Merge pull request #88488 from gnufied/implement-fix-recursive-chown

Implement changes for fsgroup recursive chown
This commit is contained in:
Kubernetes Prow Robot 2020-03-05 21:39:30 -08:00 committed by GitHub
commit 264e2f1744
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
107 changed files with 2924 additions and 2001 deletions

View File

@ -8349,6 +8349,10 @@
"format": "int64",
"type": "integer"
},
"fsGroupChangePolicy": {
"description": "fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are \"OnRootMismatch\" and \"Always\". If not specified defaults to \"Always\".",
"type": "string"
},
"runAsGroup": {
"description": "The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container.",
"format": "int64",

View File

@ -414,6 +414,8 @@ func dropDisabledFields(
dropDisabledRunAsGroupField(podSpec, oldPodSpec)
dropDisabledFSGroupFields(podSpec, oldPodSpec)
if !utilfeature.DefaultFeatureGate.Enabled(features.RuntimeClass) && !runtimeClassInUse(oldPodSpec) {
// Set RuntimeClassName to nil only if feature is disabled and it is not used
podSpec.RuntimeClassName = nil
@ -474,6 +476,16 @@ func dropDisabledProcMountField(podSpec, oldPodSpec *api.PodSpec) {
}
}
func dropDisabledFSGroupFields(podSpec, oldPodSpec *api.PodSpec) {
if !utilfeature.DefaultFeatureGate.Enabled(features.ConfigurableFSGroupPolicy) && !fsGroupPolicyInUse(oldPodSpec) {
// if oldPodSpec had no FSGroupChangePolicy set then we should prevent new pod from having this field
// if ConfigurableFSGroupPolicy feature is disabled
if podSpec.SecurityContext != nil {
podSpec.SecurityContext.FSGroupChangePolicy = nil
}
}
}
// dropDisabledCSIVolumeSourceAlphaFields removes disabled alpha fields from []CSIVolumeSource.
// This should be called from PrepareForCreate/PrepareForUpdate for all pod specs resources containing a CSIVolumeSource
func dropDisabledCSIVolumeSourceAlphaFields(podSpec, oldPodSpec *api.PodSpec) {
@ -491,6 +503,17 @@ func ephemeralContainersInUse(podSpec *api.PodSpec) bool {
return len(podSpec.EphemeralContainers) > 0
}
func fsGroupPolicyInUse(podSpec *api.PodSpec) bool {
if podSpec == nil {
return false
}
securityContext := podSpec.SecurityContext
if securityContext != nil && securityContext.FSGroupChangePolicy != nil {
return true
}
return false
}
// subpathInUse returns true if the pod spec is non-nil and has a volume mount that makes use of the subPath feature
func subpathInUse(podSpec *api.PodSpec) bool {
if podSpec == nil {

View File

@ -462,6 +462,133 @@ func TestPodConfigmaps(t *testing.T) {
}
}
func TestDropFSGroupFields(t *testing.T) {
nofsGroupPod := func() *api.Pod {
return &api.Pod{
Spec: api.PodSpec{
Containers: []api.Container{
{
Name: "container1",
Image: "testimage",
},
},
},
}
}
var podFSGroup int64 = 100
changePolicy := api.FSGroupChangeAlways
fsGroupPod := func() *api.Pod {
return &api.Pod{
Spec: api.PodSpec{
Containers: []api.Container{
{
Name: "container1",
Image: "testimage",
},
},
SecurityContext: &api.PodSecurityContext{
FSGroup: &podFSGroup,
FSGroupChangePolicy: &changePolicy,
},
},
}
}
podInfos := []struct {
description string
featureEnabled bool
newPodHasFSGroupChangePolicy bool
pod func() *api.Pod
expectPolicyInPod bool
}{
{
description: "oldPod.FSGroupChangePolicy=nil, feature=true, newPod.FSGroupChangePolicy=true",
featureEnabled: true,
pod: nofsGroupPod,
newPodHasFSGroupChangePolicy: true,
expectPolicyInPod: true,
},
{
description: "oldPod=nil, feature=false, newPod.FSGroupChangePolicy=true",
featureEnabled: false,
pod: func() *api.Pod { return nil },
newPodHasFSGroupChangePolicy: true,
expectPolicyInPod: false,
},
{
description: "oldPod=nil, feature=true, newPod.FSGroupChangePolicy=true",
featureEnabled: true,
pod: func() *api.Pod { return nil },
newPodHasFSGroupChangePolicy: true,
expectPolicyInPod: true,
},
{
description: "oldPod.FSGroupChangePolicy=nil, feature=false, newPod.FSGroupChangePolicy=true",
featureEnabled: false,
pod: nofsGroupPod,
newPodHasFSGroupChangePolicy: true,
expectPolicyInPod: false,
},
{
description: "oldPod.FSGroupChangePolicy=true, feature=false, newPod.FSGroupChangePolicy=true",
featureEnabled: false,
pod: fsGroupPod,
newPodHasFSGroupChangePolicy: true,
expectPolicyInPod: true,
},
{
description: "oldPod.FSGroupChangePolicy=true, feature=false, newPod.FSGroupChangePolicy=false",
featureEnabled: false,
pod: fsGroupPod,
newPodHasFSGroupChangePolicy: false,
expectPolicyInPod: false,
},
{
description: "oldPod.FSGroupChangePolicy=true, feature=true, newPod.FSGroupChangePolicy=false",
featureEnabled: true,
pod: fsGroupPod,
newPodHasFSGroupChangePolicy: false,
expectPolicyInPod: false,
},
}
for _, podInfo := range podInfos {
t.Run(podInfo.description, func(t *testing.T) {
defer featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.ConfigurableFSGroupPolicy, podInfo.featureEnabled)()
oldPod := podInfo.pod()
newPod := oldPod.DeepCopy()
if oldPod == nil && podInfo.newPodHasFSGroupChangePolicy {
newPod = fsGroupPod()
}
if oldPod != nil {
if podInfo.newPodHasFSGroupChangePolicy {
newPod.Spec.SecurityContext = &api.PodSecurityContext{
FSGroup: &podFSGroup,
FSGroupChangePolicy: &changePolicy,
}
} else {
newPod.Spec.SecurityContext = &api.PodSecurityContext{}
}
}
DropDisabledPodFields(newPod, oldPod)
if podInfo.expectPolicyInPod {
secContext := newPod.Spec.SecurityContext
if secContext == nil || secContext.FSGroupChangePolicy == nil {
t.Errorf("for %s, expected fsGroupChangepolicy found none", podInfo.description)
}
} else {
secConext := newPod.Spec.SecurityContext
if secConext != nil && secConext.FSGroupChangePolicy != nil {
t.Errorf("for %s, unexpected fsGroupChangepolicy set", podInfo.description)
}
}
})
}
}
func TestDropSubPath(t *testing.T) {
podWithSubpaths := func() *api.Pod {
return &api.Pod{

View File

@ -2785,6 +2785,22 @@ type Sysctl struct {
Value string
}
// PodFSGroupChangePolicy holds policies that will be used for applying fsGroup to a volume
// when volume is mounted.
type PodFSGroupChangePolicy string
const (
// FSGroupChangeOnRootMismatch indicates that volume's ownership and permissions will be changed
// only when permission and ownership of root directory does not match with expected
// permissions on the volume. This can help shorten the time it takes to change
// ownership and permissions of a volume.
FSGroupChangeOnRootMismatch PodFSGroupChangePolicy = "OnRootMismatch"
// FSGroupChangeAlways indicates that volume's ownership and permissions
// should always be changed whenever volume is mounted inside a Pod. This the default
// behavior.
FSGroupChangeAlways PodFSGroupChangePolicy = "Always"
)
// PodSecurityContext holds pod-level security attributes and common container settings.
// Some fields are also present in container.securityContext. Field values of
// container.securityContext take precedence over field values of PodSecurityContext.
@ -2864,6 +2880,14 @@ type PodSecurityContext struct {
// If unset, the Kubelet will not modify the ownership and permissions of any volume.
// +optional
FSGroup *int64
// fsGroupChangePolicy defines behavior of changing ownership and permission of the volume
// before being exposed inside Pod. This field will only apply to
// volume types which support fsGroup based ownership(and permissions).
// It will have no effect on ephemeral volume types such as: secret, configmaps
// and emptydir.
// Valid values are "OnRootMismatch" and "Always". If not specified defaults to "Always".
// +optional
FSGroupChangePolicy *PodFSGroupChangePolicy
// Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported
// sysctls (by the container runtime) might fail to launch.
// +optional

View File

@ -5941,6 +5941,7 @@ func autoConvert_v1_PodSecurityContext_To_core_PodSecurityContext(in *v1.PodSecu
out.SupplementalGroups = *(*[]int64)(unsafe.Pointer(&in.SupplementalGroups))
out.FSGroup = (*int64)(unsafe.Pointer(in.FSGroup))
out.Sysctls = *(*[]core.Sysctl)(unsafe.Pointer(&in.Sysctls))
out.FSGroupChangePolicy = (*core.PodFSGroupChangePolicy)(unsafe.Pointer(in.FSGroupChangePolicy))
return nil
}
@ -5961,6 +5962,7 @@ func autoConvert_core_PodSecurityContext_To_v1_PodSecurityContext(in *core.PodSe
out.RunAsNonRoot = (*bool)(unsafe.Pointer(in.RunAsNonRoot))
out.SupplementalGroups = *(*[]int64)(unsafe.Pointer(&in.SupplementalGroups))
out.FSGroup = (*int64)(unsafe.Pointer(in.FSGroup))
out.FSGroupChangePolicy = (*v1.PodFSGroupChangePolicy)(unsafe.Pointer(in.FSGroupChangePolicy))
out.Sysctls = *(*[]v1.Sysctl)(unsafe.Pointer(&in.Sysctls))
return nil
}

View File

@ -31,7 +31,7 @@ import (
"k8s.io/klog"
"k8s.io/api/core/v1"
v1 "k8s.io/api/core/v1"
apiequality "k8s.io/apimachinery/pkg/api/equality"
"k8s.io/apimachinery/pkg/api/resource"
apimachineryvalidation "k8s.io/apimachinery/pkg/api/validation"
@ -2816,6 +2816,16 @@ func validateDNSPolicy(dnsPolicy *core.DNSPolicy, fldPath *field.Path) field.Err
return allErrors
}
var validFSGroupChangePolicies = sets.NewString(string(core.FSGroupChangeOnRootMismatch), string(core.FSGroupChangeAlways))
func validateFSGroupChangePolicy(fsGroupPolicy *core.PodFSGroupChangePolicy, fldPath *field.Path) field.ErrorList {
allErrors := field.ErrorList{}
if !validFSGroupChangePolicies.Has(string(*fsGroupPolicy)) {
allErrors = append(allErrors, field.NotSupported(fldPath, fsGroupPolicy, validFSGroupChangePolicies.List()))
}
return allErrors
}
const (
// Limits on various DNS parameters. These are derived from
// restrictions in Linux libc name resolution handling.
@ -3659,6 +3669,10 @@ func ValidatePodSecurityContext(securityContext *core.PodSecurityContext, spec *
allErrs = append(allErrs, validateSysctls(securityContext.Sysctls, fldPath.Child("sysctls"))...)
}
if securityContext.FSGroupChangePolicy != nil {
allErrs = append(allErrs, validateFSGroupChangePolicy(securityContext.FSGroupChangePolicy, fldPath.Child("fsGroupChangePolicy"))...)
}
allErrs = append(allErrs, validateWindowsSecurityContextOptions(securityContext.WindowsOptions, fldPath.Child("windowsOptions"))...)
}

