkAttachmentDefinition" CRD=< + &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:virtual-net2 GenerateName: Namespace:kube-system SelfLink: UID:7d1f7d37-57cd-475e-a117-5f4c8b473f0e ResourceVersion:9962 Generation:1 CreationTimestamp:2022-10-12 12:12:14 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[kubectl.kubernetes.io/last-applied-configuration:{"apiVersion":"k8s.cni.cncf.io/v1","kind":"NetworkAttachmentDefinition","metadata":{"annotations":{},"name":"virtual-net2","namespace":"kube-system"},"spec":{"config":"{ \"cniVersion\": \"0.3.0\", \"type\": \"antrea\", \"networkType\": \"sriov\", \"ipam\": { \"type\": \"whereabouts\", \"datastore\": \"kubernetes\", \"kubernetes\": { \"kubeconfig\": \"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\" }, \"range\": \"148.14.25.0/24\" } }"}} + ] OwnerReferences:[] Finalizers:[] ZZZ_DeprecatedClusterName: ManagedFields:[{Manager:kubectl-client-side-apply Operation:Update APIVersion:k8s.cni.cncf.io/v1 Time:2022-10-12 12:12:14 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:metadata":{"f:annotations":{".":{},"f:kubectl.kubernetes.io/last-applied-configuration":{}}},"f:spec":{".":{},"f:config":{}}} Subresource:}]} Spec:{Config:{ "cniVersion": "0.3.0", "type": "antrea", "networkType": "sriov", "ipam": { "type": "whereabouts", "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "range": "148.14.25.0/24" } }}} + > +I1012 12:40:32.725622 1 controller.go:420] "INTEL - CNI Config" CNIConfig="{\"cniVersion\":\"0.3.0\",\"ipam\":{\"datastore\":\"kubernetes\",\"kubernetes\":{\"kubeconfig\":\"/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig\"},\"range\":\"148.14.25.0/24\",\"type\":\"whereabouts\"},\"name\":\"virtual-net2\",\"networkType\":\"sriov\",\"type\":\"antrea\"}" +I1012 12:40:32.725667 1 controller.go:431] "INTEL - networkConfig.Type IS ANTREA" +I1012 12:40:32.725688 1 controller.go:437] "INTEL - networkConfig.NetworkType IS SRIOV" +2022-10-12T12:40:32Z [debug] ADD - IPAM configuration successfully read: {Name:virtual-net2 Type:whereabouts Routes:[] Datastore:kubernetes Addresses:[] OmitRanges:[] DNS:{Nameservers:[] Domain: Search:[] Options:[]} Range:148.14.25.0/24 RangeStart:148.14.25.0 RangeEnd: GatewayStr: EtcdHost: EtcdUsername: EtcdPassword:********* EtcdKeyFile: EtcdCertFile: EtcdCACertFile: LeaderLeaseDuration:1500 LeaderRenewDeadline:1000 LeaderRetryPeriod:500 LogFile: LogLevel: OverlappingRanges:true SleepForRace:0 Gateway: Kubernetes:{KubeConfigPath:/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig K8sAPIRoot:} ConfigurationPath: PodName:testpodsec1 PodNamespace:kube-system} +2022-10-12T12:40:32Z [debug] Beginning IPAM for ContainerID: a54da08aed9c33cc742bae938969554c93dbe619678ceed960be0d10e9965a2c +2022-10-12T12:40:32Z [debug] Started leader election +I1012 12:40:32.791988 6996 leaderelection.go:248] attempting to acquire leader lease kube-system/whereabouts... +I1012 12:40:32.801660 6996 leaderelection.go:258] successfully acquired lease kube-system/whereabouts +2022-10-12T12:40:32Z [debug] OnStartedLeading() called +2022-10-12T12:40:32Z [debug] Elected as leader, do processing +2022-10-12T12:40:32Z [debug] IPManagement -- mode: 0 / containerID: a54da08aed9c33cc742bae938969554c93dbe619678ceed960be0d10e9965a2c / podRef: kube-system/testpodsec1 +2022-10-12T12:40:32Z [debug] IterateForAssignment input >> ip: 148.14.25.0 | ipnet: {148.14.25.0 ffffff00} | first IP: 148.14.25.1 | last IP: 148.14.25.254 +2022-10-12T12:40:32Z [debug] Reserving IP: |148.14.25.2 a54da08aed9c33cc742bae938969554c93dbe619678ceed960be0d10e9965a2c| +2022-10-12T12:40:32Z [debug] OverlappingRangewide allocation check for IP: 148.14.25.2 +2022-10-12T12:40:32Z [debug] K8s UpdateOverlappingRangeAllocation success on allocate: &{TypeMeta:{Kind: APIVersion:} ObjectMeta:{Name:148.14.25.2 GenerateName: Namespace:kube-system SelfLink: UID:3f8e7467-f296-4239-9db0-e0bb2caa3ea1 ResourceVersion:12620 Generation:1 CreationTimestamp:2022-10-12 12:40:32 +0000 UTC DeletionTimestamp: DeletionGracePeriodSeconds: Labels:map[] Annotations:map[] OwnerReferences:[] Finalizers:[] ClusterName: ManagedFields:[{Manager:whereabouts Operation:Update APIVersion:whereabouts.cni.cncf.io/v1alpha1 Time:2022-10-12 12:40:32 +0000 UTC FieldsType:FieldsV1 FieldsV1:{"f:spec":{".":{},"f:containerid":{},"f:podref":{}}} Subresource:}]} Spec:{ContainerID:a54da08aed9c33cc742bae938969554c93dbe619678ceed960be0d10e9965a2c PodRef:kube-system/testpodsec1}} +2022-10-12T12:40:32Z [debug] OnStoppedLeading() called +2022-10-12T12:40:32Z [debug] Finished leader election +2022-10-12T12:40:32Z [debug] IPManagement: {148.14.25.2 ffffff00}, +I1012 12:40:32.835756 1 controller.go:166] "Printing CACHE!!!!!!!!!!!!!" cache=[{vfDeviceID:0000:18:06.5 ifName:eth1} {vfDeviceID:0000:18:07.6 ifName:} {vfDeviceID:0000:18:03.3 ifName:}] +I1012 12:40:32.916237 1 sriov.go:118] Configured interfaces for container a54da08aed9c33cc742bae938969554c93dbe619678ceed960be0d10e9965a2c; hostIface: {Name:ens785f0v54 Mac:96:9a:97:34:4b:1d Sandbox:}, containerIface: {Name:eth2 Mac:96:9a:97:34:4b:1d Sandbox:/host/proc/3315644/ns/net} +I1012 12:40:32.916320 1 controller.go:444] "INTEL - networklist ITERATED" diff --git a/hack/antrea_sec_debug.yml b/hack/antrea_sec_debug.yml new file mode 100644 index 00000000000..8c7970e8b26 --- /dev/null +++ b/hack/antrea_sec_debug.yml @@ -0,0 +1,4794 @@ +--- +# Source: crds/antreaagentinfo.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: antreaagentinfos.crd.antrea.io + labels: + app: antrea +spec: + group: crd.antrea.io + versions: + - name: v1beta1 + served: true + storage: true + schema: + openAPIV3Schema: + type: object + x-kubernetes-preserve-unknown-fields: true + additionalPrinterColumns: + - description: Health status of this Agent + jsonPath: ".agentConditions[?(@.type=='AgentHealthy')].status" + name: Healthy + type: string + - description: Last time the Healthy Condition was updated + jsonPath: ".agentConditions[?(@.type=='AgentHealthy')].lastHeartbeatTime" + name: Last Heartbeat + type: date + - description: Version of this Agent + jsonPath: ".version" + name: Version + type: string + priority: 1 + - description: Node on which this Agent is running + jsonPath: ".nodeRef.name" + name: Node + type: string + priority: 1 + - description: Number of local Pods managed by this Agent + jsonPath: ".localPodNum" + name: Num Pods + type: integer + priority: 2 + - description: Subnets used by this Agent for Pod IPAM + jsonPath: ".nodeSubnets" + name: Subnets + type: string + priority: 2 + scope: Cluster + names: + plural: antreaagentinfos + singular: antreaagentinfo + kind: AntreaAgentInfo + shortNames: + - aai + +--- +# Source: crds/antreacontrollerinfo.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: antreacontrollerinfos.crd.antrea.io + labels: + app: antrea +spec: + group: crd.antrea.io + versions: + - name: v1beta1 + served: true + storage: true + schema: + openAPIV3Schema: + type: object + x-kubernetes-preserve-unknown-fields: true + additionalPrinterColumns: + - description: Health status of the Controller + jsonPath: ".controllerConditions[?(@.type=='ControllerHealthy')].status" + name: Healthy + type: string + - description: Last time the Healthy Condition was updated + jsonPath: ".controllerConditions[?(@.type=='ControllerHealthy')].lastHeartbeatTime" + name: Last Heartbeat + type: date + - description: Version of the Controller + jsonPath: ".version" + name: Version + type: string + priority: 1 + - description: Number of Agents connected to the Controller + jsonPath: ".connectedAgentNum" + name: Connected Agents + type: integer + priority: 1 + - description: Node on which the Controller is running + jsonPath: ".nodeRef.name" + name: Node + type: string + priority: 1 + - description: Number of Network Policies computed by Controller + jsonPath: ".networkPolicyControllerInfo.networkPolicyNum" + name: Num Network Policies + type: integer + priority: 2 + scope: Cluster + names: + plural: antreacontrollerinfos + singular: antreacontrollerinfo + kind: AntreaControllerInfo + shortNames: + - aci + +--- +# Source: crds/clustergroup.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: clustergroups.crd.antrea.io + labels: + app: antrea +spec: + group: crd.antrea.io + versions: + - name: v1alpha2 + served: true + storage: false + schema: + openAPIV3Schema: + type: object + properties: + spec: + type: object + properties: + childGroups: + type: array + items: + type: string + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaceSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + externalEntitySelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + ipBlock: + type: object + properties: + cidr: + type: string + format: cidr + ipBlocks: + type: array + items: + type: object + properties: + cidr: + type: string + format: cidr + serviceReference: + type: object + properties: + name: + type: string + namespace: + type: string + status: + type: object + properties: + conditions: + type: array + items: + type: object + properties: + type: + type: string + status: + type: string + lastTransitionTime: + type: string + - name: v1alpha3 + served: true + storage: true + schema: + openAPIV3Schema: + type: object + properties: + spec: + type: object + properties: + childGroups: + type: array + items: + type: string + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaceSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + externalEntitySelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + ipBlocks: + type: array + items: + type: object + properties: + cidr: + type: string + format: cidr + serviceReference: + type: object + properties: + name: + type: string + namespace: + type: string + status: + type: object + properties: + conditions: + type: array + items: + type: object + properties: + type: + type: string + status: + type: string + lastTransitionTime: + type: string + subresources: + status: {} + conversion: + strategy: Webhook + webhook: + conversionReviewVersions: ["v1", "v1beta1"] + clientConfig: + service: + name: "antrea" + namespace: "kube-system" + path: "/convert/clustergroup" + scope: Cluster + names: + plural: clustergroups + singular: clustergroup + kind: ClusterGroup + shortNames: + - cg + +--- +# Source: crds/clusternetworkpolicy.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: clusternetworkpolicies.crd.antrea.io + labels: + app: antrea +spec: + group: crd.antrea.io + versions: + - name: v1alpha1 + served: true + storage: true + additionalPrinterColumns: + - name: Tier + type: string + description: The Tier to which this ClusterNetworkPolicy belongs to. + jsonPath: .spec.tier + - name: Priority + type: number + format: float + description: The Priority of this ClusterNetworkPolicy relative to other policies. + jsonPath: .spec.priority + - name: Desired Nodes + type: number + format: int32 + description: The total number of Nodes that should realize the NetworkPolicy. + jsonPath: .status.desiredNodesRealized + - name: Current Nodes + type: number + format: int32 + description: The number of Nodes that have realized the NetworkPolicy. + jsonPath: .status.currentNodesRealized + - name: Age + type: date + jsonPath: .metadata.creationTimestamp + schema: + openAPIV3Schema: + type: object + properties: + spec: + # Ensure that Spec.Priority field is set + required: + - priority + type: object + properties: + tier: + type: string + priority: + type: number + format: float + # Ensure that Spec.Priority field is between 1 and 10000 + minimum: 1.0 + maximum: 10000.0 + appliedTo: + type: array + items: + type: object + # Ensure that Spec.AppliedTo does not allow IPBlock field + properties: + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaceSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + group: + type: string + serviceAccount: + type: object + properties: + name: + type: string + namespace: + type: string + required: + - name + - namespace + service: + type: object + properties: + name: + type: string + namespace: + type: string + required: + - name + - namespace + ingress: + type: array + items: + type: object + required: + - action + properties: + appliedTo: + type: array + items: + type: object + # Ensure that rule AppliedTo does not allow IPBlock field + properties: + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaceSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + group: + type: string + serviceAccount: + type: object + properties: + name: + type: string + namespace: + type: string + required: + - name + - namespace + service: + type: object + properties: + name: + type: string + namespace: + type: string + required: + - name + - namespace + # Ensure that Action field allows only ALLOW, DROP, REJECT and PASS values + action: + type: string + enum: ['Allow', 'Drop', 'Reject', 'Pass'] + ports: + type: array + items: + type: object + properties: + protocol: + type: string + enum: ['TCP', 'UDP', 'SCTP'] + port: + x-kubernetes-int-or-string: true + endPort: + type: integer + protocols: + type: array + items: + type: object + oneOf: + - required: [icmp] + - required: [igmp] + properties: + icmp: + type: object + properties: + icmpType: + type: integer + minimum: 0 + maximum: 255 + icmpCode: + type: integer + minimum: 0 + maximum: 255 + igmp: + type: object + properties: + igmpType: + type: integer + # Only IGMP query (0x11) is valid igmpType in ingress rules. + enum: [ 0x11 ] + groupAddress: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + from: + type: array + items: + type: object + properties: + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaceSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaces: + type: object + properties: + match: + enum: + - Self + type: string + ipBlock: + type: object + properties: + cidr: + type: string + format: cidr + group: + type: string + serviceAccount: + type: object + properties: + name: + type: string + namespace: + type: string + required: + - name + - namespace + nodeSelector: + type: object + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + type: array + type: object + type: array + matchLabels: + x-kubernetes-preserve-unknown-fields: true + name: + type: string + enableLogging: + type: boolean + egress: + type: array + items: + type: object + required: + - action + properties: + appliedTo: + type: array + items: + type: object + # Ensure that rule AppliedTo does not allow IPBlock field + properties: + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaceSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + group: + type: string + serviceAccount: + type: object + properties: + name: + type: string + namespace: + type: string + required: + - name + - namespace + # Ensure that Action field allows only ALLOW, DROP, REJECT and PASS values + action: + type: string + enum: ['Allow', 'Drop', 'Reject', 'Pass'] + ports: + type: array + items: + type: object + properties: + protocol: + type: string + enum: ['TCP', 'UDP', 'SCTP'] + port: + x-kubernetes-int-or-string: true + endPort: + type: integer + protocols: + type: array + items: + type: object + oneOf: + - required: [icmp] + - required: [igmp] + properties: + icmp: + type: object + properties: + icmpType: + type: integer + minimum: 0 + maximum: 255 + icmpCode: + type: integer + minimum: 0 + maximum: 255 + igmp: + type: object + properties: + igmpType: + type: integer + # Only IGMP reports are igmpType in egress rules, + # 0x12 is IGMP report V1, 0x16 is IGMP report v2, 0x22 is IGMP report v3. + # It will match all IGMP report types if igmpType is not set. + enum: [ 0x12, 0x16, 0x22 ] + groupAddress: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + to: + type: array + items: + type: object + properties: + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaceSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaces: + type: object + properties: + match: + enum: + - Self + type: string + ipBlock: + type: object + properties: + cidr: + type: string + format: cidr + group: + type: string + fqdn: + type: string + serviceAccount: + type: object + properties: + name: + type: string + namespace: + type: string + required: + - name + - namespace + nodeSelector: + type: object + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + type: array + type: object + type: array + matchLabels: + x-kubernetes-preserve-unknown-fields: true + toServices: + type: array + items: + type: object + required: + - name + - namespace + properties: + name: + type: string + namespace: + type: string + name: + type: string + enableLogging: + type: boolean + status: + type: object + properties: + phase: + type: string + observedGeneration: + type: integer + currentNodesRealized: + type: integer + desiredNodesRealized: + type: integer + conditions: + type: array + items: + type: object + properties: + type: + type: string + status: + type: string + lastTransitionTime: + type: string + reason: + type: string + message: + type: string + subresources: + status: {} + scope: Cluster + names: + plural: clusternetworkpolicies + singular: clusternetworkpolicy + kind: ClusterNetworkPolicy + shortNames: + - acnp + +--- +# Source: crds/egress.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: egresses.crd.antrea.io + labels: + app: antrea +spec: + group: crd.antrea.io + versions: + - name: v1alpha2 + served: true + storage: true + schema: + openAPIV3Schema: + type: object + required: + - spec + properties: + spec: + type: object + required: + - appliedTo + anyOf: + - required: + - egressIP + - required: + - externalIPPool + properties: + appliedTo: + type: object + properties: + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaceSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + egressIP: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + externalIPPool: + type: string + status: + type: object + properties: + egressNode: + type: string + additionalPrinterColumns: + - description: Specifies the SNAT IP address for the selected workloads. + jsonPath: .spec.egressIP + name: EgressIP + type: string + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + - description: The Owner Node of egress IP + jsonPath: .status.egressNode + name: Node + type: string + subresources: + status: {} + scope: Cluster + names: + plural: egresses + singular: egress + kind: Egress + shortNames: + - eg + +--- +# Source: crds/externalentity.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: externalentities.crd.antrea.io + labels: + app: antrea +spec: + group: crd.antrea.io + versions: + - name: v1alpha2 + served: true + storage: true + schema: + openAPIV3Schema: + type: object + properties: + spec: + type: object + properties: + endpoints: + type: array + items: + type: object + properties: + ip: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + name: + type: string + ports: + type: array + items: + type: object + properties: + protocol: + type: string + enum: ['TCP', 'UDP', 'SCTP'] + port: + x-kubernetes-int-or-string: true + name: + type: string + externalNode: + type: string + - name: v1alpha1 + served: false + storage: false + schema: + openAPIV3Schema: + type: object + scope: Namespaced + names: + plural: externalentities + singular: externalentity + kind: ExternalEntity + shortNames: + - ee + +--- +# Source: crds/externalippool.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: externalippools.crd.antrea.io + labels: + app: antrea +spec: + group: crd.antrea.io + versions: + - name: v1alpha2 + served: true + storage: true + schema: + openAPIV3Schema: + type: object + required: + - spec + properties: + spec: + type: object + required: + - ipRanges + - nodeSelector + properties: + ipRanges: + type: array + items: + type: object + oneOf: + - required: + - cidr + - required: + - start + - end + properties: + cidr: + type: string + format: cidr + start: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + end: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + nodeSelector: + type: object + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + type: array + type: object + type: array + matchLabels: + x-kubernetes-preserve-unknown-fields: true + status: + type: object + properties: + usage: + type: object + properties: + total: + type: integer + used: + type: integer + additionalPrinterColumns: + - description: The number of total IPs + jsonPath: .status.usage.total + name: Total + type: integer + - description: The number of allocated IPs + jsonPath: .status.usage.used + name: Used + type: integer + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + subresources: + status: {} + scope: Cluster + names: + plural: externalippools + singular: externalippool + kind: ExternalIPPool + shortNames: + - eip + +--- +# Source: crds/externalnode.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + labels: + app: antrea + name: externalnodes.crd.antrea.io +spec: + group: crd.antrea.io + versions: + - name: v1alpha1 + schema: + openAPIV3Schema: + type: object + required: + - spec + properties: + spec: + type: object + required: + - interfaces + properties: + interfaces: + type: array + minItems: 1 + maxItems: 1 + required: + - ips + items: + type: object + properties: + ips: + type: array + minItems: 1 + items: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + name: + type: string + served: true + storage: true + scope: Namespaced + names: + kind: ExternalNode + plural: externalnodes + shortNames: + - en + singular: externalnode +--- +# Source: crds/ippool.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: ippools.crd.antrea.io + labels: + app: antrea +spec: + group: crd.antrea.io + versions: + - name: v1alpha2 + served: true + storage: true + schema: + openAPIV3Schema: + type: object + required: + - spec + properties: + spec: + required: + - ipVersion + - ipRanges + type: object + properties: + ipVersion: + type: integer + enum: [ 4, 6 ] + ipRanges: + items: + oneOf: + - required: + - cidr + - gateway + - prefixLength + - required: + - start + - end + - gateway + - prefixLength + properties: + cidr: + format: cidr + type: string + start: + oneOf: + - format: ipv4 + - format: ipv6 + type: string + end: + oneOf: + - format: ipv4 + - format: ipv6 + type: string + gateway: + oneOf: + - format: ipv4 + - format: ipv6 + type: string + prefixLength: + type: integer + minimum: 1 + maximum: 128 + vlan: + type: integer + minimum: 0 + maximum: 4094 + type: object + type: array + status: + properties: + ipAddresses: + items: + properties: + ipAddress: + type: string + owner: + properties: + pod: + properties: + name: + type: string + namespace: + type: string + containerID: + type: string + ifName: + type: string + type: object + statefulSet: + properties: + name: + type: string + namespace: + type: string + index: + type: integer + type: object + type: object + phase: + type: string + type: object + type: array + usage: + properties: + used: + type: integer + total: + type: integer + type: object + type: object + additionalPrinterColumns: + - description: The number of total IPs + jsonPath: .status.usage.total + name: Total + type: integer + - description: The number of allocated IPs + jsonPath: .status.usage.used + name: Used + type: integer + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + subresources: + status: {} + scope: Cluster + names: + plural: ippools + singular: ippool + kind: IPPool + shortNames: + - ipp + +--- +# Source: crds/networkpolicy.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: networkpolicies.crd.antrea.io + labels: + app: antrea +spec: + group: crd.antrea.io + versions: + - name: v1alpha1 + served: true + storage: true + additionalPrinterColumns: + - name: Tier + type: string + description: The Tier to which this Antrea NetworkPolicy belongs to. + jsonPath: .spec.tier + - name: Priority + type: number + format: float + description: The Priority of this Antrea NetworkPolicy relative to other policies. + jsonPath: .spec.priority + - name: Desired Nodes + type: number + format: int32 + description: The total number of Nodes that should realize the NetworkPolicy. + jsonPath: .status.desiredNodesRealized + - name: Current Nodes + type: number + format: int32 + description: The number of Nodes that have realized the NetworkPolicy. + jsonPath: .status.currentNodesRealized + - name: Age + type: date + jsonPath: .metadata.creationTimestamp + schema: + openAPIV3Schema: + type: object + properties: + spec: + # Ensure that Spec.Priority field is set + required: + - priority + type: object + properties: + tier: + type: string + priority: + type: number + format: float + # Ensure that Spec.Priority field is between 1 and 10000 + minimum: 1.0 + maximum: 10000.0 + appliedTo: + type: array + items: + type: object + # Ensure that Spec.AppliedTo does not allow NamespaceSelector/IPBlock field + properties: + externalEntitySelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + group: + type: string + ingress: + type: array + items: + type: object + required: + - action + properties: + appliedTo: + type: array + items: + type: object + # Ensure that rule AppliedTo does not allow NamespaceSelector/IPBlock field + properties: + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + group: + type: string + # Ensure that Action field allows only ALLOW, DROP, REJECT and PASS values + action: + type: string + enum: ['Allow', 'Drop', 'Reject', 'Pass'] + ports: + type: array + items: + type: object + properties: + protocol: + type: string + enum: ['TCP', 'UDP', 'SCTP'] + port: + x-kubernetes-int-or-string: true + endPort: + type: integer + protocols: + type: array + items: + type: object + oneOf: + - required: [icmp] + - required: [igmp] + properties: + icmp: + type: object + properties: + icmpType: + type: integer + minimum: 0 + maximum: 255 + icmpCode: + type: integer + minimum: 0 + maximum: 255 + igmp: + type: object + properties: + igmpType: + type: integer + # Only IGMP query (0x11) is valid igmpType in ingress rules. + enum: [ 0x11 ] + groupAddress: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + from: + type: array + items: + type: object + properties: + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaceSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + externalEntitySelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + ipBlock: + type: object + properties: + cidr: + type: string + format: cidr + nodeSelector: + type: object + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + type: array + type: object + type: array + matchLabels: + x-kubernetes-preserve-unknown-fields: true + group: + type: string + name: + type: string + enableLogging: + type: boolean + egress: + type: array + items: + type: object + required: + - action + properties: + appliedTo: + type: array + items: + type: object + # Ensure that rule AppliedTo does not allow NamespaceSelector/IPBlock field + properties: + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + group: + type: string + # Ensure that Action field allows only ALLOW, DROP, REJECT and PASS values + action: + type: string + enum: ['Allow', 'Drop', 'Reject', 'Pass'] + ports: + type: array + items: + type: object + properties: + protocol: + type: string + enum: ['TCP', 'UDP', 'SCTP'] + port: + x-kubernetes-int-or-string: true + endPort: + type: integer + protocols: + type: array + items: + type: object + oneOf: + - required: [icmp] + - required: [igmp] + properties: + icmp: + type: object + properties: + icmpType: + type: integer + minimum: 0 + maximum: 255 + icmpCode: + type: integer + minimum: 0 + maximum: 255 + igmp: + type: object + properties: + igmpType: + type: integer + # Only IGMP reports are igmpType in egress rules, + # 0x12 is IGMP report V1, 0x16 is IGMP report v2, 0x22 is IGMP report v3. + # It will match all IGMP report types if igmpType is not set. + enum: [ 0x12, 0x16, 0x22 ] + groupAddress: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + to: + type: array + items: + type: object + properties: + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaceSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + externalEntitySelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + ipBlock: + type: object + properties: + cidr: + type: string + format: cidr + fqdn: + type: string + nodeSelector: + type: object + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + type: array + type: object + type: array + matchLabels: + x-kubernetes-preserve-unknown-fields: true + group: + type: string + toServices: + type: array + items: + type: object + required: + - name + properties: + name: + type: string + namespace: + type: string + name: + type: string + enableLogging: + type: boolean + status: + type: object + properties: + phase: + type: string + observedGeneration: + type: integer + currentNodesRealized: + type: integer + desiredNodesRealized: + type: integer + conditions: + type: array + items: + type: object + properties: + type: + type: string + status: + type: string + lastTransitionTime: + type: string + reason: + type: string + message: + type: string + subresources: + status: {} + scope: Namespaced + names: + plural: networkpolicies + singular: networkpolicy + kind: NetworkPolicy + shortNames: + - anp + +--- +# Source: crds/supportbundlecollection.