View File

@ -6558,6 +6558,9 @@ func TestValidatePodSpec(t *testing.T) {
maxUserID := int64(2147483647)
minGroupID := int64(0)
maxGroupID := int64(2147483647)
goodfsGroupChangePolicy := core.FSGroupChangeAlways
badfsGroupChangePolicy1 := core.PodFSGroupChangePolicy("invalid")
badfsGroupChangePolicy2 := core.PodFSGroupChangePolicy("")
successCases := []core.PodSpec{
{ // Populate basic fields, leave defaults for most.
@ -6705,6 +6708,14 @@ func TestValidatePodSpec(t *testing.T) {
RuntimeClassName: utilpointer.StringPtr("valid-sandbox"),
Overhead: core.ResourceList{},
},
{
Containers: []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
SecurityContext: &core.PodSecurityContext{
FSGroupChangePolicy: &goodfsGroupChangePolicy,
},
RestartPolicy: core.RestartPolicyAlways,
DNSPolicy: core.DNSClusterFirst,
},
}
for i := range successCases {
if errs := ValidatePodSpec(&successCases[i], field.NewPath("field")); len(errs) != 0 {
@ -6892,6 +6903,22 @@ func TestValidatePodSpec(t *testing.T) {
DNSPolicy: core.DNSClusterFirst,
RuntimeClassName: utilpointer.StringPtr("invalid/sandbox"),
},
"bad empty fsGroupchangepolicy": {
Containers: []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
SecurityContext: &core.PodSecurityContext{
FSGroupChangePolicy: &badfsGroupChangePolicy2,
},
RestartPolicy: core.RestartPolicyAlways,
DNSPolicy: core.DNSClusterFirst,
},
"bad invalid fsgroupchangepolicy": {
Containers: []core.Container{{Name: "ctr", Image: "image", ImagePullPolicy: "IfNotPresent", TerminationMessagePolicy: "File"}},
SecurityContext: &core.PodSecurityContext{
FSGroupChangePolicy: &badfsGroupChangePolicy1,
},
RestartPolicy: core.RestartPolicyAlways,
DNSPolicy: core.DNSClusterFirst,
},
}
for k, v := range failureCases {
if errs := ValidatePodSpec(&v, field.NewPath("field")); len(errs) == 0 {
@ -8269,6 +8296,7 @@ func TestValidatePodUpdate(t *testing.T) {
activeDeadlineSecondsNegative = int64(-30)
activeDeadlineSecondsPositive = int64(30)
activeDeadlineSecondsLarger = int64(31)
validfsGroupChangePolicy = core.FSGroupChangeOnRootMismatch
now = metav1.Now()
grace = int64(30)
@ -8719,6 +8747,36 @@ func TestValidatePodUpdate(t *testing.T) {
"spec: Forbidden: pod updates may not change fields",
"cpu change",
},
{
core.Pod{
ObjectMeta: metav1.ObjectMeta{Name: "foo"},
Spec: core.PodSpec{
Containers: []core.Container{
{
Image: "foo:V1",
},
},
SecurityContext: &core.PodSecurityContext{
FSGroupChangePolicy: &validfsGroupChangePolicy,
},
},
},
core.Pod{
ObjectMeta: metav1.ObjectMeta{Name: "foo"},
Spec: core.PodSpec{
Containers: []core.Container{
{
Image: "foo:V2",
},
},
SecurityContext: &core.PodSecurityContext{
FSGroupChangePolicy: nil,
},
},
},
"spec: Forbidden: pod updates may not change fields",
"fsGroupChangePolicy change",
},
{
core.Pod{
ObjectMeta: metav1.ObjectMeta{Name: "foo"},

View File

@ -3691,6 +3691,11 @@ func (in *PodSecurityContext) DeepCopyInto(out *PodSecurityContext) {
*out = new(int64)
**out = **in
}
if in.FSGroupChangePolicy != nil {
in, out := &in.FSGroupChangePolicy, &out.FSGroupChangePolicy
*out = new(PodFSGroupChangePolicy)
**out = **in
}
if in.Sysctls != nil {
in, out := &in.Sysctls, &out.Sysctls
*out = make([]Sysctl, len(*in))

View File

@ -419,6 +419,12 @@ const (
// Expects Azure File CSI Driver to be installed and configured on all nodes.
CSIMigrationAzureFileComplete featuregate.Feature = "CSIMigrationAzureFileComplete"
// owner: @gnufied
// alpha: v1.18
// Allows user to configure volume permission change policy for fsGroups when mounting
// a volume in a Pod.
ConfigurableFSGroupPolicy featuregate.Feature = "ConfigurableFSGroupPolicy"
// owner: @RobertKrawitz
// beta: v1.15
//
@ -629,6 +635,7 @@ var defaultKubernetesFeatureGates = map[featuregate.Feature]featuregate.FeatureS
CSIMigrationOpenStack: {Default: false, PreRelease: featuregate.Beta}, // Off by default (requires OpenStack Cinder CSI driver)
CSIMigrationOpenStackComplete: {Default: false, PreRelease: featuregate.Alpha},
VolumeSubpath: {Default: true, PreRelease: featuregate.GA},
ConfigurableFSGroupPolicy: {Default: false, PreRelease: featuregate.Alpha},
BalanceAttachedNodeVolumes: {Default: false, PreRelease: featuregate.Alpha},
VolumeSubpathEnvExpansion: {Default: true, PreRelease: featuregate.GA, LockToDefault: true}, // remove in 1.19,
CSIBlockVolume: {Default: true, PreRelease: featuregate.GA, LockToDefault: true}, // remove in 1.20

View File

@ -51,6 +51,7 @@ go_test(
"metrics_nil_test.go",
"metrics_statfs_test.go",
"plugins_test.go",
"volume_linux_test.go",
],
embed = [":go_default_library"],
deps = [
@ -61,9 +62,15 @@ go_test(
"//staging/src/k8s.io/client-go/util/testing:go_default_library",
] + select({
"@io_bazel_rules_go//go/platform:android": [
"//pkg/features:go_default_library",
"//staging/src/k8s.io/apiserver/pkg/util/feature:go_default_library",
"//staging/src/k8s.io/component-base/featuregate/testing:go_default_library",
"//vendor/golang.org/x/sys/unix:go_default_library",
],
"@io_bazel_rules_go//go/platform:linux": [
"//pkg/features:go_default_library",
"//staging/src/k8s.io/apiserver/pkg/util/feature:go_default_library",
"//staging/src/k8s.io/component-base/featuregate/testing:go_default_library",
"//vendor/golang.org/x/sys/unix:go_default_library",
],
"//conditions:default": [],

View File

@ -428,7 +428,7 @@ func (b *awsElasticBlockStoreMounter) SetUpAt(dir string, mounterArgs volume.Mou
}
if !b.readOnly {
volume.SetVolumeOwnership(b, mounterArgs.FsGroup)
volume.SetVolumeOwnership(b, mounterArgs.FsGroup, mounterArgs.FSGroupChangePolicy)
}
klog.V(4).Infof("Successfully mounted %s", dir)

View File

@ -164,7 +164,7 @@ func (m *azureDiskMounter) SetUpAt(dir string, mounterArgs volume.MounterArgs) e
}
if volumeSource.ReadOnly == nil || !*volumeSource.ReadOnly {
volume.SetVolumeOwnership(m, mounterArgs.FsGroup)
volume.SetVolumeOwnership(m, mounterArgs.FsGroup, mounterArgs.FSGroupChangePolicy)
}
klog.V(2).Infof("azureDisk - successfully mounted disk %s on %s", diskName, dir)

View File

@ -448,7 +448,7 @@ func (b *cinderVolumeMounter) SetUpAt(dir string, mounterArgs volume.MounterArgs
}
if !b.readOnly {
volume.SetVolumeOwnership(b, mounterArgs.FsGroup)
volume.SetVolumeOwnership(b, mounterArgs.FsGroup, mounterArgs.FSGroupChangePolicy)
}
klog.V(3).Infof("Cinder volume %s mounted to %s", b.pdName, dir)

View File

@ -256,7 +256,7 @@ func (b *configMapVolumeMounter) SetUpAt(dir string, mounterArgs volume.MounterA
return err
}
err = volume.SetVolumeOwnership(b, mounterArgs.FsGroup)
err = volume.SetVolumeOwnership(b, mounterArgs.FsGroup, nil /*fsGroupChangePolicy*/)
if err != nil {
klog.Errorf("Error applying volume ownership settings for group: %v", mounterArgs.FsGroup)
return err

View File

@ -28,6 +28,7 @@ import (
"k8s.io/klog"
api "k8s.io/api/core/v1"
v1 "k8s.io/api/core/v1"
storage "k8s.io/api/storage/v1beta1"
apierrors "k8s.io/apimachinery/pkg/api/errors"
"k8s.io/apimachinery/pkg/types"
@ -281,7 +282,7 @@ func (c *csiMountMgr) SetUpAt(dir string, mounterArgs volume.MounterArgs) error
// The following logic is derived from https://github.com/kubernetes/kubernetes/issues/66323
// if fstype is "", then skip fsgroup (could be indication of non-block filesystem)
// if fstype is provided and pv.AccessMode == ReadWriteOnly, then apply fsgroup
err = c.applyFSGroup(fsType, mounterArgs.FsGroup)
err = c.applyFSGroup(fsType, mounterArgs.FsGroup, mounterArgs.FSGroupChangePolicy)
if err != nil {
// At this point mount operation is successful:
// 1. Since volume can not be used by the pod because of invalid permissions, we must return error
@ -380,7 +381,7 @@ func (c *csiMountMgr) TearDownAt(dir string) error {
// from https://github.com/kubernetes/kubernetes/issues/66323
// 1) if fstype is "", then skip fsgroup (could be indication of non-block filesystem)
// 2) if fstype is provided and pv.AccessMode == ReadWriteOnly and !c.spec.ReadOnly then apply fsgroup
func (c *csiMountMgr) applyFSGroup(fsType string, fsGroup *int64) error {
func (c *csiMountMgr) applyFSGroup(fsType string, fsGroup *int64, fsGroupChangePolicy *v1.PodFSGroupChangePolicy) error {
if fsGroup != nil {
if fsType == "" {
klog.V(4).Info(log("mounter.SetupAt WARNING: skipping fsGroup, fsType not provided"))
@ -402,7 +403,7 @@ func (c *csiMountMgr) applyFSGroup(fsType string, fsGroup *int64) error {
return nil
}
err := volume.SetVolumeOwnership(c, fsGroup)
err := volume.SetVolumeOwnership(c, fsGroup, fsGroupChangePolicy)
if err != nil {
return err
}

View File

@ -20,7 +20,7 @@ import (
"fmt"
"path/filepath"
"k8s.io/api/core/v1"
v1 "k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/types"
utilerrors "k8s.io/apimachinery/pkg/util/errors"
"k8s.io/klog"
@ -227,7 +227,7 @@ func (b *downwardAPIVolumeMounter) SetUpAt(dir string, mounterArgs volume.Mounte
return err
}
err = volume.SetVolumeOwnership(b, mounterArgs.FsGroup)
err = volume.SetVolumeOwnership(b, mounterArgs.FsGroup, nil /*fsGroupChangePolicy*/)
if err != nil {
klog.Errorf("Error applying volume ownership settings for group: %v", mounterArgs.FsGroup)
return err

View File

@ -25,7 +25,7 @@ import (
"k8s.io/utils/mount"
utilstrings "k8s.io/utils/strings"
"k8s.io/api/core/v1"
v1 "k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/api/resource"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/types"
@ -227,7 +227,7 @@ func (ed *emptyDir) SetUpAt(dir string, mounterArgs volume.MounterArgs) error {
err = fmt.Errorf("unknown storage medium %q", ed.medium)
}
volume.SetVolumeOwnership(ed, mounterArgs.FsGroup)
volume.SetVolumeOwnership(ed, mounterArgs.FsGroup, nil /*fsGroupChangePolicy*/)
// If setting up the quota fails, just log a message but don't actually error out.
// We'll use the old du mechanism in this case, at least until we support

View File

@ -19,6 +19,7 @@ package fc
import (
"os"
v1 "k8s.io/api/core/v1"
"k8s.io/klog"
"k8s.io/utils/mount"
@ -39,7 +40,7 @@ type diskManager interface {
}
// utility to mount a disk based filesystem
func diskSetUp(manager diskManager, b fcDiskMounter, volPath string, mounter mount.Interface, fsGroup *int64) error {
func diskSetUp(manager diskManager, b fcDiskMounter, volPath string, mounter mount.Interface, fsGroup *int64, fsGroupChangePolicy *v1.PodFSGroupChangePolicy) error {
globalPDPath := manager.MakeGlobalPDName(*b.fcDisk)
noMnt, err := mounter.IsLikelyNotMountPoint(volPath)
@ -90,7 +91,7 @@ func diskSetUp(manager diskManager, b fcDiskMounter, volPath string, mounter mou
}
if !b.readOnly {
volume.SetVolumeOwnership(&b, fsGroup)
volume.SetVolumeOwnership(&b, fsGroup, fsGroupChangePolicy)
}
return nil

View File

@ -362,7 +362,7 @@ func (b *fcDiskMounter) SetUp(mounterArgs volume.MounterArgs) error {
func (b *fcDiskMounter) SetUpAt(dir string, mounterArgs volume.MounterArgs) error {
// diskSetUp checks mountpoints and prevent repeated calls
err := diskSetUp(b.manager, *b, dir, b.mounter, mounterArgs.FsGroup)
err := diskSetUp(b.manager, *b, dir, b.mounter, mounterArgs.FsGroup, mounterArgs.FSGroupChangePolicy)
if err != nil {
klog.Errorf("fc: failed to setup")
}

View File

@ -93,7 +93,7 @@ func (f *flexVolumeMounter) SetUpAt(dir string, mounterArgs volume.MounterArgs)
if !f.readOnly {
if f.plugin.capabilities.FSGroup {
volume.SetVolumeOwnership(f, mounterArgs.FsGroup)
volume.SetVolumeOwnership(f, mounterArgs.FsGroup, mounterArgs.FSGroupChangePolicy)
}
}

View File

@ -361,7 +361,7 @@ func (b *flockerVolumeMounter) SetUpAt(dir string, mounterArgs volume.MounterArg
}
if !b.readOnly {
volume.SetVolumeOwnership(b, mounterArgs.FsGroup)
volume.SetVolumeOwnership(b, mounterArgs.FsGroup, mounterArgs.FSGroupChangePolicy)
}
klog.V(4).Infof("successfully mounted %s", dir)

View File

@ -429,7 +429,7 @@ func (b *gcePersistentDiskMounter) SetUpAt(dir string, mounterArgs volume.Mounte
}
if !b.readOnly {
volume.SetVolumeOwnership(b, mounterArgs.FsGroup)
volume.SetVolumeOwnership(b, mounterArgs.FsGroup, mounterArgs.FSGroupChangePolicy)
}
return nil
}

View File

@ -22,7 +22,7 @@ import (
"path/filepath"
"strings"
"k8s.io/api/core/v1"
v1 "k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/types"
"k8s.io/kubernetes/pkg/volume"
volumeutil "k8s.io/kubernetes/pkg/volume/util"
@ -236,7 +236,7 @@ func (b *gitRepoVolumeMounter) SetUpAt(dir string, mounterArgs volume.MounterArg
return fmt.Errorf("failed to exec 'git reset --hard': %s: %v", output, err)
}
volume.SetVolumeOwnership(b, mounterArgs.FsGroup)
volume.SetVolumeOwnership(b, mounterArgs.FsGroup, nil /*fsGroupChangePolicy*/)
volumeutil.SetReady(b.getMetaDir())
return nil

View File

@ -19,6 +19,7 @@ package iscsi
import (
"os"
v1 "k8s.io/api/core/v1"
"k8s.io/klog"
"k8s.io/utils/mount"
@ -41,7 +42,7 @@ type diskManager interface {
// utility to mount a disk based filesystem
// globalPDPath: global mount path like, /var/lib/kubelet/plugins/kubernetes.io/iscsi/{ifaceName}/{portal-some_iqn-lun-lun_id}
// volPath: pod volume dir path like, /var/lib/kubelet/pods/{podUID}/volumes/kubernetes.io~iscsi/{volumeName}
func diskSetUp(manager diskManager, b iscsiDiskMounter, volPath string, mounter mount.Interface, fsGroup *int64) error {
func diskSetUp(manager diskManager, b iscsiDiskMounter, volPath string, mounter mount.Interface, fsGroup *int64, fsGroupChangePolicy *v1.PodFSGroupChangePolicy) error {
notMnt, err := mounter.IsLikelyNotMountPoint(volPath)
if err != nil && !os.IsNotExist(err) {
klog.Errorf("cannot validate mountpoint: %s", volPath)
@ -95,7 +96,7 @@ func diskSetUp(manager diskManager, b iscsiDiskMounter, volPath string, mounter
}
if !b.readOnly {
volume.SetVolumeOwnership(&b, fsGroup)
volume.SetVolumeOwnership(&b, fsGroup, fsGroupChangePolicy)
}
return nil

View File

@ -345,7 +345,7 @@ func (b *iscsiDiskMounter) SetUp(mounterArgs volume.MounterArgs) error {
func (b *iscsiDiskMounter) SetUpAt(dir string, mounterArgs volume.MounterArgs) error {
// diskSetUp checks mountpoints and prevent repeated calls
err := diskSetUp(b.manager, *b, dir, b.mounter, mounterArgs.FsGroup)
err := diskSetUp(b.manager, *b, dir, b.mounter, mounterArgs.FsGroup, mounterArgs.FSGroupChangePolicy)
if err != nil {
klog.Errorf("iscsi: failed to setup")
}

View File

@ -567,7 +567,7 @@ func (m *localVolumeMounter) SetUpAt(dir string, mounterArgs volume.MounterArgs)
if !m.readOnly {
// Volume owner will be written only once on the first volume mount
if len(refs) == 0 {
return volume.SetVolumeOwnership(m, mounterArgs.FsGroup)
return volume.SetVolumeOwnership(m, mounterArgs.FsGroup, mounterArgs.FSGroupChangePolicy)
}
}
return nil

View File

@ -328,7 +328,7 @@ func (b *portworxVolumeMounter) SetUpAt(dir string, mounterArgs volume.MounterAr
return err
}
if !b.readOnly {
volume.SetVolumeOwnership(b, mounterArgs.FsGroup)
volume.SetVolumeOwnership(b, mounterArgs.FsGroup, mounterArgs.FSGroupChangePolicy)
}
klog.Infof("Portworx Volume %s setup at %s", b.volumeID, dir)
return nil

View File

@ -20,7 +20,7 @@ import (
"fmt"
authenticationv1 "k8s.io/api/authentication/v1"
"k8s.io/api/core/v1"
v1 "k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/types"
@ -239,7 +239,7 @@ func (s *projectedVolumeMounter) SetUpAt(dir string, mounterArgs volume.MounterA
return err
}
err = volume.SetVolumeOwnership(s, mounterArgs.FsGroup)
err = volume.SetVolumeOwnership(s, mounterArgs.FsGroup, nil /*fsGroupChangePolicy*/)
if err != nil {
klog.Errorf("Error applying volume ownership settings for group: %v", mounterArgs.FsGroup)
return err

View File

@ -58,7 +58,7 @@ type diskManager interface {
}
// utility to mount a disk based filesystem
func diskSetUp(manager diskManager, b rbdMounter, volPath string, mounter mount.Interface, fsGroup *int64) error {
func diskSetUp(manager diskManager, b rbdMounter, volPath string, mounter mount.Interface, fsGroup *int64, fsGroupChangePolicy *v1.PodFSGroupChangePolicy) error {
globalPDPath := manager.MakeGlobalPDName(*b.rbd)
notMnt, err := mounter.IsLikelyNotMountPoint(globalPDPath)
if err != nil && !os.IsNotExist(err) {
@ -96,7 +96,7 @@ func diskSetUp(manager diskManager, b rbdMounter, volPath string, mounter mount.
klog.V(3).Infof("rbd: successfully bind mount %s to %s with options %v", globalPDPath, volPath, mountOptions)
if !b.ReadOnly {
volume.SetVolumeOwnership(&b, fsGroup)
volume.SetVolumeOwnership(&b, fsGroup, fsGroupChangePolicy)
}
return nil

View File

@ -838,7 +838,7 @@ func (b *rbdMounter) SetUp(mounterArgs volume.MounterArgs) error {
func (b *rbdMounter) SetUpAt(dir string, mounterArgs volume.MounterArgs) error {
// diskSetUp checks mountpoints and prevent repeated calls
klog.V(4).Infof("rbd: attempting to setup at %s", dir)
err := diskSetUp(b.manager, *b, dir, b.mounter, mounterArgs.FsGroup)
err := diskSetUp(b.manager, *b, dir, b.mounter, mounterArgs.FsGroup, mounterArgs.FSGroupChangePolicy)
if err != nil {
klog.Errorf("rbd: failed to setup at %s %v", dir, err)
}

View File

@ -157,7 +157,7 @@ func (v *sioVolume) SetUpAt(dir string, mounterArgs volume.MounterArgs) error {
if !v.readOnly && mounterArgs.FsGroup != nil {
klog.V(4).Info(log("applying value FSGroup ownership"))
volume.SetVolumeOwnership(v, mounterArgs.FsGroup)
volume.SetVolumeOwnership(v, mounterArgs.FsGroup, mounterArgs.FSGroupChangePolicy)
}
klog.V(4).Info(log("successfully setup PV %s: volume %s mapped as %s mounted at %s", v.volSpecName, v.volName, devicePath, dir))

View File

@ -251,7 +251,7 @@ func (b *secretVolumeMounter) SetUpAt(dir string, mounterArgs volume.MounterArgs
return err
}
err = volume.SetVolumeOwnership(b, mounterArgs.FsGroup)
err = volume.SetVolumeOwnership(b, mounterArgs.FsGroup, nil /*fsGroupChangePolicy*/)
if err != nil {
klog.Errorf("Error applying volume ownership settings for group: %v", mounterArgs.FsGroup)
return err

View File

@ -431,7 +431,7 @@ func (b *storageosMounter) SetUpAt(dir string, mounterArgs volume.MounterArgs) e
}
if !b.readOnly {
volume.SetVolumeOwnership(b, mounterArgs.FsGroup)
volume.SetVolumeOwnership(b, mounterArgs.FsGroup, mounterArgs.FSGroupChangePolicy)
}
klog.V(4).Infof("StorageOS volume setup complete on %s", dir)
return nil

View File

@ -542,9 +542,14 @@ func (og *operationGenerator) GenerateMountVolumeFunc(
}
var fsGroup *int64
if volumeToMount.Pod.Spec.SecurityContext != nil &&
volumeToMount.Pod.Spec.SecurityContext.FSGroup != nil {
fsGroup = volumeToMount.Pod.Spec.SecurityContext.FSGroup
var fsGroupChangePolicy *v1.PodFSGroupChangePolicy
if podSc := volumeToMount.Pod.Spec.SecurityContext; podSc != nil {
if podSc.FSGroup != nil {
fsGroup = podSc.FSGroup
}
if podSc.FSGroupChangePolicy != nil {
fsGroupChangePolicy = podSc.FSGroupChangePolicy
}
}
devicePath := volumeToMount.DevicePath
@ -622,8 +627,9 @@ func (og *operationGenerator) GenerateMountVolumeFunc(
// Execute mount
mountErr := volumeMounter.SetUp(volume.MounterArgs{
FsGroup: fsGroup,
DesiredSize: volumeToMount.DesiredSizeLimit,
FsGroup: fsGroup,
DesiredSize: volumeToMount.DesiredSizeLimit,
FSGroupChangePolicy: fsGroupChangePolicy,
})
// Update actual state of world
markOpts := MarkVolumeOpts{

View File

@ -103,8 +103,9 @@ type Attributes struct {
// MounterArgs provides more easily extensible arguments to Mounter
type MounterArgs struct {
FsGroup *int64
DesiredSize *resource.Quantity
FsGroup *int64
FSGroupChangePolicy *v1.PodFSGroupChangePolicy
DesiredSize *resource.Quantity
}
// Mounter interface provides methods to set up/mount the volume.