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: supportbundlecollections.crd.antrea.io +spec: + group: crd.antrea.io + versions: + - name: v1alpha1 + served: true + storage: true + schema: + openAPIV3Schema: + type: object + properties: + spec: + type: object + required: + - fileServer + - authentication + anyOf: + - required: + - nodes + - required: + - externalNodes + properties: + nodes: + type: object + properties: + nodeNames: + type: array + items: + type: string + nodeSelector: + type: object + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + type: array + type: object + type: array + matchLabels: + x-kubernetes-preserve-unknown-fields: true + externalNodes: + type: object + required: + - namespace + properties: + namespace: + type: string + nodeNames: + type: array + items: + type: string + nodeSelector: + type: object + properties: + matchExpressions: + items: + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + type: array + type: object + type: array + matchLabels: + x-kubernetes-preserve-unknown-fields: true + expirationMinutes: + type: integer + default: 60 + sinceTime: + type: string + format: duration + fileServer: + type: object + properties: + url: + type: string + authentication: + type: object + properties: + authType: + type: string + enum: ["BearerToken", "APIKey"] + authSecret: + type: object + properties: + name: + type: string + namespace: + type: string + status: + type: object + properties: + collectedNodes: + type: integer + desiredNodes: + type: integer + conditions: + type: array + items: + type: object + properties: + type: + type: string + status: + type: string + lastTransitionTime: + type: string + reason: + type: string + message: + type: string + subresources: + status: {} + scope: Cluster + names: + plural: supportbundlecollections + singular: supportbundlecollection + kind: SupportBundleCollection + shortNames: + - sbc + +--- +# Source: crds/tier.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: tiers.crd.antrea.io + labels: + app: antrea +spec: + group: crd.antrea.io + versions: + - name: v1alpha1 + served: true + storage: true + additionalPrinterColumns: + - name: Priority + type: integer + description: The Priority of this Tier relative to other Tiers. + jsonPath: .spec.priority + - name: Age + type: date + jsonPath: .metadata.creationTimestamp + schema: + openAPIV3Schema: + type: object + properties: + spec: + required: + - priority + type: object + properties: + priority: + type: integer + minimum: 0 + maximum: 255 + description: + type: string + scope: Cluster + names: + plural: tiers + singular: tier + kind: Tier + shortNames: + - tr + +--- +# Source: crds/traceflow.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: traceflows.crd.antrea.io + labels: + app: antrea +spec: + group: crd.antrea.io + versions: + - name: v1alpha1 + served: true + storage: true + additionalPrinterColumns: + - jsonPath: .status.phase + description: The phase of the Traceflow. + name: Phase + type: string + - jsonPath: .spec.source.pod + description: The name of the source Pod. + name: Source-Pod + type: string + priority: 10 + - jsonPath: .spec.destination.pod + description: The name of the destination Pod. + name: Destination-Pod + type: string + priority: 10 + - jsonPath: .spec.destination.ip + description: The IP address of the destination. + name: Destination-IP + type: string + priority: 10 + - jsonPath: .spec.liveTraffic + description: Trace live traffic. + name: Live-Traffic + type: boolean + priority: 10 + - jsonPath: .spec.droppedOnly + description: Capture only the dropped packet. + name: Dropped-Only + type: boolean + priority: 10 + - jsonPath: .spec.timeout + description: Timeout in seconds. + name: Timeout + type: integer + priority: 10 + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + schema: + openAPIV3Schema: + type: object + required: + - spec + properties: + spec: + type: object + properties: + source: + type: object + properties: + pod: + type: string + namespace: + type: string + ip: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + destination: + type: object + properties: + pod: + type: string + service: + type: string + namespace: + type: string + ip: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + packet: + type: object + properties: + ipHeader: + type: object + properties: + srcIP: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + protocol: + type: integer + ttl: + type: integer + flags: + type: integer + ipv6Header: + type: object + properties: + srcIP: + type: string + format: ipv6 + nextHeader: + type: integer + hopLimit: + type: integer + transportHeader: + type: object + properties: + icmp: + type: object + properties: + id: + type: integer + sequence: + type: integer + udp: + type: object + properties: + srcPort: + type: integer + dstPort: + type: integer + tcp: + type: object + properties: + srcPort: + type: integer + dstPort: + type: integer + flags: + type: integer + liveTraffic: + type: boolean + droppedOnly: + type: boolean + timeout: + type: integer + status: + type: object + properties: + reason: + type: string + dataplaneTag: + type: integer + phase: + type: string + startTime: + type: string + results: + type: array + items: + type: object + properties: + node: + type: string + role: + type: string + timestamp: + type: integer + observations: + type: array + items: + type: object + properties: + component: + type: string + componentInfo: + type: string + action: + type: string + pod: + type: string + dstMAC: + type: string + networkPolicy: + type: string + ttl: + type: integer + translatedSrcIP: + type: string + translatedDstIP: + type: string + tunnelDstIP: + type: string + capturedPacket: + properties: + srcIP: + type: string + dstIP: + type: string + length: + type: integer + ipHeader: + properties: + flags: + type: integer + protocol: + type: integer + ttl: + type: integer + type: object + ipv6Header: + properties: + hopLimit: + type: integer + nextHeader: + type: integer + type: object + transportHeader: + properties: + tcp: + properties: + dstPort: + type: integer + srcPort: + type: integer + flags: + type: integer + type: object + udp: + properties: + dstPort: + type: integer + srcPort: + type: integer + type: object + icmp: + properties: + id: + type: integer + sequence: + type: integer + type: object + type: object + type: object + subresources: + status: {} + scope: Cluster + names: + plural: traceflows + singular: traceflow + kind: Traceflow + shortNames: + - tf + +--- +# Source: crds/trafficcontrol.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: trafficcontrols.crd.antrea.io +spec: + group: crd.antrea.io + versions: + - name: v1alpha2 + served: true + storage: true + schema: + openAPIV3Schema: + type: object + required: + - spec + properties: + spec: + type: object + required: + - appliedTo + - direction + - action + - targetPort + properties: + appliedTo: + type: object + properties: + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaceSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + pattern: "^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])?$" + matchLabels: + x-kubernetes-preserve-unknown-fields: true + direction: + type: string + enum: + - Ingress + - Egress + - Both + action: + type: string + enum: + - Mirror + - Redirect + targetPort: + type: object + oneOf: + - required: [ovsInternal] + - required: [device] + - required: [geneve] + - required: [vxlan] + - required: [gre] + - required: [erspan] + properties: + ovsInternal: + type: object + required: + - name + properties: + name: + type: string + device: + type: object + required: + - name + properties: + name: + type: string + geneve: + type: object + required: + - remoteIP + properties: + remoteIP: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + vni: + type: integer + minimum: 0 + maximum: 16777215 + destinationPort: + type: integer + minimum: 1 + maximum: 65535 + vxlan: + type: object + required: + - remoteIP + properties: + remoteIP: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + vni: + type: integer + minimum: 0 + maximum: 16777215 + destinationPort: + type: integer + minimum: 1 + maximum: 65535 + gre: + type: object + required: + - remoteIP + properties: + remoteIP: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + key: + type: integer + minimum: 0 + maximum: 4294967295 + erspan: + type: object + required: + - remoteIP + - version + properties: + remoteIP: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + sessionID: + type: integer + minimum: 0 + maximum: 1023 + version: + type: integer + enum: + - 1 + - 2 + index: + type: integer + dir: + type: integer + enum: + - 0 + - 1 + hardwareID: + type: integer + returnPort: + type: object + oneOf: + - required: [ovsInternal] + - required: [device] + - required: [geneve] + - required: [vxlan] + - required: [gre] + properties: + ovsInternal: + type: object + required: + - name + properties: + name: + type: string + device: + type: object + required: + - name + properties: + name: + type: string + geneve: + type: object + required: + - remoteIP + properties: + remoteIP: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + vni: + type: integer + minimum: 0 + maximum: 16777215 + destinationPort: + type: integer + minimum: 1 + maximum: 65535 + vxlan: + type: object + required: + - remoteIP + properties: + remoteIP: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + vni: + type: integer + minimum: 0 + maximum: 16777215 + destinationPort: + type: integer + minimum: 1 + maximum: 65535 + gre: + type: object + required: + - remoteIP + properties: + remoteIP: + type: string + oneOf: + - format: ipv4 + - format: ipv6 + key: + type: integer + minimum: 0 + maximum: 4294967295 + additionalPrinterColumns: + - description: Specifies the direction of traffic that should be matched. + jsonPath: .spec.direction + name: Direction + type: string + - description: Specifies the action that should be taken for the traffic. + jsonPath: .spec.action + name: Action + type: string + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + subresources: + status: {} + scope: Cluster + names: + plural: trafficcontrols + singular: trafficcontrol + kind: TrafficControl + shortNames: + - tc + +--- +# Source: antrea/templates/agent/serviceaccount.yaml +apiVersion: v1 +kind: ServiceAccount +metadata: + name: antrea-agent + namespace: kube-system + labels: + app: antrea +--- +# Source: antrea/templates/antctl/serviceaccount.yaml +apiVersion: v1 +kind: ServiceAccount +metadata: + name: antctl + namespace: kube-system + labels: + app: antrea +--- +# Source: antrea/templates/controller/serviceaccount.yaml +apiVersion: v1 +kind: ServiceAccount +metadata: + name: antrea-controller + namespace: kube-system + labels: + app: antrea +--- +# Source: antrea/templates/whereabouts/serviceaccount.yaml +apiVersion: v1 +kind: ServiceAccount +metadata: + name: antrea-agent-whereabouts + namespace: kube-system + labels: + app: antrea +--- +# Source: antrea/templates/agent/secret.yaml +apiVersion: v1 +kind: Secret +metadata: + name: antrea-agent-service-account-token + namespace: kube-system + annotations: + kubernetes.io/service-account.name: antrea-agent +type: kubernetes.io/service-account-token +--- +# Source: antrea/templates/antctl/secret.yaml +apiVersion: v1 +kind: Secret +metadata: + name: antctl-service-account-token + namespace: kube-system + annotations: + kubernetes.io/service-account.name: antctl +type: kubernetes.io/service-account-token +--- +# Source: antrea/templates/whereabouts/secret.yaml +apiVersion: v1 +kind: Secret +metadata: + name: whereabouts-cni-secret + namespace: kube-system + annotations: + kubernetes.io/service-account.name: antrea-agent-whereabouts + labels: + app: antrea +type: kubernetes.io/service-account-token +--- +# Source: antrea/templates/configmap.yaml +apiVersion: v1 +kind: ConfigMap +metadata: + name: antrea-config + namespace: kube-system + labels: + app: antrea +data: + antrea-agent.conf: | + # FeatureGates is a map of feature names to bools that enable or disable experimental features. + featureGates: + # AllAlpha is a global toggle for alpha features. Per-feature key values override the default set by AllAlpha. + # AllAlpha: false + + # AllBeta is a global toggle for beta features. Per-feature key values override the default set by AllBeta. + # AllBeta: false + + # Enable AntreaProxy which provides ServiceLB for in-cluster Services in antrea-agent. + # It should be enabled on Windows, otherwise NetworkPolicy will not take effect on + # Service traffic. + # AntreaProxy: true + + # Enable EndpointSlice support in AntreaProxy. Don't enable this feature unless that EndpointSlice + # API version v1 is supported and set as enabled in Kubernetes. If AntreaProxy is not enabled, + # this flag will not take effect. + # EndpointSlice: false + + # Enable TopologyAwareHints in AntreaProxy. This requires AntreaProxy and EndpointSlice to be + # enabled, otherwise this flag will not take effect. + # TopologyAwareHints: false + + # Enable traceflow which provides packet tracing feature to diagnose network issue. + # Traceflow: true + + # Enable NodePortLocal feature to make the Pods reachable externally through NodePort + # NodePortLocal: true + + # Enable Antrea ClusterNetworkPolicy feature to complement K8s NetworkPolicy for cluster admins + # to define security policies which apply to the entire cluster, and Antrea NetworkPolicy + # feature that supports priorities, rule actions and externalEntities in the future. + # AntreaPolicy: true + + # Enable flowexporter which exports polled conntrack connections as IPFIX flow records from each + # agent to a configured collector. + # FlowExporter: false + + # Enable collecting and exposing NetworkPolicy statistics. + # NetworkPolicyStats: true + + # Enable controlling SNAT IPs of Pod egress traffic. + # Egress: true + + # Enable AntreaIPAM, which can allocate IP addresses from IPPools. AntreaIPAM is required by the + # bridging mode and allocates IPs to Pods in bridging mode. It is also required to use Antrea for + # IPAM when configuring secondary network interfaces with Multus. + # AntreaIPAM: false + + # Enable multicast traffic. + # Multicast: false + + # Enable Antrea Multi-cluster Gateway to support cross-cluster traffic. + # This feature is supported only with encap mode. + # Multicluster: false + + # Enable