View File

@ -24,7 +24,10 @@ import (
"os"
v1 "k8s.io/api/core/v1"
utilfeature "k8s.io/apiserver/pkg/util/feature"
"k8s.io/klog"
"k8s.io/kubernetes/pkg/features"
)
const (
@ -36,60 +39,192 @@ const (
// SetVolumeOwnership modifies the given volume to be owned by
// fsGroup, and sets SetGid so that newly created files are owned by
// fsGroup. If fsGroup is nil nothing is done.
func SetVolumeOwnership(mounter Mounter, fsGroup *int64) error {
func SetVolumeOwnership(mounter Mounter, fsGroup *int64, fsGroupChangePolicy *v1.PodFSGroupChangePolicy) error {
if fsGroup == nil {
return nil
}
fsGroupPolicyEnabled := utilfeature.DefaultFeatureGate.Enabled(features.ConfigurableFSGroupPolicy)
klog.Warningf("Setting volume ownership for %s and fsGroup set. If the volume has a lot of files then setting volume ownership could be slow, see https://github.com/kubernetes/kubernetes/issues/69699", mounter.GetPath())
// This code exists for legacy purposes, so as old behaviour is entirely preserved when feature gate is disabled
// TODO: remove this when ConfigurableFSGroupPolicy turns GA.
if !fsGroupPolicyEnabled {
return legacyOwnershipChange(mounter, fsGroup)
}
if skipPermissionChange(mounter, fsGroup, fsGroupChangePolicy) {
klog.V(3).Infof("skipping permission and ownership change for volume %s", mounter.GetPath())
return nil
}
return walkDeep(mounter.GetPath(), func(path string, info os.FileInfo, err error) error {
if err != nil {
return err
}
return changeFilePermission(path, fsGroup, mounter.GetAttributes().ReadOnly, info)
})
}
func legacyOwnershipChange(mounter Mounter, fsGroup *int64) error {
return filepath.Walk(mounter.GetPath(), func(path string, info os.FileInfo, err error) error {
if err != nil {
return err
}
// chown and chmod pass through to the underlying file for symlinks.
// Symlinks have a mode of 777 but this really doesn't mean anything.
// The permissions of the underlying file are what matter.
// However, if one reads the mode of a symlink then chmods the symlink
// with that mode, it changes the mode of the underlying file, overridden
// the defaultMode and permissions initialized by the volume plugin, which
// is not what we want; thus, we skip chown/chmod for symlinks.
if info.Mode()&os.ModeSymlink != 0 {
return nil
}
stat, ok := info.Sys().(*syscall.Stat_t)
if !ok {
return nil
}
if stat == nil {
klog.Errorf("Got nil stat_t for path %v while setting ownership of volume", path)
return nil
}
err = os.Chown(path, int(stat.Uid), int(*fsGroup))
if err != nil {
klog.Errorf("Chown failed on %v: %v", path, err)
}
mask := rwMask
if mounter.GetAttributes().ReadOnly {
mask = roMask
}
if info.IsDir() {
mask |= os.ModeSetgid
mask |= execMask
}
err = os.Chmod(path, info.Mode()|mask)
if err != nil {
klog.Errorf("Chmod failed on %v: %v", path, err)
}
return nil
return changeFilePermission(path, fsGroup, mounter.GetAttributes().ReadOnly, info)
})
}
func changeFilePermission(filename string, fsGroup *int64, readonly bool, info os.FileInfo) error {
// chown and chmod pass through to the underlying file for symlinks.
// Symlinks have a mode of 777 but this really doesn't mean anything.
// The permissions of the underlying file are what matter.
// However, if one reads the mode of a symlink then chmods the symlink
// with that mode, it changes the mode of the underlying file, overridden
// the defaultMode and permissions initialized by the volume plugin, which
// is not what we want; thus, we skip chown/chmod for symlinks.
if info.Mode()&os.ModeSymlink != 0 {
return nil
}
stat, ok := info.Sys().(*syscall.Stat_t)
if !ok {
return nil
}
if stat == nil {
klog.Errorf("Got nil stat_t for path %v while setting ownership of volume", filename)
return nil
}
err := os.Chown(filename, int(stat.Uid), int(*fsGroup))
if err != nil {
klog.Errorf("Chown failed on %v: %v", filename, err)
}
mask := rwMask
if readonly {
mask = roMask
}
if info.IsDir() {
mask |= os.ModeSetgid
mask |= execMask
}
err = os.Chmod(filename, info.Mode()|mask)
if err != nil {
klog.Errorf("Chmod failed on %v: %v", filename, err)
}
return nil
}
func skipPermissionChange(mounter Mounter, fsGroup *int64, fsGroupChangePolicy *v1.PodFSGroupChangePolicy) bool {
dir := mounter.GetPath()
if fsGroupChangePolicy == nil || *fsGroupChangePolicy != v1.FSGroupChangeOnRootMismatch {
klog.V(4).Infof("perform recursive ownership change for %s", dir)
return false
}
return !requiresPermissionChange(mounter.GetPath(), fsGroup, mounter.GetAttributes().ReadOnly)
}
func requiresPermissionChange(rootDir string, fsGroup *int64, readonly bool) bool {
fsInfo, err := os.Stat(rootDir)
if err != nil {
klog.Errorf("performing recursive ownership change on %s because reading permissions of root volume failed: %v", rootDir, err)
return true
}
stat, ok := fsInfo.Sys().(*syscall.Stat_t)
if !ok || stat == nil {
klog.Errorf("performing recursive ownership change on %s because reading permissions of root volume failed", rootDir)
return true
}
if int(stat.Gid) != int(*fsGroup) {
klog.V(4).Infof("expected group ownership of volume %s did not match with: %d", rootDir, stat.Gid)
return true
}
unixPerms := rwMask
if readonly {
unixPerms = roMask
}
// if rootDir is not a directory then we should apply permission change anyways
if !fsInfo.IsDir() {
return true
}
unixPerms |= execMask
filePerm := fsInfo.Mode().Perm()
// We need to check if actual permissions of root directory is a superset of permissions required by unixPerms.
// This is done by checking if permission bits expected in unixPerms is set in actual permissions of the directory.
// We use bitwise AND operation to check set bits. For example:
// unixPerms: 770, filePerms: 775 : 770&775 = 770 (perms on directory is a superset)
// unixPerms: 770, filePerms: 770 : 770&770 = 770 (perms on directory is a superset)
// unixPerms: 770, filePerms: 750 : 770&750 = 750 (perms on directory is NOT a superset)
// We also need to check if setgid bits are set in permissions of the directory.
if (unixPerms&filePerm != unixPerms) || (fsInfo.Mode()&os.ModeSetgid == 0) {
klog.V(4).Infof("performing recursive ownership change on %s because of mismatching mode", rootDir)
return true
}
return false
}
// readDirNames reads the directory named by dirname and returns
// a list of directory entries.
// We are not using filepath.readDirNames because we do not want to sort files found in a directory before changing
// permissions for performance reasons.
func readDirNames(dirname string) ([]string, error) {
f, err := os.Open(dirname)
if err != nil {
return nil, err
}
names, err := f.Readdirnames(-1)
f.Close()
if err != nil {
return nil, err
}
return names, nil
}
// walkDeep can be used to traverse directories and has two minor differences
// from filepath.Walk:
// - List of files/dirs is not sorted for performance reasons
// - callback walkFunc is invoked on root directory after visiting children dirs and files
func walkDeep(root string, walkFunc filepath.WalkFunc) error {
info, err := os.Lstat(root)
if err != nil {
return walkFunc(root, nil, err)
}
return walk(root, info, walkFunc)
}
func walk(path string, info os.FileInfo, walkFunc filepath.WalkFunc) error {
if !info.IsDir() {
return walkFunc(path, info, nil)
}
names, err := readDirNames(path)
if err != nil {
return err
}
for _, name := range names {
filename := filepath.Join(path, name)
fileInfo, err := os.Lstat(filename)
if err != nil {
if err := walkFunc(filename, fileInfo, err); err != nil {
return err
}
} else {
err = walk(filename, fileInfo, walkFunc)
if err != nil {
return err
}
}
}
return walkFunc(path, info, nil)
}

View File

@ -0,0 +1,347 @@
// +build linux
/*
Copyright 2020 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package volume
import (
"fmt"
"os"
"path/filepath"
"syscall"
"testing"
v1 "k8s.io/api/core/v1"
utilfeature "k8s.io/apiserver/pkg/util/feature"
utiltesting "k8s.io/client-go/util/testing"
featuregatetesting "k8s.io/component-base/featuregate/testing"
"k8s.io/kubernetes/pkg/features"
)
type localFakeMounter struct {
path string
attributes Attributes
}
func (l *localFakeMounter) GetPath() string {
return l.path
}
func (l *localFakeMounter) GetAttributes() Attributes {
return l.attributes
}
func (l *localFakeMounter) CanMount() error {
return nil
}
func (l *localFakeMounter) SetUp(mounterArgs MounterArgs) error {
return nil
}
func (l *localFakeMounter) SetUpAt(dir string, mounterArgs MounterArgs) error {
return nil
}
func (l *localFakeMounter) GetMetrics() (*Metrics, error) {
return nil, nil
}
func TestSkipPermissionChange(t *testing.T) {
always := v1.FSGroupChangeAlways
onrootMismatch := v1.FSGroupChangeOnRootMismatch
tests := []struct {
description string
fsGroupChangePolicy *v1.PodFSGroupChangePolicy
gidOwnerMatch bool
permissionMatch bool
sgidMatch bool
skipPermssion bool
}{
{
description: "skippermission=false, policy=nil",
skipPermssion: false,
},
{
description: "skippermission=false, policy=always",
fsGroupChangePolicy: &always,
skipPermssion: false,
},
{
description: "skippermission=false, policy=always, gidmatch=true",
fsGroupChangePolicy: &always,
skipPermssion: false,
gidOwnerMatch: true,
},
{
description: "skippermission=false, policy=nil, gidmatch=true",
fsGroupChangePolicy: nil,
skipPermssion: false,
gidOwnerMatch: true,
},
{
description: "skippermission=false, policy=onrootmismatch, gidmatch=false",
fsGroupChangePolicy: &onrootMismatch,
gidOwnerMatch: false,
skipPermssion: false,
},
{
description: "skippermission=false, policy=onrootmismatch, gidmatch=true, permmatch=false",
fsGroupChangePolicy: &onrootMismatch,
gidOwnerMatch: true,
permissionMatch: false,
skipPermssion: false,
},
{
description: "skippermission=false, policy=onrootmismatch, gidmatch=true, permmatch=true",
fsGroupChangePolicy: &onrootMismatch,
gidOwnerMatch: true,
permissionMatch: true,
skipPermssion: false,
},
{
description: "skippermission=false, policy=onrootmismatch, gidmatch=true, permmatch=true, sgidmatch=true",
fsGroupChangePolicy: &onrootMismatch,
gidOwnerMatch: true,
permissionMatch: true,
sgidMatch: true,
skipPermssion: true,
},
}
for _, test := range tests {
t.Run(test.description, func(t *testing.T) {
tmpDir, err := utiltesting.MkTmpdir("volume_linux_test")
if err != nil {
t.Fatalf("error creating temp dir: %v", err)
}
defer os.RemoveAll(tmpDir)
info, err := os.Lstat(tmpDir)
if err != nil {
t.Fatalf("error reading permission of tmpdir: %v", err)
}
stat, ok := info.Sys().(*syscall.Stat_t)
if !ok || stat == nil {
t.Fatalf("error reading permission stats for tmpdir: %s", tmpDir)
}
gid := stat.Gid
var expectedGid int64
if test.gidOwnerMatch {
expectedGid = int64(gid)
} else {
expectedGid = int64(gid + 3000)
}
mask := rwMask
if test.sgidMatch {
mask |= os.ModeSetgid
}
if test.permissionMatch {
mask |= execMask
}
err = os.Chmod(tmpDir, info.Mode()|mask)
if err != nil {
t.Errorf("Chmod failed on %v: %v", tmpDir, err)
}
mounter := &localFakeMounter{path: tmpDir}
ok = skipPermissionChange(mounter, &expectedGid, test.fsGroupChangePolicy)
if ok != test.skipPermssion {
t.Errorf("for %s expected skipPermission to be %v got %v", test.description, test.skipPermssion, ok)
}
})
}
}
func TestSetVolumeOwnership(t *testing.T) {
always := v1.FSGroupChangeAlways
onrootMismatch := v1.FSGroupChangeOnRootMismatch
expectedMask := rwMask | os.ModeSetgid | execMask
tests := []struct {
description string
fsGroupChangePolicy *v1.PodFSGroupChangePolicy
setupFunc func(path string) error
assertFunc func(path string) error
featureGate bool
}{
{
description: "featuregate=on, fsgroupchangepolicy=always",
fsGroupChangePolicy: &always,
featureGate: true,
setupFunc: func(path string) error {
info, err := os.Lstat(path)
if err != nil {
return err
}
// change mode of root folder to be right
err = os.Chmod(path, info.Mode()|expectedMask)
if err != nil {
return err
}
// create a subdirectory with invalid permissions
rogueDir := filepath.Join(path, "roguedir")
err = os.Mkdir(rogueDir, info.Mode())
if err != nil {
return err
}
return nil
},
assertFunc: func(path string) error {
rogueDir := filepath.Join(path, "roguedir")
hasCorrectPermissions := verifyDirectoryPermission(rogueDir, false /*readOnly*/)
if !hasCorrectPermissions {
return fmt.Errorf("invalid permissions on %s", rogueDir)
}
return nil
},
},
{
description: "featuregate=on, fsgroupchangepolicy=onrootmismatch,rootdir=validperm",
fsGroupChangePolicy: &onrootMismatch,
featureGate: true,
setupFunc: func(path string) error {
info, err := os.Lstat(path)
if err != nil {
return err
}
// change mode of root folder to be right
err = os.Chmod(path, info.Mode()|expectedMask)
if err != nil {
return err
}
// create a subdirectory with invalid permissions
rogueDir := filepath.Join(path, "roguedir")
err = os.Mkdir(rogueDir, rwMask)
if err != nil {
return err
}
return nil
},
assertFunc: func(path string) error {
rogueDir := filepath.Join(path, "roguedir")
hasCorrectPermissions := verifyDirectoryPermission(rogueDir, false /*readOnly*/)
if hasCorrectPermissions {
return fmt.Errorf("invalid permissions on %s", rogueDir)
}
return nil
},
},
{
description: "featuregate=on, fsgroupchangepolicy=onrootmismatch,rootdir=invalidperm",
fsGroupChangePolicy: &onrootMismatch,
featureGate: true,
setupFunc: func(path string) error {
// change mode of root folder to be right
err := os.Chmod(path, 0770)
if err != nil {
return err
}
// create a subdirectory with invalid permissions
rogueDir := filepath.Join(path, "roguedir")
err = os.Mkdir(rogueDir, rwMask)
if err != nil {
return err
}
return nil
},
assertFunc: func(path string) error {
rogueDir := filepath.Join(path, "roguedir")
hasCorrectPermissions := verifyDirectoryPermission(rogueDir, false /*readOnly*/)
if !hasCorrectPermissions {
return fmt.Errorf("invalid permissions on %s", rogueDir)
}
return nil
},
},
}
for _, test := range tests {
t.Run(test.description, func(t *testing.T) {
defer featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.ConfigurableFSGroupPolicy, test.featureGate)()
tmpDir, err := utiltesting.MkTmpdir("volume_linux_ownership")
if err != nil {
t.Fatalf("error creating temp dir: %v", err)
}
defer os.RemoveAll(tmpDir)
info, err := os.Lstat(tmpDir)
if err != nil {
t.Fatalf("error reading permission of tmpdir: %v", err)
}
stat, ok := info.Sys().(*syscall.Stat_t)
if !ok || stat == nil {
t.Fatalf("error reading permission stats for tmpdir: %s", tmpDir)
}
var expectedGid int64 = int64(stat.Gid)
err = test.setupFunc(tmpDir)
if err != nil {
t.Errorf("for %s error running setup with: %v", test.description, err)
}
mounter := &localFakeMounter{path: tmpDir}
err = SetVolumeOwnership(mounter, &expectedGid, test.fsGroupChangePolicy)
if err != nil {
t.Errorf("for %s error changing ownership with: %v", test.description, err)
}
err = test.assertFunc(tmpDir)
if err != nil {
t.Errorf("for %s error verifying permissions with: %v", test.description, err)
}
})
}
}
// verifyDirectoryPermission checks if given path has directory permissions
// that is expected by k8s. If returns true if it does otherwise false
func verifyDirectoryPermission(path string, readonly bool) bool {
info, err := os.Lstat(path)
if err != nil {
return false
}
stat, ok := info.Sys().(*syscall.Stat_t)
if !ok || stat == nil {
return false
}
unixPerms := rwMask
if readonly {
unixPerms = roMask
}
unixPerms |= execMask
filePerm := info.Mode().Perm()
if (unixPerms&filePerm == unixPerms) && (info.Mode()&os.ModeSetgid != 0) {
return true
}
return false
}

View File

@ -18,6 +18,10 @@ limitations under the License.
package volume
func SetVolumeOwnership(mounter Mounter, fsGroup *int64) error {
import (
v1 "k8s.io/api/core/v1"
)
func SetVolumeOwnership(mounter Mounter, fsGroup *int64, fsGroupChangePolicy *v1.PodFSGroupChangePolicy) error {
return nil
}

View File

@ -270,7 +270,7 @@ func (b *vsphereVolumeMounter) SetUpAt(dir string, mounterArgs volume.MounterArg
os.Remove(dir)
return err
}
volume.SetVolumeOwnership(b, mounterArgs.FsGroup)
volume.SetVolumeOwnership(b, mounterArgs.FsGroup, mounterArgs.FSGroupChangePolicy)
klog.V(3).Infof("vSphere volume %s mounted to %s", b.volPath, dir)
return nil

File diff suppressed because it is too large Load Diff

View File

@ -3278,6 +3278,15 @@ message PodSecurityContext {
// sysctls (by the container runtime) might fail to launch.
// +optional
repeated Sysctl sysctls = 7;
// fsGroupChangePolicy defines behavior of changing ownership and permission of the volume
// before being exposed inside Pod. This field will only apply to
// volume types which support fsGroup based ownership(and permissions).
// It will have no effect on ephemeral volume types such as: secret, configmaps
// and emptydir.
// Valid values are "OnRootMismatch" and "Always". If not specified defaults to "Always".
// +optional
optional string fsGroupChangePolicy = 9;
}
// Describes the class of pods that should avoid this node.

View File

@ -3126,6 +3126,22 @@ type HostAlias struct {
Hostnames []string `json:"hostnames,omitempty" protobuf:"bytes,2,rep,name=hostnames"`
}
// PodFSGroupChangePolicy holds policies that will be used for applying fsGroup to a volume
// when volume is mounted.
type PodFSGroupChangePolicy string
const (
// FSGroupChangeOnRootMismatch indicates that volume's ownership and permissions will be changed
// only when permission and ownership of root directory does not match with expected
// permissions on the volume. This can help shorten the time it takes to change
// ownership and permissions of a volume.
FSGroupChangeOnRootMismatch PodFSGroupChangePolicy = "OnRootMismatch"
// FSGroupChangeAlways indicates that volume's ownership and permissions
// should always be changed whenever volume is mounted inside a Pod. This the default
// behavior.
FSGroupChangeAlways PodFSGroupChangePolicy = "Always"
)
// PodSecurityContext holds pod-level security attributes and common container settings.
// Some fields are also present in container.securityContext. Field values of
// container.securityContext take precedence over field values of PodSecurityContext.
@ -3184,6 +3200,14 @@ type PodSecurityContext struct {
// sysctls (by the container runtime) might fail to launch.
// +optional
Sysctls []Sysctl `json:"sysctls,omitempty" protobuf:"bytes,7,rep,name=sysctls"`
// fsGroupChangePolicy defines behavior of changing ownership and permission of the volume
// before being exposed inside Pod. This field will only apply to
// volume types which support fsGroup based ownership(and permissions).
// It will have no effect on ephemeral volume types such as: secret, configmaps
// and emptydir.
// Valid values are "OnRootMismatch" and "Always". If not specified defaults to "Always".
// +optional
FSGroupChangePolicy *PodFSGroupChangePolicy `json:"fsGroupChangePolicy,omitempty" protobuf:"bytes,9,opt,name=fsGroupChangePolicy"`
}
// PodQOSClass defines the supported qos classes of Pods.

View File

@ -1574,15 +1574,16 @@ func (PodReadinessGate) SwaggerDoc() map[string]string {
}
var map_PodSecurityContext = map[string]string{
"": "PodSecurityContext holds pod-level security attributes and common container settings. Some fields are also present in container.securityContext. Field values of container.securityContext take precedence over field values of PodSecurityContext.",
"seLinuxOptions": "The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container.",
"windowsOptions": "The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.",
"runAsUser": "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container.",
"runAsGroup": "The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container.",
"runAsNonRoot": "Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.",
"supplementalGroups": "A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container.",
"fsGroup": "A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod:\n\n1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw ",
"sysctls": "Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch.",
"": "PodSecurityContext holds pod-level security attributes and common container settings. Some fields are also present in container.securityContext. Field values of container.securityContext take precedence over field values of PodSecurityContext.",
"seLinuxOptions": "The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container.",
"windowsOptions": "The Windows specific settings applied to all containers. If unspecified, the options within a container's SecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.",
"runAsUser": "The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container.",
"runAsGroup": "The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container.",
"runAsNonRoot": "Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence.",
"supplementalGroups": "A list of groups applied to the first process run in each container, in addition to the container's primary GID. If unspecified, no groups will be added to any container.",
"fsGroup": "A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod:\n\n1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw ",
"sysctls": "Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch.",
"fsGroupChangePolicy": "fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are \"OnRootMismatch\" and \"Always\". If not specified defaults to \"Always\".",
}
func (PodSecurityContext) SwaggerDoc() map[string]string {

View File

@ -3689,6 +3689,11 @@ func (in *PodSecurityContext) DeepCopyInto(out *PodSecurityContext) {
*out = make([]Sysctl, len(*in))
copy(*out, *in)
}
if in.FSGroupChangePolicy != nil {
in, out := &in.FSGroupChangePolicy, &out.FSGroupChangePolicy
*out = new(PodFSGroupChangePolicy)
**out = **in
}
return
}

View File

@ -1158,7 +1158,8 @@
"name": "370",
"value": "371"
}
]
],
"fsGroupChangePolicy": "Ĕ\\ɢX鰨松/Ȁĵ鴁ĩȲǸ|蕎"
},
"imagePullSecrets": [
{
@ -1175,7 +1176,7 @@
"matchExpressions": [
{
"key": "375",
"operator": "Ã茓pȓɻ",
"operator": "Ǚ(",
"values": [
"376"
]
@ -1184,7 +1185,7 @@
"matchFields": [
{
"key": "377",
"operator": "",
"operator": "瘍Nʊ輔3璾ėȜv1b繐汚",
"values": [
"378"
]
@ -1195,12 +1196,12 @@
},
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": -767058113,
"weight": 702968201,
"preference": {
"matchExpressions": [
{
"key": "379",
"operator": "Ǹ|蕎'佉賞ǧĒz",
"operator": "n覦灲閈誹ʅ蕉",
"values": [
"380"
]
@ -1209,7 +1210,7 @@
"matchFields": [
{
"key": "381",
"operator": "ùfŭƽ",
"operator": "",
"values": [
"382"
]
@ -1224,11 +1225,11 @@
{
"labelSelector": {
"matchLabels": {
"h-up52--sjo7799-skj5--9/R_rm": "CR.s--f.-f.-zv._._.o"
"lm-e46-r-g63--gt1--6mx-r-927--m6-k8-c2---2etfh41ca-z-g/0p_3_J_SA995IKCR.s--f.-f.-zv._._.5-H.T.-.-.d": "b_9_1o.w_aI._31-_I-A-_3bz._8M0U1_-__.71-_-9_._X-D---k..1Q7._l.I"
},
"matchExpressions": [
{
"key": "K_A-_9_Z_C..7o_x3..-.8-Jp-94",
"key": "d----v8-4--558n1asz-r886x.2-cgr6---r58-e-l203-8sln7-x/k2_9.v.--_.--4QQ.-s.H.Hu-k-_-0-T1mel--F......3_t_l",
"operator": "DoesNotExist"
}
]
@ -1241,16 +1242,19 @@
],
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": 801902541,
"weight": 1195176401,
"podAffinityTerm": {
"labelSelector": {
"matchLabels": {
"bx1y-8---3----p-pdn--j2---2--82--cj-1-s--op34-yy28-38xmu5nx4s-4/4b_9_1o.w_I": "x-_.--4QQ.-s.H.Hu-k-_-0-T1mel--F......3_t_-l..-.DG7r-3.----.4"
"Bk.j._g-G-7--p9.-_0R.-_-3_L_2--_v2.5p_..Y-.wg_-b8a_68": "Q4_.84.K_-_0_..u.F.pq..--Q"
},
"matchExpressions": [
{
"key": "3---g-----p8-d5-8-m8i--k0j5g.zrrw8-5ts-7-bp/6E__-.8_e_2",
"operator": "DoesNotExist"
"key": "8b-3-3b17cab-ppy5e--9p-61-2we16h--5-d-k-sm.2xv17r--32b-----4-670tfz-up3n/ov_Z--Zg-_Q",
"operator": "NotIn",
"values": [
"0..KpiS.oK-.O--5-yp8q_s-L"
]
}
]
},
@ -1267,12 +1271,15 @@
{
"labelSelector": {
"matchLabels": {
"7F3p2_-_AmD-.0AP.1": "A--.F5_x.KNC0-.-m_0-m-6Sp_N-S..O-BZ..n"
"H__V.Vz_6.Hz_V_.r_v_._e_-78o_6Z..11_7pX_.-mLlx...w_j": "35.40Rw4gD.._.-x6db-L7.-__-G_2kCpS_1"
},
"matchExpressions": [
{
"key": "QZ9p_6.C.e",
"operator": "DoesNotExist"
"key": "d-XZ-x.__.Y_2-n_5023Xl-3Pw_-r7g",
"operator": "NotIn",
"values": [
"VT3sn-0_.i__a.O2G_J"
]
}
]
},
@ -1284,18 +1291,18 @@
],
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": -1851436166,
"weight": -1508769491,
"podAffinityTerm": {
"labelSelector": {
"matchLabels": {
"6V1-rU.___06.eqk5E_-4-.XH-.k.7.l_-W8o._xJ1-lFA_X3": "V0H2-.zHw.H__V.VT"
"3--rgvf3q-z-5z80n--t5--9-4-d2-22--i--40wv--in-870w--it6k47-7y1.h72n-cnp-75/c10KkQ-R_R.-.--4_IT_O__3.5h_XC0_-3": "20_._.-_L-__bf_9_-C-PfNx__-U_.Pn-W23-_.z_.._s--_F-BR-.h_-2-.F"
},
"matchExpressions": [
{
"key": "0--0g-q-22r4wye52y-h7463lyps4483-o--3f1p7--43nw-l-x8/Hz_V_.r_v_._e_-78o_6Z..11_7pX_.-mLlx...w_t-_.5.40Rw4D",
"operator": "NotIn",
"key": "p_.3--_9QW2JkU27_.-4T-I.-..K.-.0__sD.-e",
"operator": "In",
"values": [
"txb__-ex-_1_-ODgC_1-_V"
""
]
}
]
@ -1313,10 +1320,10 @@
"tolerations": [
{
"key": "416",
"operator": "堺ʣ",
"operator": "抄3昞财Î嘝zʄ!ć",
"value": "417",
"effect": "ŽɣB矗E¸",
"tolerationSeconds": -3532804738923434397
"effect": "緍k¢茤",
"tolerationSeconds": 4096844323391966153
}
],
"hostAliases": [
@ -1328,7 +1335,7 @@
}
],
"priorityClassName": "420",
"priority": -1852730577,
"priority": -1331113536,
"dnsConfig": {
"nameservers": [
"421"
@ -1345,31 +1352,28 @@
},
"readinessGates": [
{
"conditionType": "ź魊塾ɖ$rolȋɶuɋ5r儉ɩ柀ɨ鴅"
"conditionType": "mō6µɑ`ȗ\u003c8^翜"
}
],
"runtimeClassName": "425",
"enableServiceLinks": false,
"preemptionPolicy": "!ń1ċƹ|慼櫁色苆试揯遐",
"preemptionPolicy": "ý筞X",
"overhead": {
"4'ď曕椐敛n湙": "310"
"tHǽ÷閂抰^窄CǙķȈ": "97"
},
"topologySpreadConstraints": [
{
"maxSkew": -150478704,
"maxSkew": 1956797678,
"topologyKey": "426",
"whenUnsatisfiable": ";鹡鑓侅闍ŏŃŋŏ}ŀ",
"whenUnsatisfiable": "ƀ+瑏eCmAȥ睙",
"labelSelector": {
"matchLabels": {
"p2djmscp--ac8u23-k----26u5--72n-5.j8-0020-1-5/t5W_._._-2M2._i": "wvU"
"zp22o4a-w----11rqy3eo79p-f4r1--7p--053--suu--98.y1s8-j-6j4uvf1-sdg--132bid-7x0u738--7w-tdt-u-0--v/Ied-0-i_zZsY_o8t5Vl6_..7CY-_dc__G6N-_-0o.0C_gV.9_G5": "x_.4dwFbuvEf55Y2k.F-4"
},
"matchExpressions": [
{
"key": "4-4D-r.-F__r.oh..2_uGGP..-_N_h_4Hl-X0_2-W",
"operator": "In",
"values": [
"2-.s_6O-5_7_-0w_--5-_.3--_9QWJ"
]
"key": "88-i19.y-y7o-0-wq-zfdw73w0---4a18-f---ui6-48e-9-h4-w-qp25--7-n--kfk3g/1n1.--.._-x_4..u2-__3uM77U7._pz",
"operator": "DoesNotExist"
}
]
}
@ -1378,29 +1382,28 @@
}
},
"updateStrategy": {
"type": "荥ơ'禧ǵŊ)TiD¢ƿ媴h5",
"rollingUpdate": {
"maxUnavailable": 2
}
},
"minReadySeconds": 212061711,
"revisionHistoryLimit": -1092090658
"minReadySeconds": 997447044,
"revisionHistoryLimit": 989524452
},
"status": {
"currentNumberScheduled": -1979737528,
"numberMisscheduled": -1707056814,
"desiredNumberScheduled": -424698834,
"numberReady": 407742062,
"observedGeneration": 5741439505187758584,
"updatedNumberScheduled": 902022378,
"numberAvailable": 1660081568,
"numberUnavailable": 904244563,
"collisionCount": -449319810,
"currentNumberScheduled": 1606858231,
"numberMisscheduled": 1791868025,
"desiredNumberScheduled": -793692762,
"numberReady": -1152625369,
"observedGeneration": 3839991706170762113,
"updatedNumberScheduled": -1292943463,
"numberAvailable": -1734448297,
"numberUnavailable": -1757575936,
"collisionCount": 129237050,
"conditions": [
{
"type": "",
"status": "'ƈoIǢ龞瞯å",
"lastTransitionTime": "2469-07-10T03:20:34Z",
"type": "{ɦ!f親ʚ«Ǥ栌Ə侷ŧĞö",
"status": "",
"lastTransitionTime": "2733-02-09T15:36:31Z",
"reason": "433",
"message": "434"
}