support for provisioning secondary network interfaces for Pods (using + # Pod annotations). At the moment, Antrea can only create secondary network + # interfaces using SR-IOV VFs on baremetal Nodes. + # SecondaryNetwork: false + + # Enable managing external IPs of Services of LoadBalancer type. + # ServiceExternalIP: false + + # Enable mirroring or redirecting the traffic Pods send or receive. + # TrafficControl: false + + # Enable certificated-based authentication for IPsec. + # IPsecCertAuth: false + + # Name of the OpenVSwitch bridge antrea-agent will create and use. + # Make sure it doesn't conflict with your existing OpenVSwitch bridges. + ovsBridge: "br-int" + + # Datapath type to use for the OpenVSwitch bridge created by Antrea. At the moment, the only + # supported value is 'system', which corresponds to the kernel datapath. + #ovsDatapathType: system + + # Name of the interface antrea-agent will create and use for host <--> pod communication. + # Make sure it doesn't conflict with your existing interfaces. + hostGateway: "antrea-gw0" + + # Determines how traffic is encapsulated. It has the following options: + # encap(default): Inter-node Pod traffic is always encapsulated and Pod to external network + # traffic is SNAT'd. + # noEncap: Inter-node Pod traffic is not encapsulated; Pod to external network traffic is + # SNAT'd if noSNAT is not set to true. Underlying network must be capable of + # supporting Pod traffic across IP subnets. + # hybrid: noEncap if source and destination Nodes are on the same subnet, otherwise encap. + # networkPolicyOnly: Antrea enforces NetworkPolicy only, and utilizes CNI chaining and delegates Pod + # IPAM and connectivity to the primary CNI. + # + trafficEncapMode: "encap" + + # Whether or not to SNAT (using the Node IP) the egress traffic from a Pod to the external network. + # This option is for the noEncap traffic mode only, and the default value is false. In the noEncap + # mode, if the cluster's Pod CIDR is reachable from the external network, then the Pod traffic to + # the external network needs not be SNAT'd. In the networkPolicyOnly mode, antrea-agent never + # performs SNAT and this option will be ignored; for other modes it must be set to false. + noSNAT: false + + # Tunnel protocols used for encapsulating traffic across Nodes. If WireGuard is enabled in trafficEncryptionMode, + # this option will not take effect. Supported values: + # - geneve (default) + # - vxlan + # - gre + # - stt + # Note that "gre" is not supported for IPv6 clusters (IPv6-only or dual-stack clusters). + tunnelType: "geneve" + + # TunnelPort is the destination port for UDP and TCP based tunnel protocols (Geneve, VXLAN, and STT). + # If zero, it will use the assigned IANA port for the protocol, i.e. 6081 for Geneve, 4789 for VXLAN, + # and 7471 for STT. + tunnelPort: 0 + + # Determines how tunnel traffic is encrypted. Currently encryption only works with encap mode. + # It has the following options: + # - none (default): Inter-node Pod traffic will not be encrypted. + # - ipsec: Enable IPsec (ESP) encryption for Pod traffic across Nodes. Antrea uses + # Preshared Key (PSK) for IKE authentication. When IPsec tunnel is enabled, + # the PSK value must be passed to Antrea Agent through an environment + # variable: ANTREA_IPSEC_PSK. + # - wireGuard: Enable WireGuard for tunnel traffic encryption. + trafficEncryptionMode: "none" + + # Enable bridging mode of Pod network on Nodes, in which the Node's transport interface is connected + # to the OVS bridge, and cross-Node/VLAN traffic of AntreaIPAM Pods (Pods whose IP addresses are + # allocated by AntreaIPAM from IPPools) is sent to the underlay network, and forwarded/routed by the + # underlay network. + # This option requires the `AntreaIPAM` feature gate to be enabled. At this moment, it supports only + # IPv4 and Linux Nodes, and can be enabled only when `ovsDatapathType` is `system`, + # `trafficEncapMode` is `noEncap`, and `noSNAT` is true. + enableBridgingMode: false + + # Disable TX checksum offloading for container network interfaces. It's supposed to be set to true when the + # datapath doesn't support TX checksum offloading, which causes packets to be dropped due to bad checksum. + # It affects Pods running on Linux Nodes only. + disableTXChecksumOffload: false + + # Default MTU to use for the host gateway interface and the network interface of each Pod. + # If omitted, antrea-agent will discover the MTU of the Node's primary interface and + # also adjust MTU to accommodate for tunnel encapsulation overhead (if applicable). + defaultMTU: 0 + + # wireGuard specifies WireGuard related configurations. + wireGuard: + # The port for WireGuard to receive traffic. + port: 51820 + + egress: + # exceptCIDRs is the CIDR ranges to which outbound Pod traffic will not be SNAT'd by Egresses. + exceptCIDRs: + + # ClusterIP CIDR range for Services. It's required when AntreaProxy is not enabled, and should be + # set to the same value as the one specified by --service-cluster-ip-range for kube-apiserver. When + # AntreaProxy is enabled, this parameter is not needed and will be ignored if provided. + serviceCIDR: "" + + # ClusterIP CIDR range for IPv6 Services. It's required when using kube-proxy to provide IPv6 Service in a Dual-Stack + # cluster or an IPv6 only cluster. The value should be the same as the configuration for kube-apiserver specified by + # --service-cluster-ip-range. When AntreaProxy is enabled, this parameter is not needed. + # No default value for this field. + serviceCIDRv6: "" + + # The port for the antrea-agent APIServer to serve on. + # Note that if it's set to another value, the `containerPort` of the `api` port of the + # `antrea-agent` container must be set to the same value. + apiPort: 10350 + + # Enable metrics exposure via Prometheus. Initializes Prometheus metrics listener. + enablePrometheusMetrics: true + + # Provide the IPFIX collector address as a string with format :[][:]. + # HOST can either be the DNS name or the IP of the Flow Collector. For example, + # "flow-aggregator.flow-aggregator.svc" can be provided as DNS name to connect + # to the Antrea Flow Aggregator service. If IP, it can be either IPv4 or IPv6. + # However, IPv6 address should be wrapped with []. + # If PORT is empty, we default to 4739, the standard IPFIX port. + # If no PROTO is given, we consider "tls" as default. We support "tls", "tcp" and + # "udp" protocols. "tls" is used for securing communication between flow exporter and + # flow aggregator. + flowCollectorAddr: "flow-aggregator.flow-aggregator.svc:4739:tls" + + # Provide flow poll interval as a duration string. This determines how often the + # flow exporter dumps connections from the conntrack module. Flow poll interval + # should be greater than or equal to 1s (one second). + # Valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h". + flowPollInterval: "5s" + + # Provide the active flow export timeout, which is the timeout after which a flow + # record is sent to the collector for active flows. Thus, for flows with a continuous + # stream of packets, a flow record will be exported to the collector once the elapsed + # time since the last export event is equal to the value of this timeout. + # Valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h". + activeFlowExportTimeout: "5s" + + # Provide the idle flow export timeout, which is the timeout after which a flow + # record is sent to the collector for idle flows. A flow is considered idle if no + # packet matching this flow has been observed since the last export event. + # Valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h". + idleFlowExportTimeout: "15s" + + nodePortLocal: + # Enable NodePortLocal, a feature used to make Pods reachable using port forwarding on the host. To + # enable this feature, you need to set "enable" to true, and ensure that the NodePortLocal feature + # gate is also enabled (which is the default). + enable: false + # Provide the port range used by NodePortLocal. When the NodePortLocal feature is enabled, a port + # from that range will be assigned whenever a Pod's container defines a specific port to be exposed + # (each container can define a list of ports as pod.spec.containers[].ports), and all Node traffic + # directed to that port will be forwarded to the Pod. + portRange: "61000-62000" + + # Provide the address of Kubernetes apiserver, to override any value provided in kubeconfig or InClusterConfig. + # Defaults to "". It must be a host string, a host:port pair, or a URL to the base of the apiserver. + kubeAPIServerOverride: "" + + # Provide the address of DNS server, to override the kube-dns service. It's used to resolve hostname in FQDN policy. + # Defaults to "". It must be a host string or a host:port pair of the DNS server (e.g. 10.96.0.10, 10.96.0.10:53, + # [fd00:10:96::a]:53). + dnsServerOverride: "" + + # Comma-separated list of Cipher Suites. If omitted, the default Go Cipher Suites will be used. + # https://golang.org/pkg/crypto/tls/#pkg-constants + # Note that TLS1.3 Cipher Suites cannot be added to the list. But the apiserver will always + # prefer TLS1.3 Cipher Suites whenever possible. + tlsCipherSuites: "" + + # TLS min version from: VersionTLS10, VersionTLS11, VersionTLS12, VersionTLS13. + tlsMinVersion: "" + + # The name of the interface on Node which is used for tunneling or routing the traffic across Nodes. + # If there are multiple IP addresses configured on the interface, the first one is used. The IP + # address used for tunneling or routing traffic to remote Nodes is decided in the following order of + # preference (from highest to lowest): + # 1. transportInterface + # 2. transportInterfaceCIDRs + # 3. The Node IP + transportInterface: "" + + multicast: + # The names of the interfaces on Nodes that are used to forward multicast traffic. + # Defaults to transport interface if not set. + multicastInterfaces: + + # The interval at which the antrea-agent sends IGMP queries to Pods. + # Valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h". + igmpQueryInterval: "125s" + + # The network CIDRs of the interface on Node which is used for tunneling or routing the traffic across + # Nodes. If there are multiple interfaces configured the same network CIDR, the first one is used. The + # IP address used for tunneling or routing traffic to remote Nodes is decided in the following order of + # preference (from highest to lowest): + # 1. transportInterface + # 2. transportInterfaceCIDRs + # 3. The Node IP + transportInterfaceCIDRs: + + # Option antreaProxy contains AntreaProxy related configuration options. + antreaProxy: + # ProxyAll tells antrea-agent to proxy all Service traffic, including NodePort, LoadBalancer, and ClusterIP traffic, + # regardless of where they come from. Therefore, running kube-proxy is no longer required. This requires the AntreaProxy + # feature to be enabled. + # Note that this option is experimental. If kube-proxy is removed, option kubeAPIServerOverride must be used to access + # apiserver directly. + proxyAll: false + # A string array of values which specifies the host IPv4/IPv6 addresses for NodePort. Values can be valid IP blocks. + # (e.g. 1.2.3.0/24, 1.2.3.4/32). An empty string slice is meant to select all host IPv4/IPv6 addresses. + # Note that the option is only valid when proxyAll is true. + nodePortAddresses: + # An array of string values to specify a list of Services which should be ignored by AntreaProxy (traffic to these + # Services will not be load-balanced). Values can be a valid ClusterIP (e.g. 10.11.1.2) or a Service name + # with Namespace (e.g. kube-system/kube-dns) + skipServices: + # When ProxyLoadBalancerIPs is set to false, AntreaProxy no longer load-balances traffic destined to the + # External IPs of LoadBalancer Services. This is useful when the external LoadBalancer provides additional + # capabilities (e.g. TLS termination) and it is desirable for Pod-to-ExternalIP traffic to be sent to the + # external LoadBalancer instead of being load-balanced to an Endpoint directly by AntreaProxy. + # Note that setting ProxyLoadBalancerIPs to false usually only makes sense when ProxyAll is set to true and + # kube-proxy is removed from the cluser, otherwise kube-proxy will still load-balance this traffic. + proxyLoadBalancerIPs: true + + # IPsec tunnel related configurations. + ipsec: + # The authentication mode of IPsec tunnel. It has the following options: + # - psk (default): Use pre-shared key (PSK) for IKE authentication. + # - cert: Use CA-signed certificates for IKE authentication. This option requires the `IPsecCertAuth` + # feature gate to be enabled. + authenticationMode: "psk" + + multicluster: + # Enable Antrea Multi-cluster Gateway to support cross-cluster traffic. + # This feature is supported only with encap mode. + enable: false + # The Namespace where Antrea Multi-cluster Controller is running. + # The default is antrea-agent's Namespace. + namespace: "" + antrea-cni.conflist: | + { + "cniVersion":"0.3.0", + "name": "antrea", + "plugins": [ + { + "type": "antrea", + "ipam": { + "type": "host-local" + } + } + , + { + "type": "portmap", + "capabilities": {"portMappings": true} + } + , + { + "type": "bandwidth", + "capabilities": {"bandwidth": true} + } + ] + } + antrea-controller.conf: | + # FeatureGates is a map of feature names to bools that enable or disable experimental features. + featureGates: + # AllAlpha is a global toggle for alpha features. Per-feature key values override the default set by AllAlpha. + # AllAlpha: false + + # AllBeta is a global toggle for beta features. Per-feature key values override the default set by AllBeta. + # AllBeta: false + + # Enable traceflow which provides packet tracing feature to diagnose network issue. + # Traceflow: true + + # Enable Antrea ClusterNetworkPolicy feature to complement K8s NetworkPolicy for cluster admins + # to define security policies which apply to the entire cluster, and Antrea NetworkPolicy + # feature that supports priorities, rule actions and externalEntities in the future. + # AntreaPolicy: true + + # Enable collecting and exposing NetworkPolicy statistics. + # NetworkPolicyStats: true + + # Enable multicast traffic. + # Multicast: false + + # Enable controlling SNAT IPs of Pod egress traffic. + # Egress: true + + # Run Kubernetes NodeIPAMController with Antrea. + # NodeIPAM: false + + # Enable AntreaIPAM, which can allocate IP addresses from IPPools. AntreaIPAM