View File

@ -30,8 +30,8 @@ metadata:
selfLink: "5"
uid: "7"
spec:
minReadySeconds: 212061711
revisionHistoryLimit: -1092090658
minReadySeconds: 997447044
revisionHistoryLimit: 989524452
selector:
matchExpressions:
- key: p503---477-49p---o61---4fy--9---7--9-9s-0-u5lj2--10pq-0-7-9-2-0/fP81.-.9Vdx.TB_M-H_5_.t..bG0
@ -78,25 +78,25 @@ spec:
- preference:
matchExpressions:
- key: "379"
operator: Ǹ|蕎'佉賞ǧĒz
operator: n覦灲閈誹ʅ蕉
values:
- "380"
matchFields:
- key: "381"
operator: ùfŭƽ
operator: ""
values:
- "382"
weight: -767058113
weight: 702968201
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: "375"
operator: Ã茓pȓɻ
operator: Ǚ(
values:
- "376"
matchFields:
- key: "377"
operator: ""
operator: 瘍Nʊ輔3璾ėȜv1b繐汚
values:
- "378"
podAffinity:
@ -104,21 +104,23 @@ spec:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: 3---g-----p8-d5-8-m8i--k0j5g.zrrw8-5ts-7-bp/6E__-.8_e_2
operator: DoesNotExist
- key: 8b-3-3b17cab-ppy5e--9p-61-2we16h--5-d-k-sm.2xv17r--32b-----4-670tfz-up3n/ov_Z--Zg-_Q
operator: NotIn
values:
- 0..KpiS.oK-.O--5-yp8q_s-L
matchLabels:
bx1y-8---3----p-pdn--j2---2--82--cj-1-s--op34-yy28-38xmu5nx4s-4/4b_9_1o.w_I: x-_.--4QQ.-s.H.Hu-k-_-0-T1mel--F......3_t_-l..-.DG7r-3.----.4
Bk.j._g-G-7--p9.-_0R.-_-3_L_2--_v2.5p_..Y-.wg_-b8a_68: Q4_.84.K_-_0_..u.F.pq..--Q
namespaces:
- "397"
topologyKey: "398"
weight: 801902541
weight: 1195176401
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: K_A-_9_Z_C..7o_x3..-.8-Jp-94
- key: d----v8-4--558n1asz-r886x.2-cgr6---r58-e-l203-8sln7-x/k2_9.v.--_.--4QQ.-s.H.Hu-k-_-0-T1mel--F......3_t_l
operator: DoesNotExist
matchLabels:
h-up52--sjo7799-skj5--9/R_rm: CR.s--f.-f.-zv._._.o
lm-e46-r-g63--gt1--6mx-r-927--m6-k8-c2---2etfh41ca-z-g/0p_3_J_SA995IKCR.s--f.-f.-zv._._.5-H.T.-.-.d: b_9_1o.w_aI._31-_I-A-_3bz._8M0U1_-__.71-_-9_._X-D---k..1Q7._l.I
namespaces:
- "389"
topologyKey: "390"
@ -127,23 +129,25 @@ spec:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: 0--0g-q-22r4wye52y-h7463lyps4483-o--3f1p7--43nw-l-x8/Hz_V_.r_v_._e_-78o_6Z..11_7pX_.-mLlx...w_t-_.5.40Rw4D
operator: NotIn
- key: p_.3--_9QW2JkU27_.-4T-I.-..K.-.0__sD.-e
operator: In
values:
- txb__-ex-_1_-ODgC_1-_V
- ""
matchLabels:
6V1-rU.___06.eqk5E_-4-.XH-.k.7.l_-W8o._xJ1-lFA_X3: V0H2-.zHw.H__V.VT
3--rgvf3q-z-5z80n--t5--9-4-d2-22--i--40wv--in-870w--it6k47-7y1.h72n-cnp-75/c10KkQ-R_R.-.--4_IT_O__3.5h_XC0_-3: 20_._.-_L-__bf_9_-C-PfNx__-U_.Pn-W23-_.z_.._s--_F-BR-.h_-2-.F
namespaces:
- "413"
topologyKey: "414"
weight: -1851436166
weight: -1508769491
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: QZ9p_6.C.e
operator: DoesNotExist
- key: d-XZ-x.__.Y_2-n_5023Xl-3Pw_-r7g
operator: NotIn
values:
- VT3sn-0_.i__a.O2G_J
matchLabels:
7F3p2_-_AmD-.0AP.1: A--.F5_x.KNC0-.-m_0-m-6Sp_N-S..O-BZ..n
H__V.Vz_6.Hz_V_.r_v_._e_-78o_6Z..11_7pX_.-mLlx...w_j: 35.40Rw4gD.._.-x6db-L7.-__-G_2kCpS_1
namespaces:
- "405"
topologyKey: "406"
@ -690,17 +694,18 @@ spec:
nodeSelector:
"358": "359"
overhead:
4'ď曕椐敛n湙: "310"
preemptionPolicy: '!ń1ċƹ|慼櫁色苆试揯遐'
priority: -1852730577
tHǽ÷閂抰^窄CǙķȈ: "97"
preemptionPolicy: ý筞X
priority: -1331113536
priorityClassName: "420"
readinessGates:
- conditionType: ź魊塾ɖ$rolȋɶuɋ5r儉ɩ柀ɨ鴅
- conditionType: mō6µɑ`ȗ<8^翜
restartPolicy: ɭɪǹ0衷,
runtimeClassName: "425"
schedulerName: "415"
securityContext:
fsGroup: 2585323675983182372
fsGroupChangePolicy: Ĕ\ɢX鰨松/Ȁĵ鴁ĩȲǸ|蕎
runAsGroup: 6386250802140824739
runAsNonRoot: false
runAsUser: -5315960194881172085
@ -724,23 +729,22 @@ spec:
subdomain: "374"
terminationGracePeriodSeconds: -3039830979334099524
tolerations:
- effect: ŽɣB矗E¸
- effect: 緍k¢茤
key: "416"
operator: 堺ʣ
tolerationSeconds: -3532804738923434397
operator: 抄3昞财Î嘝zʄ!ć
tolerationSeconds: 4096844323391966153
value: "417"
topologySpreadConstraints:
- labelSelector:
matchExpressions:
- key: 4-4D-r.-F__r.oh..2_uGGP..-_N_h_4Hl-X0_2-W
operator: In
values:
- 2-.s_6O-5_7_-0w_--5-_.3--_9QWJ
- key: 88-i19.y-y7o-0-wq-zfdw73w0---4a18-f---ui6-48e-9-h4-w-qp25--7-n--kfk3g/1n1.--.._-x_4..u2-__3uM77U7._pz
operator: DoesNotExist
matchLabels:
p2djmscp--ac8u23-k----26u5--72n-5.j8-0020-1-5/t5W_._._-2M2._i: wvU
maxSkew: -150478704
? zp22o4a-w----11rqy3eo79p-f4r1--7p--053--suu--98.y1s8-j-6j4uvf1-sdg--132bid-7x0u738--7w-tdt-u-0--v/Ied-0-i_zZsY_o8t5Vl6_..7CY-_dc__G6N-_-0o.0C_gV.9_G5
: x_.4dwFbuvEf55Y2k.F-4
maxSkew: 1956797678
topologyKey: "426"
whenUnsatisfiable: ;鹡鑓侅闍ŏŃŋŏ}ŀ
whenUnsatisfiable: ƀ+瑏eCmAȥ睙
volumes:
- awsElasticBlockStore:
fsType: "47"
@ -943,20 +947,19 @@ spec:
updateStrategy:
rollingUpdate:
maxUnavailable: 2
type: 荥ơ'禧ǵŊ)TiD¢ƿ媴h5
status:
collisionCount: -449319810
collisionCount: 129237050
conditions:
- lastTransitionTime: "2469-07-10T03:20:34Z"
- lastTransitionTime: "2733-02-09T15:36:31Z"
message: "434"
reason: "433"
status: '''ƈoIǢ龞瞯å'
type: ""
currentNumberScheduled: -1979737528
desiredNumberScheduled: -424698834
numberAvailable: 1660081568
numberMisscheduled: -1707056814
numberReady: 407742062
numberUnavailable: 904244563
observedGeneration: 5741439505187758584
updatedNumberScheduled: 902022378
status:
type: '{ɦ!f親ʚ«Ǥ栌Ə侷ŧĞö'
currentNumberScheduled: 1606858231
desiredNumberScheduled: -793692762
numberAvailable: -1734448297
numberMisscheduled: 1791868025
numberReady: -1152625369
numberUnavailable: -1757575936
observedGeneration: 3839991706170762113
updatedNumberScheduled: -1292943463