is required by the + # bridging mode and allocates IPs to Pods in bridging mode. It is also required to use Antrea for + # IPAM when configuring secondary network interfaces with Multus. + # AntreaIPAM: false + + # Enable managing external IPs of Services of LoadBalancer type. + # ServiceExternalIP: false + + # Enable certificated-based authentication for IPsec. + # IPsecCertAuth: false + + # Enable managing ExternalNode for unmanaged VM/BM. + # ExternalNode: false + + # The port for the antrea-controller APIServer to serve on. + # Note that if it's set to another value, the `containerPort` of the `api` port of the + # `antrea-controller` container must be set to the same value. + apiPort: 10349 + + # Enable metrics exposure via Prometheus. Initializes Prometheus metrics listener. + enablePrometheusMetrics: true + + # Indicates whether to use auto-generated self-signed TLS certificate. + # If false, a Secret named "antrea-controller-tls" must be provided with the following keys: + # ca.crt: + # tls.crt: + # tls.key: + selfSignedCert: true + + # Comma-separated list of Cipher Suites. If omitted, the default Go Cipher Suites will be used. + # https://golang.org/pkg/crypto/tls/#pkg-constants + # Note that TLS1.3 Cipher Suites cannot be added to the list. But the apiserver will always + # prefer TLS1.3 Cipher Suites whenever possible. + tlsCipherSuites: "" + + # TLS min version from: VersionTLS10, VersionTLS11, VersionTLS12, VersionTLS13. + tlsMinVersion: "" + + nodeIPAM: + # Enable the integrated Node IPAM controller within the Antrea controller. + enableNodeIPAM: false + # CIDR ranges for Pods in cluster. String array containing single CIDR range, or multiple ranges. + # The CIDRs could be either IPv4 or IPv6. At most one CIDR may be specified for each IP family. + # Value ignored when enableNodeIPAM is false. + clusterCIDRs: + # CIDR ranges for Services in cluster. It is not necessary to specify it when there is no overlap with clusterCIDRs. + # Value ignored when enableNodeIPAM is false. + serviceCIDR: "" + serviceCIDRv6: "" + # Mask size for IPv4 Node CIDR in IPv4 or dual-stack cluster. Value ignored when enableNodeIPAM is false + # or when IPv4 Pod CIDR is not configured. Valid range is 16 to 30. + nodeCIDRMaskSizeIPv4: 24 + # Mask size for IPv6 Node CIDR in IPv6 or dual-stack cluster. Value ignored when enableNodeIPAM is false + # or when IPv6 Pod CIDR is not configured. Valid range is 64 to 126. + nodeCIDRMaskSizeIPv6: 64 + + ipsecCSRSigner: + # Determines the auto-approve policy of Antrea CSR signer for IPsec certificates management. + # If enabled, Antrea will auto-approve the CertificateSingingRequest (CSR) if its subject and x509 extensions + # are permitted, and the requestor can be validated. If K8s `BoundServiceAccountTokenVolume` feature is enabled, + # the Pod identity will also be validated to provide maximum security. + # If set to false, Antrea will not auto-approve CertificateSingingRequests and they need to be approved + # manually by `kubectl certificate approve`. + autoApprove: true + # Indicates whether to use auto-generated self-signed CA certificate. + # If false, a Secret named "antrea-ipsec-ca" must be provided with the following keys: + # tls.crt: + # tls.key: + selfSignedCA: true +--- +# Source: antrea/templates/crds/group.yaml +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: groups.crd.antrea.io +spec: + group: crd.antrea.io + versions: + - name: v1alpha3 + served: true + storage: true + schema: + openAPIV3Schema: + type: object + properties: + spec: + type: object + properties: + childGroups: + type: array + items: + type: string + podSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + matchLabels: + x-kubernetes-preserve-unknown-fields: true + namespaceSelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + matchLabels: + x-kubernetes-preserve-unknown-fields: true + externalEntitySelector: + type: object + properties: + matchExpressions: + type: array + items: + type: object + properties: + key: + type: string + operator: + enum: + - In + - NotIn + - Exists + - DoesNotExist + type: string + values: + type: array + items: + type: string + matchLabels: + x-kubernetes-preserve-unknown-fields: true + ipBlocks: + type: array + items: + type: object + properties: + cidr: + type: string + format: cidr + serviceReference: + type: object + properties: + name: + type: string + namespace: + type: string + status: + type: object + properties: + conditions: + type: array + items: + type: object + properties: + type: + type: string + status: + type: string + lastTransitionTime: + type: string + subresources: + status: {} + scope: Namespaced + names: + plural: groups + singular: group + kind: Group + shortNames: + - grp +--- +# Source: antrea/templates/agent/clusterrole.yaml +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: antrea-agent + labels: + app: antrea +rules: + - apiGroups: + - "" + resources: + - nodes + verbs: + - get + - watch + - list + - apiGroups: + - "" + resources: + - nodes/status + verbs: + - patch + - apiGroups: + - "" + resources: + - pods + verbs: + - get + - watch + - list + - apiGroups: + - "" + resources: + - pods/status + verbs: + - patch + - apiGroups: + - "" + resources: + - endpoints + - services + - namespaces + verbs: + - get + - watch + - list + - apiGroups: + - discovery.k8s.io + resources: + - endpointslices + verbs: + - get + - watch + - list + - apiGroups: + - crd.antrea.io + resources: + - antreaagentinfos + verbs: + - get + - update + - apiGroups: + - controlplane.antrea.io + resources: + - networkpolicies + - appliedtogroups + - addressgroups + verbs: + - get + - watch + - list + - apiGroups: + - controlplane.antrea.io + resources: + - egressgroups + verbs: + - get + - watch + - list + - apiGroups: + - controlplane.antrea.io + resources: + - nodestatssummaries + verbs: + - create + - apiGroups: + - controlplane.antrea.io + resources: + - networkpolicies/status + verbs: + - create + - get + - apiGroups: + - authentication.k8s.io + resources: + - tokenreviews + verbs: + - create + - apiGroups: + - authorization.k8s.io + resources: + - subjectaccessreviews + verbs: + - create + # This is the content of built-in role kube-system/extension-apiserver-authentication-reader. + # But it doesn't have list/watch permission before K8s v1.17.0 so the extension apiserver (antrea-agent) will + # have permission issue after bumping up apiserver library to a version that supports dynamic authentication. + # See https://github.com/kubernetes/kubernetes/pull/85375 + # To support K8s clusters older than v1.17.0, we grant the required permissions directly instead of relying on + # the extension-apiserver-authentication role. + - apiGroups: + - "" + resourceNames: + - extension-apiserver-authentication + resources: + - configmaps + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - configmaps + resourceNames: + - antrea-ca + verbs: + - get + - watch + - list + - apiGroups: + - crd.antrea.io + resources: + - traceflows + - traceflows/status + verbs: + - get + - watch + - list + - update + - patch + - create + - delete + - apiGroups: + - crd.antrea.io + resources: + - egresses + verbs: + - get + - watch + - list + - apiGroups: + - crd.antrea.io + resources: + - egresses/status + verbs: + - update + - apiGroups: + - crd.antrea.io + resources: + - externalippools + - ippools + - trafficcontrols + verbs: + - get + - watch + - list + - apiGroups: + - crd.antrea.io + resources: + - ippools/status + verbs: + - update + - apiGroups: + - k8s.cni.cncf.io + resources: + - network-attachment-definitions + verbs: + - get + - list + - watch + - apiGroups: + - certificates.k8s.io + resources: + - certificatesigningrequests + verbs: + - get + - watch + - list + - create + - apiGroups: + - multicluster.crd.antrea.io + resources: + - gateways + verbs: + - get + - list + - watch + - apiGroups: + - multicluster.crd.antrea.io + resources: + - clusterinfoimports + verbs: + - get + - list + - watch +--- +# Source: antrea/templates/antctl/clusterrole.yaml +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: antctl + labels: + app: antrea +rules: + - apiGroups: + - controlplane.antrea.io + resources: + - networkpolicies + - appliedtogroups + - addressgroups + verbs: + - get + - list + - apiGroups: + - stats.antrea.io + resources: + - networkpolicystats + - antreaclusternetworkpolicystats + - antreanetworkpolicystats + verbs: + - get + - list + - apiGroups: + - system.antrea.io + resources: + - controllerinfos + - agentinfos + verbs: + - get + - apiGroups: + - system.antrea.io + resources: + - supportbundles + verbs: + - get + - post + - apiGroups: + - system.antrea.io + resources: + - supportbundles/download + verbs: + - get + - nonResourceURLs: + - /agentinfo + - /addressgroups + - /appliedtogroups + - /loglevel + - /networkpolicies + - /ovsflows + - /ovstracing + - /podinterfaces + - /featuregates + - /serviceexternalip + verbs: + - get +--- +# Source: antrea/templates/cluster-identity-reader/clusterrolebinding.yaml +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: antrea-cluster-identity-reader + labels: + app: antrea +rules: + - apiGroups: + - "" + resources: + - configmaps + resourceNames: + - antrea-cluster-identity + verbs: + - get +--- +# Source: antrea/templates/controller/clusterrole.yaml +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: antrea-controller + labels: + app: antrea +rules: + - apiGroups: + - "" + resources: + - pods + - services + - namespaces + - configmaps + verbs: + - get + - watch + - list + - apiGroups: + - "" + resources: + - nodes + verbs: + - get + - watch + - list + - patch + - apiGroups: + - "" + resources: + - services/status + verbs: + - update + - apiGroups: + - networking.k8s.io + resources: + - networkpolicies + verbs: + - get + - watch + - list + - apiGroups: + - authentication.k8s.io + resources: + - tokenreviews + verbs: + - create + - apiGroups: + - authorization.k8s.io + resources: + - subjectaccessreviews + verbs: + - create + - apiGroups: + - apiextensions.k8s.io + resources: + - customresourcedefinitions + verbs: + - get + - update + # This is the content of built-in role kube-system/extension-apiserver-authentication-reader. + # But it doesn't have list/watch permission before K8s v1.17.0 so the extension apiserver (antrea-controller) will + # have permission issue after bumping up apiserver library to a version that supports dynamic authentication. + # See https://github.com/kubernetes/kubernetes/pull/85375 + # To support K8s clusters older than v1.17.0, we grant the required permissions directly instead of relying on + # the extension-apiserver-authentication role. + - apiGroups: + - "" + resourceNames: + - extension-apiserver-authentication + resources: + - configmaps + verbs: + - get + - list + - watch + - apiGroups: + - "" + resources: + - configmaps + resourceNames: + - antrea-ca + - antrea-ipsec-ca + - antrea-cluster-identity + verbs: + - get + - update + - apiGroups: + - "" + resources: + - secrets + resourceNames: + - antrea-ipsec-ca + verbs: + - get + - update + - watch + - apiGroups: + - "" + resources: + - configmaps + - secrets + verbs: + - create + - apiGroups: + - apiregistration.k8s.io + resources: + - apiservices + resourceNames: + - v1alpha1.stats.antrea.io + - v1beta1.system.antrea.io + - v1beta2.controlplane.antrea.io + verbs: + - get + - update + - apiGroups: + - apiregistration.k8s.io + resources: + - apiservices + resourceNames: + - v1beta1.networking.antrea.tanzu.vmware.com + - v1beta1.controlplane.antrea.tanzu.vmware.com + - v1alpha1.stats.antrea.tanzu.vmware.com + - v1beta1.system.antrea.tanzu.vmware.com + - v1beta2.controlplane.antrea.tanzu.vmware.com + verbs: + - delete + - apiGroups: + - admissionregistration.k8s.io + resources: + - mutatingwebhookconfigurations + - validatingwebhookconfigurations + resourceNames: + # always give permissions for labelsmutator.antrea.io, even when the + # feature is disabled, to avoid errors in antrea-controller when updating + # the CA cert. + - labelsmutator.antrea.io + - crdmutator.antrea.io + - crdvalidator.antrea.io + verbs: + - get + - update + - apiGroups: + - certificates.k8s.io + resources: + - certificatesigningrequests + verbs: + - get + - list + - watch + - apiGroups: + - certificates.k8s.io + resources: + - certificatesigningrequests/approval + - certificatesigningrequests/status + verbs: + - update + - apiGroups: + - certificates.k8s.io + resources: + - signers + resourceNames: + - antrea.io/antrea-agent-ipsec-tunnel + verbs: + - approve + - sign + - apiGroups: + - crd.antrea.io + resources: + - antreacontrollerinfos + verbs: + - get + - create + - update + - delete + - apiGroups: + - crd.antrea.io + resources: + - antreaagentinfos + verbs: + - list + - create + - delete + - apiGroups: + - crd.antrea.io + resources: + - clusternetworkpolicies + - networkpolicies + verbs: + - get + - watch + - list + - update + - patch + - create + - delete + - apiGroups: + - crd.antrea.io + resources: + - clusternetworkpolicies/status + - networkpolicies/status + verbs: + - update + - apiGroups: + - crd.antrea.io + resources: + - tiers + verbs: + - get + - watch + - list + - update + - patch + - create + - delete + - apiGroups: + - crd.antrea.io + resources: + - traceflows + - traceflows/status + verbs: + - get + - watch + - list + - update + - patch + - create + - delete + - apiGroups: + - crd.antrea.io + resources: + - externalentities + - clustergroups + - groups + verbs: + - get + - watch + - list + - update + - patch + - create + - delete + - apiGroups: + - crd.antrea.io + resources: + - clustergroups/status + - groups/status + verbs: + - update + - apiGroups: + - crd.antrea.io + resources: + - egresses + verbs: + - get + - watch + - list + - update + - patch + - apiGroups: + - crd.antrea.io + resources: + - externalippools + - ippools + verbs: + - get + - watch + - list + - apiGroups: + - crd.antrea.io + resources: + - externalippools/status + - ippools/status + verbs: + - update + - patch + - apiGroups: + - crd.antrea.io + resources: + - externalnodes + verbs: + - get + - watch + - list + - apiGroups: + - apps + resources: + - statefulsets + verbs: + - get + - list + - watch +--- +# Source: antrea/templates/crds-rbac/clusterroles.yaml +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: aggregate-antrea-policies-edit + labels: + app: antrea + # Add these permissions to the "admin" and "edit" default roles. + rbac.authorization.k8s.io/aggregate-to-admin: "true" + rbac.authorization.k8s.io/aggregate-to-edit: "true" +rules: +- apiGroups: ["crd.antrea.io"] + resources: ["clusternetworkpolicies", "networkpolicies"] + verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] +--- +# Source: antrea/templates/crds-rbac/clusterroles.yaml +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: aggregate-antrea-policies-view + labels: + app: antrea + # Add these permissions to the "view" default role. + rbac.authorization.k8s.io/aggregate-to-view: "true" +rules: +- apiGroups: ["crd.antrea.io"] + resources: ["clusternetworkpolicies", "networkpolicies"] + verbs: ["get", "list", "watch"] +--- +# Source: antrea/templates/crds-rbac/clusterroles.yaml +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: aggregate-traceflows-edit + labels: + app: antrea + # Add these permissions to the "admin" and "edit" default roles. + rbac.authorization.k8s.io/aggregate-to-admin: "true" + rbac.authorization.k8s.io/aggregate-to-edit: "true" +rules: +- apiGroups: ["crd.antrea.io"] + resources: ["traceflows"] + verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] +--- +# Source: antrea/templates/crds-rbac/clusterroles.yaml +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: aggregate-traceflows-view + labels: + app: antrea + # Add these permissions to the "view" default role. + rbac.authorization.k8s.io/aggregate-to-view: "true" +rules: +- apiGroups: ["crd.antrea.io"] + resources: ["traceflows"] + verbs: ["get", "list", "watch"] +--- +# Source: antrea/templates/crds-rbac/clusterroles.yaml +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: aggregate-antrea-clustergroups-edit + labels: + app: antrea + # Add these permissions to the "admin" and "edit" default roles. + rbac.authorization.k8s.io/aggregate-to-admin: "true" + rbac.authorization.k8s.io/aggregate-to-edit: "true" +rules: +- apiGroups: ["crd.antrea.io"] + resources: ["clustergroups"] + verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] +--- +# Source: antrea/templates/crds-rbac/clusterroles.yaml +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: aggregate-antrea-clustergroups-view + labels: + app: antrea + # Add these permissions to the "view" default role. + rbac.authorization.k8s.io/aggregate-to-view: "true" +rules: +- apiGroups: ["crd.antrea.io"] + resources: ["clustergroups"] + verbs: ["get", "list", "watch"] +--- +# Source: antrea/templates/whereabouts/clusterrole.yaml +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: antrea-agent-whereabouts + labels: + app: antrea +rules: + - apiGroups: + - whereabouts.cni.cncf.io + resources: + - ippools + - overlappingrangeipreservations + verbs: + - get + - put + - watch + - list + - update + - patch + - create + - delete + - apiGroups: + - coordination.k8s.io + resources: + - leases + verbs: + - create + - get + - list + - update +--- +# Source: antrea/templates/agent/clusterrolebinding.yaml +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: antrea-agent + labels: + app: antrea +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: antrea-agent +subjects: + - kind: ServiceAccount + name: antrea-agent + namespace: kube-system +--- +# Source: antrea/templates/antctl/clusterrolebinding.yaml +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + labels: + app: antrea + name: antctl +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: antctl +subjects: + - kind: ServiceAccount + name: antctl + namespace: kube-system +--- +# Source: antrea/templates/controller/clusterrolebinding.yaml +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: antrea-controller + labels: + app: antrea +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: antrea-controller +subjects: + - kind: ServiceAccount + name: antrea-controller + namespace: kube-system +--- +# Source: antrea/templates/whereabouts/clusterrolebinding.yaml +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: antrea-agent-whereabouts + labels: + app: antrea +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: antrea-agent-whereabouts +subjects: + - kind: ServiceAccount + name: antrea-agent-whereabouts + namespace: kube-system +--- +# Source: antrea/templates/controller/service.yaml +apiVersion: v1 +kind: Service +metadata: + name: antrea + namespace: kube-system + labels: + app: antrea +spec: + ports: + - port: 443 + protocol: TCP + targetPort: api + selector: + app: antrea + component: antrea-controller +--- +# Source: antrea/templates/agent/daemonset.yaml +apiVersion: apps/v1 +kind: DaemonSet +metadata: + name: antrea-agent + namespace: kube-system + labels: + app: antrea + component: antrea-agent +spec: + selector: + matchLabels: + app: antrea + component: antrea-agent + updateStrategy: + type: RollingUpdate + template: + metadata: + annotations: + # Starting with v1.21, Kubernetes supports default container annotation. + # Using "kubectl logs/exec/attach/cp" doesn't have to specify "-c antrea-agent" when troubleshooting. + kubectl.kubernetes.io/default-container: antrea-agent + # Automatically restart Pods with a RollingUpdate if the ConfigMap changes + # See https://helm.sh/docs/howto/charts_tips_and_tricks/#automatically-roll-deployments + checksum/config: cda023525442c38c869663e4fd703a76cafa307220ae85ec0a8bd393587fa3ed + labels: + app: antrea + component: antrea-agent + spec: + hostNetwork: true + dnsPolicy: ClusterFirstWithHostNet + priorityClassName: system-node-critical + nodeSelector: + kubernetes.io/os: linux + tolerations: + - key: CriticalAddonsOnly + operator: Exists + - effect: NoSchedule + operator: Exists + - effect: NoExecute + operator: Exists + serviceAccountName: antrea-agent + initContainers: + - name: install-whereabouts-config + image: "antrea/antrea-ubuntu:latest" + resources: + requests: + cpu: "100m" + command: ["install_whereabouts_config"] + volumeMounts: + - name: whereabouts-cni-conf + mountPath: /host/etc/cni/net.d/whereabouts.d + - name: whereabouts-secret + mountPath: /var/run/secrets/whereabouts + - name: install-cni + image: "antrea/antrea-ubuntu:latest" + imagePullPolicy: IfNotPresent + resources: + requests: + cpu: 100m + command: ["install_cni"] + securityContext: + capabilities: + add: + # SYS_MODULE is required to load the OVS kernel module. + - SYS_MODULE + env: + # SKIP_CNI_BINARIES takes in values as a comma separated list of + # binaries that need to be skipped for installation, e.g. "portmap, bandwidth". + - name: SKIP_CNI_BINARIES + value: "" + volumeMounts: + - name: antrea-config + mountPath: /etc/antrea/antrea-cni.conflist + subPath: antrea-cni.conflist + readOnly: true + - name: host-cni-conf + mountPath: /host/etc/cni/net.d + - name: host-cni-bin + mountPath: /host/opt/cni/bin + # For loading the OVS kernel module. + - name: host-lib-modules + mountPath: /lib/modules + readOnly: true + # For changing the default permissions of the run directory. + - name: host-var-run-antrea + mountPath: /var/run/antrea + containers: + - name: antrea-agent + image: "antrea/antrea-ubuntu:latest" + imagePullPolicy: IfNotPresent + command: ["antrea-agent"] + # Log to both "/var/log/antrea/" and stderr (so "kubectl logs" can work).- + args: + - "--config=/etc/antrea/antrea-agent.conf" + - "--logtostderr=false" + - "--log_dir=/var/log/antrea" + - "--alsologtostderr" + - "--log_file_max_size=100" + - "--log_file_max_num=4" + env: + # Provide pod and node information for clusterinformation CRD. + - name: POD_NAME + valueFrom: + fieldRef: + fieldPath: metadata.name + - name: POD_NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: NODE_NAME + valueFrom: + fieldRef: + fieldPath: spec.nodeName + resources: + requests: + cpu: 200m + ports: + - containerPort: 10350 + name: api + protocol: TCP + livenessProbe: + exec: + command: + - /bin/sh + - -c + - container_liveness_probe agent + initialDelaySeconds: 5 + timeoutSeconds: 5 + periodSeconds: 10 + failureThreshold: 5 + readinessProbe: + httpGet: + host: localhost + path: /readyz + port: api + scheme: HTTPS + initialDelaySeconds: 5 + timeoutSeconds: 5 + periodSeconds: 10 + # In large-scale clusters, it may take up to 40~50 seconds for the antrea-agent to reconnect to the antrea + # Service after the antrea-controller restarts. The antrea-agent shouldn't be reported as NotReady in this + # scenario, otherwise the DaemonSet controller would restart all agents at once, as opposed to performing a + # rolling update. Set failureThreshold to 8 so it can tolerate 70s of disconnection. + failureThreshold: 8 + securityContext: + # antrea-agent needs to perform sysctl configuration. + privileged: true + volumeMounts: + - name: antrea-config + mountPath: /etc/antrea/antrea-agent.conf + subPath: antrea-agent.conf + readOnly: true + - name: host-var-run-antrea + mountPath: /var/run/antrea + - name: host-var-run-antrea + mountPath: /var/run/openvswitch + subPath: openvswitch + # host-local IPAM stores allocated IP addresses as files in /var/lib/cni/networks/$NETWORK_NAME. + # Mount a sub-directory of host-var-run-antrea to it for persistence of IP allocation. + - name: host-var-run-antrea + mountPath: /var/lib/cni + subPath: cni + # We need to mount both the /proc directory and the /var/run/netns directory so that + # antrea-agent can open the network namespace path when setting up Pod + # networking. Different container runtimes may use /proc or /var/run/netns when invoking + # the CNI commands. Docker uses /proc and containerd uses /var/run/netns. + - name: host-var-log-antrea + mountPath: /var/log/antrea + - name: host-proc + mountPath: /host/proc + readOnly: true + - name: host-var-run-netns + mountPath: /host/var/run/netns + readOnly: true + # When a container is created, a mount point for the network namespace is added under + # /var/run/netns on the host, which needs to be propagated to the antrea-agent container. + mountPropagation: HostToContainer + - name: xtables-lock + mountPath: /run/xtables.lock + - name: whereabouts-cni-conf + mountPath: /host/etc/cni/net.d/whereabouts.d + - name: whereabouts-secret + mountPath: /var/run/secrets/whereabouts + - mountPath: /var/lib/kubelet + name: host-kubelet + readOnly: true + - name: antrea-ovs + image: "antrea/antrea-ubuntu:latest" + imagePullPolicy: IfNotPresent + resources: + requests: + cpu: 200m + command: ["start_ovs"] + args: + - "--log_file_max_size=100" + - "--log_file_max_num=4" + securityContext: + # capabilities required by OVS daemons + capabilities: + add: + - SYS_NICE + - NET_ADMIN + - SYS_ADMIN + - IPC_LOCK + livenessProbe: + exec: + # docker CRI doesn't honor timeoutSeconds, add "timeout" to the command as a workaround. + # https://github.com/kubernetes/kubernetes/issues/51901 + command: + - /bin/sh + - -c + - timeout 10 container_liveness_probe ovs + initialDelaySeconds: 5 + timeoutSeconds: 10 + periodSeconds: 10 + failureThreshold: 5 + volumeMounts: + - name: host-var-run-antrea + mountPath: /var/run/openvswitch + subPath: openvswitch + - name: host-var-log-antrea + mountPath: /var/log/openvswitch + subPath: openvswitch + volumes: + - name: antrea-config + configMap: + name: antrea-config + - name: host-cni-conf + hostPath: + path: /etc/cni/net.d + - name: host-cni-bin + hostPath: + path: /opt/cni/bin + - name: host-proc + hostPath: + path: /proc + - name: host-var-run-netns + hostPath: + path: /var/run/netns + - name: host-var-run-antrea + hostPath: + path: /var/run/antrea + # we use subPath to create run subdirectories for different component (e.g. OVS) and + # subPath requires the base volume to exist + type: DirectoryOrCreate + - name: host-var-log-antrea + hostPath: + path: /var/log/antrea + # we use subPath to create logging subdirectories for different component (e.g. OVS) + type: DirectoryOrCreate + - name: host-lib-modules + hostPath: + path: /lib/modules + - name: xtables-lock + hostPath: + path: /run/xtables.lock + type: FileOrCreate + - hostPath: + path: /var/lib/kubelet + name: host-kubelet + - hostPath: + path: /host/etc/cni/net.d/whereabouts.d + name: whereabouts-cni-conf + - name: whereabouts-secret + secret: + secretName: whereabouts-cni-secret +--- +# Source: antrea/templates/controller/deployment.yaml +apiVersion: apps/v1 +kind: Deployment +metadata: + name: antrea-controller + namespace: kube-system + labels: + app: antrea + component: antrea-controller +spec: + strategy: + # Ensure the existing Pod is stopped before the new one is created. + type: Recreate + selector: + matchLabels: + app: antrea + component: antrea-controller + replicas: 1 + template: + metadata: + annotations: + # Automatically restart Pod if the ConfigMap changes + # See https://helm.sh/docs/howto/charts_tips_and_tricks/#automatically-roll-deployments + checksum/config: cda023525442c38c869663e4fd703a76cafa307220ae85ec0a8bd393587fa3ed + labels: + app: antrea + component: antrea-controller + spec: + nodeSelector: + kubernetes.io/os: linux + hostNetwork: true + priorityClassName: system-cluster-critical + tolerations: + - key: CriticalAddonsOnly + operator: Exists + - effect: NoSchedule + key: node-role.kubernetes.io/master + - effect: NoSchedule + key: node-role.kubernetes.io/control-plane + serviceAccountName: antrea-controller + containers: + - name: antrea-controller + image: "antrea/antrea-ubuntu:latest" + imagePullPolicy: IfNotPresent + resources: + requests: + cpu: 200m + command: ["antrea-controller"] + # Log to both "/var/log/antrea/" and stderr (so "kubectl logs" can work). + args: + - "--config=/etc/antrea/antrea-controller.conf" + - "--logtostderr=false" + - "--log_dir=/var/log/antrea" + - "--alsologtostderr" + - "--log_file_max_size=100" + - "--log_file_max_num=4" + env: + # Provide pod and node information for clusterinformation CRD. + - name: POD_NAME + valueFrom: + fieldRef: + fieldPath: metadata.name + - name: POD_NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: NODE_NAME + valueFrom: + fieldRef: + fieldPath: spec.nodeName + # Provide ServiceAccount name for validation webhook. + - name: SERVICEACCOUNT_NAME + valueFrom: + fieldRef: + fieldPath: spec.serviceAccountName + - name: ANTREA_CONFIG_MAP_NAME + value: antrea-config + ports: + - containerPort: 10349 + name: api + protocol: TCP + readinessProbe: + httpGet: + host: localhost + path: /readyz + port: api + scheme: HTTPS + initialDelaySeconds: 5 + timeoutSeconds: 5 + periodSeconds: 10 + failureThreshold: 5 + livenessProbe: + httpGet: + host: localhost + path: /livez + port: api + scheme: HTTPS + timeoutSeconds: 5 + periodSeconds: 10 + failureThreshold: 5 + volumeMounts: + - name: antrea-config + mountPath: /etc/antrea/antrea-controller.conf + subPath: antrea-controller.conf + readOnly: true + - name: antrea-controller-tls + mountPath: /var/run/antrea/antrea-controller-tls + - name: host-var-log-antrea + mountPath: /var/log/antrea + volumes: + - name: antrea-config + configMap: + name: antrea-config + # Make it optional as we only read it when selfSignedCert=false. + - name: antrea-controller-tls + secret: + secretName: antrea-controller-tls + defaultMode: 0400 + optional: true + - name: host-var-log-antrea + hostPath: + path: /var/log/antrea + type: DirectoryOrCreate +--- +# Source: antrea/templates/controller/apiservices.yaml +apiVersion: apiregistration.k8s.io/v1 +kind: APIService +metadata: + name: v1beta2.controlplane.antrea.io + labels: + app: antrea +spec: + group: controlplane.antrea.io + groupPriorityMinimum: 100 + version: v1beta2 + versionPriority: 100 + service: + name: antrea + namespace: kube-system +--- +# Source: antrea/templates/controller/apiservices.yaml +apiVersion: apiregistration.k8s.io/v1 +kind: APIService +metadata: + name: v1beta1.system.antrea.io + labels: + app: antrea +spec: + group: system.antrea.io + groupPriorityMinimum: 100 + version: v1beta1 + versionPriority: 100 + service: + name: antrea + namespace: kube-system +--- +# Source: antrea/templates/controller/apiservices.yaml +apiVersion: apiregistration.k8s.io/v1 +kind: APIService +metadata: + name: v1alpha1.stats.antrea.io + labels: + app: antrea +spec: + group: stats.antrea.io + groupPriorityMinimum: 100 + version: v1alpha1 + versionPriority: 100 + service: + name: antrea + namespace: kube-system +--- +# Source: antrea/templates/webhooks/mutating/crdmutator.yaml +apiVersion: admissionregistration.k8s.io/v1 +kind: MutatingWebhookConfiguration +metadata: + name: "crdmutator.antrea.io" + labels: + app: antrea +webhooks: + - name: "acnpmutator.antrea.io" + clientConfig: + service: + name: "antrea" + namespace: kube-system + path: "/mutate/acnp" + rules: + - operations: ["CREATE", "UPDATE"] + apiGroups: ["crd.antrea.io"] + apiVersions: ["v1alpha1"] + resources: ["clusternetworkpolicies"] + scope: "Cluster" + admissionReviewVersions: ["v1", "v1beta1"] + sideEffects: None + timeoutSeconds: 5 + - name: "anpmutator.antrea.io" + clientConfig: + service: + name: "antrea" + namespace: kube-system + path: "/mutate/anp" + rules: + - operations: ["CREATE", "UPDATE"] + apiGroups: ["crd.antrea.io"] + apiVersions: ["v1alpha1"] + resources: ["networkpolicies"] + scope: "Namespaced" + admissionReviewVersions: ["v1", "v1beta1"] + sideEffects: None + timeoutSeconds: 5 +--- +# Source: antrea/templates/webhooks/validating/crdvalidator.yaml +apiVersion: admissionregistration.k8s.io/v1 +kind: ValidatingWebhookConfiguration +metadata: + name: "crdvalidator.antrea.io" + labels: + app: antrea +webhooks: + - name: "tiervalidator.antrea.io" + clientConfig: + service: + name: "antrea" + namespace: kube-system + path: "/validate/tier" + rules: + - operations: ["CREATE", "UPDATE", "DELETE"] + apiGroups: ["crd.antrea.io"] + apiVersions: ["v1alpha1"] + resources: ["tiers"] + scope: "Cluster" + admissionReviewVersions: ["v1", "v1beta1"] + sideEffects: None + timeoutSeconds: 5 + - name: "acnpvalidator.antrea.io" + clientConfig: + service: + name: "antrea" + namespace: kube-system + path: "/validate/acnp" + rules: + - operations: ["CREATE", "UPDATE"] + apiGroups: ["crd.antrea.io"] + apiVersions: ["v1alpha1"] + resources: ["clusternetworkpolicies"] + scope: "Cluster" + admissionReviewVersions: ["v1", "v1beta1"] + sideEffects: None + timeoutSeconds: 5 + - name: "anpvalidator.antrea.io" + clientConfig: + service: + name: "antrea" + namespace: kube-system + path: "/validate/anp" + rules: + - operations: ["CREATE", "UPDATE"] + apiGroups: ["crd.antrea.io"] + apiVersions: ["v1alpha1"] + resources: ["networkpolicies"] + scope: "Namespaced" + admissionReviewVersions: ["v1", "v1beta1"] + sideEffects: None + timeoutSeconds: 5 + - name: "clustergroupvalidator.antrea.io" + clientConfig: + service: + name: "antrea" + namespace: kube-system + path: "/validate/clustergroup" + rules: + - operations: ["CREATE", "UPDATE"] + apiGroups: ["crd.antrea.io"] + apiVersions: ["v1alpha3", "v1alpha2"] + resources: ["clustergroups"] + scope: "Cluster" + admissionReviewVersions: ["v1", "v1beta1"] + sideEffects: None + timeoutSeconds: 5 + - name: "groupvalidator.antrea.io" + clientConfig: + service: + name: "antrea" + namespace: "kube-system" + path: "/validate/group" + rules: + - operations: [ "CREATE", "UPDATE" ] + apiGroups: [ "crd.antrea.io" ] + apiVersions: [ "v1alpha3" ] + resources: [ "groups" ] + scope: "Namespaced" + admissionReviewVersions: [ "v1", "v1beta1" ] + sideEffects: None + timeoutSeconds: 5 + - name: "externalippoolvalidator.antrea.io" + clientConfig: + service: + name: "antrea" + namespace: kube-system + path: "/validate/externalippool" + rules: + - operations: ["UPDATE"] + apiGroups: ["crd.antrea.io"] + apiVersions: ["v1alpha2"] + resources: ["externalippools"] + scope: "Cluster" + admissionReviewVersions: ["v1", "v1beta1"] + sideEffects: None + timeoutSeconds: 5 + - name: "egressvalidator.antrea.io" + clientConfig: + service: + name: "antrea" + namespace: kube-system + path: "/validate/egress" + rules: + - operations: ["CREATE", "UPDATE"] + apiGroups: ["crd.antrea.io"] + apiVersions: ["v1alpha2"] + resources: ["egresses"] + scope: "Cluster" + admissionReviewVersions: ["v1", "v1beta1"] + sideEffects: None + timeoutSeconds: 5 + - name: "ippoolvalidator.antrea.io" + clientConfig: + service: + name: "antrea" + namespace: kube-system + path: "/validate/ippool" + rules: + - operations: ["CREATE", "UPDATE", "DELETE"] + apiGroups: ["crd.antrea.io"] + apiVersions: ["v1alpha2"] + resources: ["ippools"] + scope: "Cluster" + admissionReviewVersions: ["v1", "v1beta1"] + sideEffects: None + timeoutSeconds: 5 diff --git a/pkg/agent/secondarynetwork/podwatch/controller.go.backup_with_logs b/pkg/agent/secondarynetwork/podwatch/controller.go.backup_with_logs new file mode 100644 index 00000000000..3b5a10e00a4 --- /dev/null +++ b/pkg/agent/secondarynetwork/podwatch/controller.go.backup_with_logs @@ -0,0 +1,471 @@ +// Copyright 2021 Antrea Authors +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +package podwatch + +import ( + "context" + "encoding/json" + "fmt" + "strings" + "sync" + "time" + + corev1 "k8s.io/api/core/v1" + metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" + "k8s.io/apimachinery/pkg/util/wait" + clientset "k8s.io/client-go/kubernetes" + "k8s.io/client-go/tools/cache" + "k8s.io/client-go/util/workqueue" + "k8s.io/klog/v2" + + invoke "github.com/containernetworking/cni/pkg/invoke" + current "github.com/containernetworking/cni/pkg/types/current" + netdefv1 "github.com/k8snetworkplumbingwg/network-attachment-definition-client/pkg/apis/k8s.cni.cncf.io/v1" + netdefclient "github.com/k8snetworkplumbingwg/network-attachment-definition-client/pkg/client/clientset/versioned/typed/k8s.cni.cncf.io/v1" + netdefutils "github.com/k8snetworkplumbingwg/network-attachment-definition-client/pkg/utils" + + cniserver "antrea.io/antrea/pkg/agent/cniserver" + cnipodcache "antrea.io/antrea/pkg/agent/secondarynetwork/cnipodcache" + ipam "antrea.io/antrea/pkg/agent/secondarynetwork/ipam" +) + +const ( + controllerName = "SecondaryNetworkController" + minRetryDelay = 2 * time.Second + maxRetryDelay = 120 * time.Second + numWorkers = 4 +) + +const ( + networkAttachDefAnnotationKey = "k8s.v1.cni.cncf.io/networks" + cniPath = "/opt/cni/bin/" + defaultSecondaryInterfaceName = "eth1" + startIfaceIndex = 1 + endIfaceIndex = 101 +) + +// Set resyncPeriod to 0 to disable resyncing. +const resyncPeriod = 0 * time.Minute + +var ( + // ipamDelegator is used to request IP addresses for secondary network + // interfaces. It can be overridden by unit tests. + ipamDelegator ipam.IPAMDelegator = ipam.NewIPAMDelegator() + // getPodContainerDeviceIDs is used to retrieve SRIOV device IDs + // assigned to a specific Pod. It can be overridden by unit tests. + getPodContainerDeviceIDs = cniserver.GetPodContainerDeviceIDs +) + +// Structure to associate a unique VF's PCI Address to the Linux ethernet interface. +type podSriovVFDeviceIDInfo struct { + vfDeviceID string + ifName string +} + +type InterfaceConfigurator interface { + ConfigureSriovSecondaryInterface(podName string, podNameSpace string, containerID string, containerNetNS string, containerIFDev string, mtu int, podSriovVFDeviceID string, result *current.Result) error +} + +type PodController struct { + kubeClient clientset.Interface + netAttachDefClient netdefclient.K8sCniCncfIoV1Interface + queue workqueue.RateLimitingInterface + podInformer cache.SharedIndexInformer + nodeName string + podCache cnipodcache.CNIPodInfoStore + interfaceConfigurator InterfaceConfigurator + vfDeviceIDUsageMap sync.Map +} + +func NewPodController( + kubeClient clientset.Interface, + netAttachDefClient netdefclient.K8sCniCncfIoV1Interface, + podInformer cache.SharedIndexInformer, + nodeName string, + podCache cnipodcache.CNIPodInfoStore, + interfaceConfigurator InterfaceConfigurator, +) *PodController { + pc := PodController{ + kubeClient: kubeClient, + netAttachDefClient: netAttachDefClient, + queue: workqueue.NewNamedRateLimitingQueue(workqueue.NewItemExponentialFailureRateLimiter(minRetryDelay, maxRetryDelay), "podcontroller"), + podInformer: podInformer, + nodeName: nodeName, + podCache: podCache, + interfaceConfigurator: interfaceConfigurator, + } + podInformer.AddEventHandlerWithResyncPeriod( + cache.ResourceEventHandlerFuncs{ + AddFunc: pc.enqueuePod, + DeleteFunc: pc.enqueuePod, + UpdateFunc: func(old, cur interface{}) { pc.enqueuePod(cur) }, + }, + resyncPeriod, + ) + return &pc +} + +func podKeyGet(pod *corev1.Pod) string { + return pod.Namespace + "/" + pod.Name +} + +// buildVFDeviceIDListPerPod is a helper function to build a cache structure with the +// list of all the PCI addresses allocated per Pod based on their resource requests (in Pod spec). +// When there is a request for a VF resource (to associate it for a secondary network interface), +// getUnusedSriovVFDeviceIDPerPod will use this cache information to pick up a unique PCI address +// which is still not associated with a network device name. +// NOTE: buildVFDeviceIDListPerPod is called only if a Pod specific VF to Interface mapping cache +// was not build earlier. Sample initial entry per Pod: "{18:01.1,""},{18:01.2,""},{18:01.3,""}" +func (pc *PodController) buildVFDeviceIDListPerPod(podName, podNamespace string) ([]podSriovVFDeviceIDInfo, error) { + podKey := podNamespace + "/" + podName + deviceCache, cacheFound := pc.vfDeviceIDUsageMap.Load(podKey) + if cacheFound { + return deviceCache.([]podSriovVFDeviceIDInfo), nil + } + podSriovVFDeviceIDs, err := getPodContainerDeviceIDs(podName, podNamespace) + if err != nil { + return nil, fmt.Errorf("getPodContainerDeviceIDs failed: %v", err) + } + var vfDeviceIDInfoCache []podSriovVFDeviceIDInfo + for _, pciAddress := range podSriovVFDeviceIDs { + initSriovVfDeviceID := podSriovVFDeviceIDInfo{vfDeviceID: pciAddress, ifName: ""} + vfDeviceIDInfoCache = append(vfDeviceIDInfoCache, initSriovVfDeviceID) + } + pc.vfDeviceIDUsageMap.Store(podKey, vfDeviceIDInfoCache) + return vfDeviceIDInfoCache, nil +} + +func (pc *PodController) emptyVFDeviceIDListPerPod(podName, podNamespace string) { + podKey := podNamespace + "/" + podName + _, cacheFound := pc.vfDeviceIDUsageMap.Load(podKey) + if cacheFound { + klog.InfoS("Pod VF Cache cleared", "pod", podKey) + pc.vfDeviceIDUsageMap.Delete(podKey) + } + return +} + +func (pc *PodController) assignUnusedSriovVFDeviceIDPerPod(podName, podNamespace, interfaceName string) (string, error) { + var cache []podSriovVFDeviceIDInfo + cache, err := pc.buildVFDeviceIDListPerPod(podName, podNamespace) + if err != nil { + return "", err + } + klog.InfoS("Printing CACHE!!!!!!!!!!!!!", "cache", cache) + for idx := 0; idx < len(cache); idx++ { + if cache[idx].ifName == "" { + // Unused PCI address found. Associate PCI address to the interface. + cache[idx].ifName = interfaceName + return cache[idx].vfDeviceID, nil + } + } + return "", err +} + +func generatePodSecondaryIfaceName(podCNIInfo *cnipodcache.CNIConfigInfo) (string, error) { + // Assign default interface name, if podCNIInfo.NetworkConfig is empty. + if count := len(podCNIInfo.NetworkConfig); count == 0 { + return defaultSecondaryInterfaceName, nil + } else { + // Generate new interface name (eth1,eth2..eth100) and return to caller. + for ifaceIndex := startIfaceIndex; ifaceIndex < endIfaceIndex; ifaceIndex++ { + ifName := fmt.Sprintf("%s%d", "eth", ifaceIndex) + _, exist := podCNIInfo.NetworkConfig[ifName] + if !exist { + return ifName, nil + } + } + } + return "", fmt.Errorf("no more interface names") +} + +func whereaboutsArgsBuilder(cmd string, interfaceName string, podCNIInfo *cnipodcache.CNIConfigInfo) *invoke.Args { + // PluginArgs added to provide additional arguments required for whereabouts v0.5.1 and above. + return &invoke.Args{Command: cmd, ContainerID: podCNIInfo.ContainerID, + NetNS: podCNIInfo.ContainerNetNS, IfName: interfaceName, + Path: cniPath, PluginArgs: [][2]string{ + {"K8S_POD_NAME", podCNIInfo.PodName}, + {"K8S_POD_NAMESPACE", podCNIInfo.PodNameSpace}, + {"K8S_POD_INFRA_CONTAINER_ID", podCNIInfo.ContainerID}, + }} + +} + +func removePodAllSecondaryNetwork(podCNIInfo *cnipodcache.CNIConfigInfo) error { + var cmdArgs *invoke.Args + // Clean-up IPAM at whereabouts db (etcd or kubernetes API server) for all the secondary networks of the Pod which is getting removed. + // PluginArgs added to provide additional arguments required for whereabouts v0.5.1 and above. + // NOTE: SR-IOV VF interface clean-up, upon Pod delete will be handled by SR-IOV device plugin. Not handled here. + cmdArgs = whereaboutsArgsBuilder("DEL", "", podCNIInfo) + // example: podCNIInfo.NetworkConfig = {"eth1": net1-cniconfig, "eth2": net2-cniconfig} + for secNetInstIface, secNetInstConfig := range podCNIInfo.NetworkConfig { + cmdArgs.IfName = secNetInstIface + // Do DelIPAMSubnetAddress on network config (secNetInstConfig) and command argument (updated with interface name). + err := ipamDelegator.DelIPAMSubnetAddress(secNetInstConfig, cmdArgs) + if err != nil { + return fmt.Errorf("Failed to clean-up whereabouts IPAM %v", err) + } + // Delete map entry for secNetInstIface, secNetInstConfig + delete(podCNIInfo.NetworkConfig, secNetInstIface) + } + return nil +} + +func (pc *PodController) enqueuePod(obj interface{}) { + var err error + pod, isPod := obj.