View File

@ -1154,7 +1154,8 @@
"name": "363",
"value": "364"
}
]
],
"fsGroupChangePolicy": "Ņ#耗Ǚ("
},
"imagePullSecrets": [
{
@ -1171,7 +1172,7 @@
"matchExpressions": [
{
"key": "368",
"operator": "ǧĒzŔ瘍N",
"operator": "",
"values": [
"369"
]

View File

@ -96,7 +96,7 @@ spec:
nodeSelectorTerms:
- matchExpressions:
- key: "368"
operator: ǧĒzŔ瘍N
operator: ""
values:
- "369"
matchFields:
@ -704,6 +704,7 @@ spec:
schedulerName: "408"
securityContext:
fsGroup: 760480547754807445
fsGroupChangePolicy: Ņ#耗Ǚ(
runAsGroup: -801152248124332545
runAsNonRoot: true
runAsUser: -2781126825051715248

View File

@ -1155,7 +1155,8 @@
"name": "371",
"value": "372"
}
]
],
"fsGroupChangePolicy": "蹔ŧ"
},
"imagePullSecrets": [
{
@ -1172,7 +1173,7 @@
"matchExpressions": [
{
"key": "376",
"operator": "6x$1sȣ±p鋄5弢ȹ均i绝5哇芆",
"operator": "1sȣ±p鋄5",
"values": [
"377"
]
@ -1181,7 +1182,7 @@
"matchFields": [
{
"key": "378",
"operator": "埮pɵ{WOŭW灬p",
"operator": "幩šeSvEȤƏ埮pɵ",
"values": [
"379"
]
@ -1192,12 +1193,12 @@
},
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": 199049889,
"weight": -1449289597,
"preference": {
"matchExpressions": [
{
"key": "380",
"operator": "擭銆jʒǚ鍰\\縑",
"operator": "",
"values": [
"381"
]
@ -1206,7 +1207,7 @@
"matchFields": [
{
"key": "382",
"operator": "鞤ɱďW賁Ěɭɪǹ0衷,Ʒƣ",
"operator": "ş",
"values": [
"383"
]
@ -1221,14 +1222,14 @@
{
"labelSelector": {
"matchLabels": {
"4--883d-v3j4-7y-p---up52--sjo7799-skj5---r-t.sumf7ew/u-5mj_9.M.134-5-.q6H_.--_---.M.U_-m.-P.yPS": "1Tvw39F_C-rtSY.g._2F7.-_e..r"
"3---93-2-23/8--21kF-c026.i": "9.M.134-5-.q6H_.--t"
},
"matchExpressions": [
{
"key": "6-x_rC9..__-6_k.N-2B_V.-tfh4.caTz_.g.w-o.8_WT-M.3_1",
"key": "7U_-m.-P.yP9S--858LI__.8U",
"operator": "NotIn",
"values": [
"z"
"7-_pP__up.2L_s-o779._-k-5___-Qq..csh-3--Z1Tvw39F_C-rtSY.g._2F7m"
]
}
]
@ -1241,16 +1242,19 @@
],
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": -217760519,
"weight": -280562323,
"podAffinityTerm": {
"labelSelector": {
"matchLabels": {
"4-yy28-38xmu5nx4s--41-7--6m/271-_-9_._X-D---k6": "Q.-s.H.Hu-k-_-0-T1mel--F......3_t_-l..-.DG7r-3.----._4__XOnP"
"gt._U.-x_rC9..__-6_k.N-2B_V.-tfh4.caTz5": "2w-o.8_WT-M.3_-1y_8DX"
},
"matchExpressions": [
{
"key": "3---g-----p8-d5-8-m8i--k0j5g.zrrw8-5ts-7-bp/6E__-.8_e_2",
"operator": "DoesNotExist"
"key": "z-ufkr-x0u-1meljf-5269893-t-kl35d6--7rs37zzgy3-4----nf---2/D8.TS-jJ.Ys_Mop34_-y.8_38xm-.nx.sEK4.B.__65m8_11",
"operator": "NotIn",
"values": [
"c-r.E__-.8_e_l2.._8s--7_3x_-J_....7"
]
}
]
},
@ -1267,11 +1271,11 @@
{
"labelSelector": {
"matchLabels": {
"7F3p2_-_AmD-.0AP.1": "A--.F5_x.KNC0-.-m_0-m-6Sp_N-S..O-BZ..n"
"mi-4xs-0-5k-67-3p2-t--m-l80--5o1--cp6-5-x4/n-p9.-_0R.-_-W": "7F.pq..--3QC1--L--v_Z--Zg-_4Q__-v_tu"
},
"matchExpressions": [
{
"key": "QZ9p_6.C.e",
"key": "r-7---064eqk5--f4e4--r1k278l-d-8o1-x-1wl----f31-0-9/X1rh-K5y_AzOBW.9oE9_6.--v17r__.b",
"operator": "DoesNotExist"
}
]
@ -1284,18 +1288,18 @@
],
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": -1851436166,
"weight": -1934575848,
"podAffinityTerm": {
"labelSelector": {
"matchLabels": {
"6V1-rU.___06.eqk5E_-4-.XH-.k.7.l_-W8o._xJ1-lFA_X3": "V0H2-.zHw.H__V.VT"
"72q--m--2k-p---139g-2wt-g-ve55m-27/k5v3aUK_--_o_2.--4Z7__i1T.miw_7a_...8-_0__5HG2_5XOAX.gUV": "nw_-_x18mtxb__-ex-_1_-ODgC_1-_8__T3sn-0_.i__a.O2G_-_K-.03.mp.1"
},
"matchExpressions": [
{
"key": "0--0g-q-22r4wye52y-h7463lyps4483-o--3f1p7--43nw-l-x8/Hz_V_.r_v_._e_-78o_6Z..11_7pX_.-mLlx...w_t-_.5.40Rw4D",
"key": "7--4_IT_O__3.5h_XC0_-7.-hj-O_8-b6E_--Y_Dp8O_._e_3_.4_E",
"operator": "NotIn",
"values": [
"txb__-ex-_1_-ODgC_1-_V"
"ZI-_P..w-W_-nE...-V"
]
}
]
@ -1313,10 +1317,10 @@
"tolerations": [
{
"key": "417",
"operator": "堺ʣ",
"operator": "ƴ磳藷曥摮Z Ǐg鲅",
"value": "418",
"effect": "ŽɣB矗E¸",
"tolerationSeconds": -3532804738923434397
"effect": "癯頯aɴí(Ȟ9\"忕(",
"tolerationSeconds": 3807599400818393626
}
],
"hostAliases": [
@ -1328,7 +1332,7 @@
}
],
"priorityClassName": "421",
"priority": -1852730577,
"priority": 1352980996,
"dnsConfig": {
"nameservers": [
"422"
@ -1345,30 +1349,30 @@
},
"readinessGates": [
{
"conditionType": "ź魊塾ɖ$rolȋɶuɋ5r儉ɩ柀ɨ鴅"
"conditionType": "Ɏ嵄箲Ů埞瞔ɏÊ锒e躜ƕ"
}
],
"runtimeClassName": "426",
"enableServiceLinks": false,
"preemptionPolicy": "!ń1ċƹ|慼櫁色苆试揯遐",
"preemptionPolicy": "鲛ô衞Ɵ鳝稃Ȍ液文?謮",
"overhead": {
"4'ď曕椐敛n湙": "310"
"Î磣:mʂ渢pɉ驻(+昒ȼȈɍ颬灲": "185"
},
"topologySpreadConstraints": [
{
"maxSkew": -150478704,
"maxSkew": 547935694,
"topologyKey": "427",
"whenUnsatisfiable": ";鹡鑓侅闍ŏŃŋŏ}ŀ",
"whenUnsatisfiable": "Ƨ钖孝0蛮xAǫ\u0026tŧK剛Ʀ",
"labelSelector": {
"matchLabels": {
"p2djmscp--ac8u23-k----26u5--72n-5.j8-0020-1-5/t5W_._._-2M2._i": "wvU"
"za42o/Y-YD-Q9_-__..YNFu7Pg-.1": "tE"
},
"matchExpressions": [
{
"key": "4-4D-r.-F__r.oh..2_uGGP..-_N_h_4Hl-X0_2-W",
"key": "9-t-4m7a-41-6j4m--4-r4p--w1k8-u.4-2-08vc-u/B_-X__Hs",
"operator": "In",
"values": [
"2-.s_6O-5_7_-0w_--5-_.3--_9QWJ"
"7h--m._fN._k8__._ep2P.B._A_090ERG2nV.__p_Y-.2I"
]
}
]
@ -1379,16 +1383,16 @@
}
},
"status": {
"replicas": -330302940,
"fullyLabeledReplicas": 138911331,
"readyReplicas": 1613009760,
"availableReplicas": -1469601144,
"observedGeneration": 6703635170896137755,
"replicas": -1165029050,
"fullyLabeledReplicas": 1893057016,
"readyReplicas": -2099726885,
"availableReplicas": -928976522,
"observedGeneration": 702392770146794584,
"conditions": [
{
"type": "ɡj瓇ɽ丿YƄZZ塖bʘ",
"status": "ɻ猶N嫡牿咸Ǻ潑鶋洅啶'ƈoIǢ龞瞯å",
"lastTransitionTime": "2469-07-10T03:20:34Z",
"type": "×軓鼐嵱宯ÙQ阉(闒ƈƳ",
"status": "ű孖站畦f黹ʩ鹸ɷ",
"lastTransitionTime": "2233-10-15T01:58:37Z",
"reason": "434",
"message": "435"
}