(*corev1.Pod) + if !isPod { + podDeletedState, ok := obj.(cache.DeletedFinalStateUnknown) + if !ok { + klog.ErrorS(err, "Unexpected object received:", obj) + return + } + pod, ok := podDeletedState.Obj.(*corev1.Pod) + if !ok { + klog.ErrorS(err, "DeletedFinalStateUnknown object is not of type Pod: ", podDeletedState.Obj, pod) + return + } + } + podKey := podKeyGet(pod) + pc.queue.Add(podKey) +} + +// handleAddUpdatePod handles Pod Add, Update events and updates annotation if required. +func (pc *PodController) handleAddUpdatePod(obj interface{}) error { + var err error + var podCNIInfo *cnipodcache.CNIConfigInfo + pod := obj.(*corev1.Pod) + if len(pod.Status.PodIPs) == 0 { + // Primary network configuration is not complete yet. + // Note: Return nil here to unqueue Pod add event. Secondary network configuration will be handled with Pod update event. + return nil + } + secondaryNetwork, ok := checkForPodSecondaryNetworkAttachement(pod) + if !ok { + // NOTE: We do not handle Pod annotation deletion/update scenario at present. + klog.InfoS("Pod does not have a NetworkAttachmentDefinition", "Pod", klog.KObj(pod)) + return nil + } + // Retrieve Pod specific cache entry which has "PodCNIDeleted = false" + if podCNIInfo = pc.podCache.GetValidCNIConfigInfoPerPod(pod.Name, pod.Namespace); podCNIInfo == nil { + return nil + } + // Valid cache entry retrieved from cache and we received a Pod add or update event. + // Avoid processing Pod annotation, if we already have at least one secondary network successfully configured on this Pod. + // We do not support/handle Annotation updates yet. + if len(podCNIInfo.NetworkConfig) > 0 { + klog.InfoS("Secondary network already configured on this Pod and annotation update not supported, skipping update", "pod", klog.KObj(pod)) + return nil + } + // Parse Pod annotation and proceed with the secondary network configuration. + networklist, err := netdefutils.ParseNetworkAnnotation(secondaryNetwork, pod.Namespace) + if err != nil { + klog.ErrorS(err, "Error when parsing network annotation", "annotation", secondaryNetwork) + // Do not return an error as a retry is not appropriate. + // When the annotation is fixed, the Pod will be enqueued again. + return nil + } + + err = pc.configureSecondaryNetwork(pod, networklist, podCNIInfo) + // We do not return error to retry, if at least one secondary network is configured. + if (err != nil) && (len(podCNIInfo.NetworkConfig) == 0) { + // Return error to requeue and retry. + return err + } + return nil +} + +func (pc *PodController) handleRemovePod(key string) error { + var err error + pod := strings.Split(key, "/") + // Read the CNI info (stored during Pod creation by cniserver) from cache. + // Delete CNI info shared in cache for a specific Pod which is getting removed/deleted. + podCNIInfo := pc.podCache.GetAllCNIConfigInfoPerPod(pod[1], pod[0]) + for _, containerInfo := range podCNIInfo { + // Release IPAM of all the secondary interfaces and delete CNI cache. + if err = removePodAllSecondaryNetwork(containerInfo); err != nil { + // Return error to requeue pod delete. + return err + } else { + // Delete cache entry from podCNIInfo. + pc.podCache.DeleteCNIConfigInfo(containerInfo) + pc.emptyVFDeviceIDListPerPod(containerInfo.PodName, containerInfo.PodNameSpace) + } + } + return nil +} + +func (pc *PodController) syncPod(key string) error { + obj, exists, err := pc.podInformer.GetIndexer().GetByKey(key) + if err != nil { + return err + } else if exists { + return pc.handleAddUpdatePod(obj) + } else { + return pc.handleRemovePod(key) + } +} + +func (pc *PodController) Worker() { + for pc.processNextWorkItem() { + } +} + +func (pc *PodController) processNextWorkItem() bool { + obj, quit := pc.queue.Get() + if quit { + return false + } + defer pc.queue.Done(obj) + if key, ok := obj.(string); !ok { + pc.queue.Forget(obj) + } else if err := pc.syncPod(key); err == nil { + pc.queue.Forget(key) + } else { + pc.queue.AddRateLimited(key) + } + return true +} + +// Configure SRIOV VF as a Secondary Network Interface. +func (pc *PodController) configureSriovAsSecondaryInterface(pod *corev1.Pod, network *netdefv1.NetworkSelectionElement, containerInfo *cnipodcache.CNIConfigInfo, result *current.Result) error { + podSriovVFDeviceID, err := pc.assignUnusedSriovVFDeviceIDPerPod(pod.Name, pod.Namespace, network.InterfaceRequest) + if err != nil { + return fmt.Errorf("getPodContainerDeviceIDs failed: %v", err) + } + + if err = pc.interfaceConfigurator.ConfigureSriovSecondaryInterface( + containerInfo.PodName, + containerInfo.PodNameSpace, + containerInfo.ContainerID, + containerInfo.ContainerNetNS, + network.InterfaceRequest, + containerInfo.MTU, + podSriovVFDeviceID, + result, + ); err != nil { + return fmt.Errorf("SRIOV Interface creation failed: %v", err) + } + return nil +} + +// Configure Secondary Network Interface. +func (pc *PodController) configureSecondaryInterface(pod *corev1.Pod, network *netdefv1.NetworkSelectionElement, podCNIInfo *cnipodcache.CNIConfigInfo, cniConfig []byte) error { + // Generate and assign new interface name, If secondary interface name was not provided in Pod annotation. + if len(network.InterfaceRequest) == 0 { + var err error + if network.InterfaceRequest, err = generatePodSecondaryIfaceName(podCNIInfo); err != nil { + klog.ErrorS(err, "Cannot generate interface name", "Pod", klog.KObj(pod)) + // do not return error: no need to requeue + return nil + } + } + // PluginArgs added to provide additional arguments required for whereabouts v0.5.1 and above. + cmdArgs := whereaboutsArgsBuilder("ADD", network.InterfaceRequest, podCNIInfo) + ipamResult, err := ipamDelegator.GetIPAMSubnetAddress(cniConfig, cmdArgs) + if err != nil { + return fmt.Errorf("secondary network IPAM failed: %v", err) + } + result := ¤t.Result{CNIVersion: podCNIInfo.CNIVersion} + result.IPs = ipamResult.IPs + result.Routes = ipamResult.Routes + // Set result.Interface to container interface. + for _, ip := range result.IPs { + ip.Interface = current.Int(1) + } + // Configure SRIOV as a secondary network interface + if err := pc.configureSriovAsSecondaryInterface(pod, network, podCNIInfo, result); err != nil { + // SRIOV interface creation failed. Free allocated IP address + if err := ipamDelegator.DelIPAMSubnetAddress(cniConfig, cmdArgs); err != nil { + klog.ErrorS(err, "IPAM de-allocation failed: ", err) + } + return err + } + // Update Pod CNI cache with the network config which was successfully configured. + if podCNIInfo.NetworkConfig == nil { + podCNIInfo.NetworkConfig = make(map[string][]byte) + } + podCNIInfo.NetworkConfig[network.InterfaceRequest] = cniConfig + return nil +} + +func (pc *PodController) configureSecondaryNetwork(pod *corev1.Pod, networklist []*netdefv1.NetworkSelectionElement, podCNIInfo *cnipodcache.CNIConfigInfo) error { + for _, network := range networklist { + klog.InfoS("Secondary Network attached to Pod", "network", network, "Pod", klog.KObj(pod)) + netDefCRD, err := pc.netAttachDefClient.NetworkAttachmentDefinitions(network.Namespace).Get(context.TODO(), network.Name, metav1.GetOptions{}) + klog.InfoS("INTEL - netDefCRD ", "netDefCRD", netDefCRD, "Pod", klog.KObj(pod)) + if err != nil { + klog.InfoS("INTEL - netDefCRD NOT READ ", "netDefCRD", err, "Pod", klog.KObj(pod)) + // NetworkAttachmentDefinition not found at this time. Return error to re-queue and re-try. + return fmt.Errorf("NetworkAttachmentDefinition Get failed: %v", err) + } + klog.InfoS("INTEL - NetworkAttachmentDefinition", "CRD", netDefCRD) + cniConfig, err := netdefutils.GetCNIConfig(netDefCRD, "") + if err != nil { + // NetworkAttachmentDefinition Spec.Config parsing failed. return error to re-queue and re-try. + return fmt.Errorf("net-attach-def: CNI config spec read error: %v", err) + } + klog.InfoS("INTEL - CNI Config", "CNIConfig", cniConfig) + var networkConfig SecondaryNetworkConfig + if err := json.Unmarshal(cniConfig, &networkConfig); err != nil { + return fmt.Errorf("invalid NetworkAttachmentDefinition: %v", err) + } + if networkConfig.Type != "antrea" { + // note that at the moment, even if the type is updated, we will not process + // the request again. + klog.InfoS("NetworkAttachmentDefinition is not of type 'antrea', ignoring", "NetworkAttachmentDefinition", klog.KObj(netDefCRD)) + continue + } + klog.InfoS("INTEL - networkConfig.Type IS ANTREA") + if networkConfig.NetworkType != sriovNetworkType { + // same as above, if updated, we will not process the request again. + klog.ErrorS(err, "NetworkType not supported for Pod", "NetworkAttachmentDefinition", klog.KObj(netDefCRD), "Pod", klog.KObj(pod)) + continue + } + klog.InfoS("INTEL - networkConfig.NetworkType IS SRIOV") + // secondary network information retrieved from API server. Proceed to configure secondary interface now. + if err = pc.configureSecondaryInterface(pod, network, podCNIInfo, cniConfig); err != nil { + klog.InfoS("INTEL - secondary interface configuration FAILED!!!!!!!!!!!!!!!!!", "err", err) + // Secondary interface configuration failed. return error to re-queue and re-try. + return fmt.Errorf("secondary interface configuration failed: %v", err) + } + klog.InfoS("INTEL - networklist ITERATED") + } + return nil +} + +func (pc *PodController) Run(stopCh <-chan struct{}) { + defer func() { + klog.InfoS("Shutting down", "controller", controllerName) + pc.queue.ShutDown() + }() + klog.InfoS("Starting ", "controller", controllerName) + if !cache.WaitForNamedCacheSync(controllerName, stopCh, pc.podInformer.HasSynced) { + return + } + for i := 0; i < numWorkers; i++ { + go wait.Until(pc.Worker, time.Second, stopCh) + } + <-stopCh +} + +func checkForPodSecondaryNetworkAttachement(pod *corev1.Pod) (string, bool) { + netObj, netObjExist := pod.GetAnnotations()[networkAttachDefAnnotationKey] + if netObjExist { + return netObj, true + } else { + return netObj, false + } +} diff --git a/sriov_clean_up.patch b/sriov_clean_up.patch new file mode 100644 index 00000000000..4d3c93d9f2d --- /dev/null +++ b/sriov_clean_up.patch @@ -0,0 +1,66 @@ +commit 65b717676282433962417152f48f86d41d1c7f03 +Author: Arunkumar Velayutham +Date: Wed Oct 12 13:26:24 2022 +0000 + + Upon a CNF Pod delete, clear Pod VF cache at secondary network's podwatch controller + + Signed-off-by: Arunkumar Velayutham + +diff --git a/pkg/agent/secondarynetwork/podwatch/controller.go b/pkg/agent/secondarynetwork/podwatch/controller.go +index b9ba8052..060d1d96 100644 +--- a/pkg/agent/secondarynetwork/podwatch/controller.go ++++ b/pkg/agent/secondarynetwork/podwatch/controller.go +@@ -147,6 +147,16 @@ func (pc *PodController) buildVFDeviceIDListPerPod(podName, podNamespace string) + return vfDeviceIDInfoCache, nil + } + ++func (pc *PodController) deleteVFDeviceIDListPerPod(podName, podNamespace string) { ++ podKey := podNamespace + "/" + podName ++ _, cacheFound := pc.vfDeviceIDUsageMap.Load(podKey) ++ if cacheFound { ++ pc.vfDeviceIDUsageMap.Delete(podKey) ++ klog.InfoS("Pod specific VF Cache cleared for ", "pod", podKey) ++ } ++ return ++} ++ + func (pc *PodController) assignUnusedSriovVFDeviceIDPerPod(podName, podNamespace, interfaceName string) (string, error) { + var cache []podSriovVFDeviceIDInfo + cache, err := pc.buildVFDeviceIDListPerPod(podName, podNamespace) +@@ -290,6 +300,8 @@ func (pc *PodController) handleRemovePod(key string) error { + } else { + // Delete cache entry from podCNIInfo. + pc.podCache.DeleteCNIConfigInfo(containerInfo) ++ // Delete Pod specific VF cache (if one exist) ++ pc.deleteVFDeviceIDListPerPod(containerInfo.PodName, containerInfo.PodNameSpace) + } + } + return nil +diff --git a/pkg/agent/secondarynetwork/podwatch/controller_test.go b/pkg/agent/secondarynetwork/podwatch/controller_test.go +index a0d8b8bd..2c157117 100644 +--- a/pkg/agent/secondarynetwork/podwatch/controller_test.go ++++ b/pkg/agent/secondarynetwork/podwatch/controller_test.go +@@ -510,4 +510,23 @@ func TestPodControllerAddPod(t *testing.T) { + // we don't expect an error here, no requeueing + assert.NoError(t, podController.handleAddUpdatePod(pod)) + }) ++ ++ t.Run("Error when adding VF deviceID cache per Pod", func(t *testing.T) { ++ ctrl := gomock.NewController(t) ++ defer ctrl.Finish() ++ network := testNetwork(networkName) ++ podController, _, _ := newPodController(ctrl) ++ podController.podCache.AddCNIConfigInfo(cniConfig) ++ _, err := podController.kubeClient.CoreV1().Pods(testNamespace).Create(context.Background(), pod, metav1.CreateOptions{}) ++ require.NoError(t, err, "error when creating test Pod") ++ _, err = podController.netAttachDefClient.NetworkAttachmentDefinitions(testNamespace).Create(context.Background(), network, metav1.CreateOptions{}) ++ require.NoError(t, err, "error when creating test NetworkAttachmentDefinition") ++ ++ _, err = podController.assignUnusedSriovVFDeviceIDPerPod(podName, testNamespace, interfaceName) ++ require.NoError(t, err, "error while assigning unused VfDevice ID") ++ ++ podController.deleteVFDeviceIDListPerPod(podName, testNamespace) ++ require.NoError(t, err, "error deleting cache") ++ ++ }) + } diff --git a/virtual-network-instance-crd.yml b/virtual-network-instance-crd.yml new file mode 100644 index 00000000000..f83affc9572 --- /dev/null +++ b/virtual-network-instance-crd.yml @@ -0,0 +1,63 @@ +--- +apiVersion: "k8s.cni.cncf.io/v1" +kind: NetworkAttachmentDefinition +metadata: + name: virtual-net1 +spec: + config: '{ + "cniVersion": "0.3.0", + "type": "antrea", + "networkType": "sriov", + "ipam": { + "type": "whereabouts", + "datastore": "kubernetes", + "kubernetes": { + "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" + }, + "range": "148.14.24.0/24" + } + }' + +--- + +apiVersion: "k8s.cni.cncf.io/v1" +kind: NetworkAttachmentDefinition +metadata: + name: virtual-net2 +spec: + config: '{ + "cniVersion": "0.3.0", + "type": "antrea", + "networkType": "sriov", + "ipam": { + "type": "whereabouts", + "datastore": "kubernetes", + "kubernetes": { + "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" + }, + "range": "148.14.25.0/24" + } + }' + +--- + +apiVersion: "k8s.cni.cncf.io/v1" +kind: NetworkAttachmentDefinition +metadata: + name: virtual-net3 +spec: + config: '{ + "cniVersion": "0.3.0", + "type": "antrea", + "networkType": "sriov", + "ipam": { + "type": "whereabouts", + "datastore": "kubernetes", + "kubernetes": { + "kubeconfig": "/host/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig" + }, + "range": "148.14.26.0/24" + } + }' + +---