View File

@ -78,25 +78,25 @@ spec:
- preference:
matchExpressions:
- key: "380"
operator: 擭銆jʒǚ鍰\縑
operator: ""
values:
- "381"
matchFields:
- key: "382"
operator: 鞤ɱďW賁Ěɭɪǹ0衷,Ʒƣ
operator: ş
values:
- "383"
weight: 199049889
weight: -1449289597
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: "376"
operator: 6x$1sȣ±p鋄5弢ȹ均i绝5哇芆
operator: 1sȣ±p鋄5
values:
- "377"
matchFields:
- key: "378"
operator: 埮pɵ{WOŭW灬p
operator: 幩šeSvEȤƏ埮pɵ
values:
- "379"
podAffinity:
@ -104,23 +104,25 @@ spec:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: 3---g-----p8-d5-8-m8i--k0j5g.zrrw8-5ts-7-bp/6E__-.8_e_2
operator: DoesNotExist
- key: z-ufkr-x0u-1meljf-5269893-t-kl35d6--7rs37zzgy3-4----nf---2/D8.TS-jJ.Ys_Mop34_-y.8_38xm-.nx.sEK4.B.__65m8_11
operator: NotIn
values:
- c-r.E__-.8_e_l2.._8s--7_3x_-J_....7
matchLabels:
4-yy28-38xmu5nx4s--41-7--6m/271-_-9_._X-D---k6: Q.-s.H.Hu-k-_-0-T1mel--F......3_t_-l..-.DG7r-3.----._4__XOnP
gt._U.-x_rC9..__-6_k.N-2B_V.-tfh4.caTz5: 2w-o.8_WT-M.3_-1y_8DX
namespaces:
- "398"
topologyKey: "399"
weight: -217760519
weight: -280562323
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: 6-x_rC9..__-6_k.N-2B_V.-tfh4.caTz_.g.w-o.8_WT-M.3_1
- key: 7U_-m.-P.yP9S--858LI__.8U
operator: NotIn
values:
- z
- 7-_pP__up.2L_s-o779._-k-5___-Qq..csh-3--Z1Tvw39F_C-rtSY.g._2F7m
matchLabels:
4--883d-v3j4-7y-p---up52--sjo7799-skj5---r-t.sumf7ew/u-5mj_9.M.134-5-.q6H_.--_---.M.U_-m.-P.yPS: 1Tvw39F_C-rtSY.g._2F7.-_e..r
3---93-2-23/8--21kF-c026.i: 9.M.134-5-.q6H_.--t
namespaces:
- "390"
topologyKey: "391"
@ -129,23 +131,23 @@ spec:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: 0--0g-q-22r4wye52y-h7463lyps4483-o--3f1p7--43nw-l-x8/Hz_V_.r_v_._e_-78o_6Z..11_7pX_.-mLlx...w_t-_.5.40Rw4D
- key: 7--4_IT_O__3.5h_XC0_-7.-hj-O_8-b6E_--Y_Dp8O_._e_3_.4_E
operator: NotIn
values:
- txb__-ex-_1_-ODgC_1-_V
- ZI-_P..w-W_-nE...-V
matchLabels:
6V1-rU.___06.eqk5E_-4-.XH-.k.7.l_-W8o._xJ1-lFA_X3: V0H2-.zHw.H__V.VT
72q--m--2k-p---139g-2wt-g-ve55m-27/k5v3aUK_--_o_2.--4Z7__i1T.miw_7a_...8-_0__5HG2_5XOAX.gUV: nw_-_x18mtxb__-ex-_1_-ODgC_1-_8__T3sn-0_.i__a.O2G_-_K-.03.mp.1
namespaces:
- "414"
topologyKey: "415"
weight: -1851436166
weight: -1934575848
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: QZ9p_6.C.e
- key: r-7---064eqk5--f4e4--r1k278l-d-8o1-x-1wl----f31-0-9/X1rh-K5y_AzOBW.9oE9_6.--v17r__.b
operator: DoesNotExist
matchLabels:
7F3p2_-_AmD-.0AP.1: A--.F5_x.KNC0-.-m_0-m-6Sp_N-S..O-BZ..n
mi-4xs-0-5k-67-3p2-t--m-l80--5o1--cp6-5-x4/n-p9.-_0R.-_-W: 7F.pq..--3QC1--L--v_Z--Zg-_4Q__-v_tu
namespaces:
- "406"
topologyKey: "407"
@ -688,17 +690,18 @@ spec:
nodeSelector:
"359": "360"
overhead:
4'ď曕椐敛n湙: "310"
preemptionPolicy: '!ń1ċƹ|慼櫁色苆试揯遐'
priority: -1852730577
Î磣:mʂ渢pɉ驻(+昒ȼȈɍ颬灲: "185"
preemptionPolicy: 鲛ô衞Ɵ鳝稃Ȍ液文?謮
priority: 1352980996
priorityClassName: "421"
readinessGates:
- conditionType: ź魊塾ɖ$rolȋɶuɋ5r儉ɩ柀ɨ鴅
- conditionType: Ɏ嵄箲Ů埞瞔ɏÊ锒e躜ƕ
restartPolicy: ɘɢ鬍熖B芭花ª瘡
runtimeClassName: "426"
schedulerName: "416"
securityContext:
fsGroup: 7124276984274024394
fsGroupChangePolicy: 蹔ŧ
runAsGroup: -779972051078659613
runAsNonRoot: false
runAsUser: 2179199799235189619
@ -722,23 +725,23 @@ spec:
subdomain: "375"
terminationGracePeriodSeconds: 2666412258966278206
tolerations:
- effect: ŽɣB矗E¸
- effect: 癯頯aɴí(Ȟ9"忕(
key: "417"
operator: 堺ʣ
tolerationSeconds: -3532804738923434397
operator: ƴ磳藷曥摮Z Ǐg鲅
tolerationSeconds: 3807599400818393626
value: "418"
topologySpreadConstraints:
- labelSelector:
matchExpressions:
- key: 4-4D-r.-F__r.oh..2_uGGP..-_N_h_4Hl-X0_2-W
- key: 9-t-4m7a-41-6j4m--4-r4p--w1k8-u.4-2-08vc-u/B_-X__Hs
operator: In
values:
- 2-.s_6O-5_7_-0w_--5-_.3--_9QWJ
- 7h--m._fN._k8__._ep2P.B._A_090ERG2nV.__p_Y-.2I
matchLabels:
p2djmscp--ac8u23-k----26u5--72n-5.j8-0020-1-5/t5W_._._-2M2._i: wvU
maxSkew: -150478704
za42o/Y-YD-Q9_-__..YNFu7Pg-.1: tE
maxSkew: 547935694
topologyKey: "427"
whenUnsatisfiable: ;鹡鑓侅闍ŏŃŋŏ}ŀ
whenUnsatisfiable: Ƨ钖孝0蛮xAǫ&tŧK剛Ʀ
volumes:
- awsElasticBlockStore:
fsType: "47"
@ -938,14 +941,14 @@ spec:
storagePolicyName: "103"
volumePath: "101"
status:
availableReplicas: -1469601144
availableReplicas: -928976522
conditions:
- lastTransitionTime: "2469-07-10T03:20:34Z"
- lastTransitionTime: "2233-10-15T01:58:37Z"
message: "435"
reason: "434"
status: ɻ猶N嫡牿咸Ǻ潑鶋洅啶'ƈoIǢ龞瞯å
type: ɡj瓇ɽ丿YƄZZ塖bʘ
fullyLabeledReplicas: 138911331
observedGeneration: 6703635170896137755
readyReplicas: 1613009760
replicas: -330302940
status: ű孖站畦f黹ʩ鹸ɷ
type: ×軓鼐嵱宯ÙQ阉(闒ƈƳ
fullyLabeledReplicas: 1893057016
observedGeneration: 702392770146794584
readyReplicas: -2099726885
replicas: -1165029050

View File

@ -1154,7 +1154,8 @@
"name": "363",
"value": "364"
}
]
],
"fsGroupChangePolicy": "Ņ#耗Ǚ("
},
"imagePullSecrets": [
{
@ -1171,7 +1172,7 @@
"matchExpressions": [
{
"key": "368",
"operator": "ǧĒzŔ瘍N",
"operator": "",
"values": [
"369"
]

View File

@ -91,7 +91,7 @@ spec:
nodeSelectorTerms:
- matchExpressions:
- key: "368"
operator: ǧĒzŔ瘍N
operator: ""
values:
- "369"
matchFields:
@ -699,6 +699,7 @@ spec:
schedulerName: "408"
securityContext:
fsGroup: 760480547754807445
fsGroupChangePolicy: Ņ#耗Ǚ(
runAsGroup: -801152248124332545
runAsNonRoot: true
runAsUser: -2781126825051715248

View File

@ -1154,7 +1154,8 @@
"name": "363",
"value": "364"
}
]
],
"fsGroupChangePolicy": "Ņ#耗Ǚ("
},
"imagePullSecrets": [
{
@ -1171,7 +1172,7 @@
"matchExpressions": [
{
"key": "368",
"operator": "ǧĒzŔ瘍N",
"operator": "",
"values": [
"369"
]

View File

@ -98,7 +98,7 @@ spec:
nodeSelectorTerms:
- matchExpressions:
- key: "368"
operator: ǧĒzŔ瘍N
operator: ""
values:
- "369"
matchFields:
@ -706,6 +706,7 @@ spec:
schedulerName: "408"
securityContext:
fsGroup: 760480547754807445
fsGroupChangePolicy: Ņ#耗Ǚ(
runAsGroup: -801152248124332545
runAsNonRoot: true
runAsUser: -2781126825051715248

View File

@ -1154,7 +1154,8 @@
"name": "363",
"value": "364"
}
]
],
"fsGroupChangePolicy": "Ņ#耗Ǚ("
},
"imagePullSecrets": [
{
@ -1171,7 +1172,7 @@
"matchExpressions": [
{
"key": "368",
"operator": "ǧĒzŔ瘍N",
"operator": "",
"values": [
"369"
]

View File

@ -91,7 +91,7 @@ spec:
nodeSelectorTerms:
- matchExpressions:
- key: "368"
operator: ǧĒzŔ瘍N
operator: ""
values:
- "369"
matchFields:
@ -699,6 +699,7 @@ spec:
schedulerName: "408"
securityContext:
fsGroup: 760480547754807445
fsGroupChangePolicy: Ņ#耗Ǚ(
runAsGroup: -801152248124332545
runAsNonRoot: true
runAsUser: -2781126825051715248

View File

@ -1158,7 +1158,8 @@
"name": "370",
"value": "371"
}
]
],
"fsGroupChangePolicy": "Ĕ\\ɢX鰨松/Ȁĵ鴁ĩȲǸ|蕎"
},
"imagePullSecrets": [
{
@ -1175,7 +1176,7 @@
"matchExpressions": [
{
"key": "375",
"operator": "Ã茓pȓɻ",
"operator": "Ǚ(",
"values": [
"376"
]
@ -1184,7 +1185,7 @@
"matchFields": [
{
"key": "377",
"operator": "",
"operator": "瘍Nʊ輔3璾ėȜv1b繐汚",
"values": [
"378"
]
@ -1195,12 +1196,12 @@
},
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": -767058113,
"weight": 702968201,
"preference": {
"matchExpressions": [
{
"key": "379",
"operator": "Ǹ|蕎'佉賞ǧĒz",
"operator": "n覦灲閈誹ʅ蕉",
"values": [
"380"
]
@ -1209,7 +1210,7 @@
"matchFields": [
{
"key": "381",
"operator": "ùfŭƽ",
"operator": "",
"values": [
"382"
]
@ -1224,11 +1225,11 @@
{
"labelSelector": {
"matchLabels": {
"h-up52--sjo7799-skj5--9/R_rm": "CR.s--f.-f.-zv._._.o"
"lm-e46-r-g63--gt1--6mx-r-927--m6-k8-c2---2etfh41ca-z-g/0p_3_J_SA995IKCR.s--f.-f.-zv._._.5-H.T.-.-.d": "b_9_1o.w_aI._31-_I-A-_3bz._8M0U1_-__.71-_-9_._X-D---k..1Q7._l.I"
},
"matchExpressions": [
{
"key": "K_A-_9_Z_C..7o_x3..-.8-Jp-94",
"key": "d----v8-4--558n1asz-r886x.2-cgr6---r58-e-l203-8sln7-x/k2_9.v.--_.--4QQ.-s.H.Hu-k-_-0-T1mel--F......3_t_l",
"operator": "DoesNotExist"
}
]
@ -1241,16 +1242,19 @@
],
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": 801902541,
"weight": 1195176401,
"podAffinityTerm": {
"labelSelector": {
"matchLabels": {
"bx1y-8---3----p-pdn--j2---2--82--cj-1-s--op34-yy28-38xmu5nx4s-4/4b_9_1o.w_I": "x-_.--4QQ.-s.H.Hu-k-_-0-T1mel--F......3_t_-l..-.DG7r-3.----.4"
"Bk.j._g-G-7--p9.-_0R.-_-3_L_2--_v2.5p_..Y-.wg_-b8a_68": "Q4_.84.K_-_0_..u.F.pq..--Q"
},
"matchExpressions": [
{
"key": "3---g-----p8-d5-8-m8i--k0j5g.zrrw8-5ts-7-bp/6E__-.8_e_2",
"operator": "DoesNotExist"
"key": "8b-3-3b17cab-ppy5e--9p-61-2we16h--5-d-k-sm.2xv17r--32b-----4-670tfz-up3n/ov_Z--Zg-_Q",
"operator": "NotIn",
"values": [
"0..KpiS.oK-.O--5-yp8q_s-L"
]
}
]
},
@ -1267,12 +1271,15 @@
{
"labelSelector": {
"matchLabels": {
"7F3p2_-_AmD-.0AP.1": "A--.F5_x.KNC0-.-m_0-m-6Sp_N-S..O-BZ..n"
"H__V.Vz_6.Hz_V_.r_v_._e_-78o_6Z..11_7pX_.-mLlx...w_j": "35.40Rw4gD.._.-x6db-L7.-__-G_2kCpS_1"
},
"matchExpressions": [
{
"key": "QZ9p_6.C.e",
"operator": "DoesNotExist"
"key": "d-XZ-x.__.Y_2-n_5023Xl-3Pw_-r7g",
"operator": "NotIn",
"values": [
"VT3sn-0_.i__a.O2G_J"
]
}
]
},
@ -1284,18 +1291,18 @@
],
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": -1851436166,
"weight": -1508769491,
"podAffinityTerm": {
"labelSelector": {
"matchLabels": {
"6V1-rU.___06.eqk5E_-4-.XH-.k.7.l_-W8o._xJ1-lFA_X3": "V0H2-.zHw.H__V.VT"
"3--rgvf3q-z-5z80n--t5--9-4-d2-22--i--40wv--in-870w--it6k47-7y1.h72n-cnp-75/c10KkQ-R_R.-.--4_IT_O__3.5h_XC0_-3": "20_._.-_L-__bf_9_-C-PfNx__-U_.Pn-W23-_.z_.._s--_F-BR-.h_-2-.F"
},
"matchExpressions": [
{
"key": "0--0g-q-22r4wye52y-h7463lyps4483-o--3f1p7--43nw-l-x8/Hz_V_.r_v_._e_-78o_6Z..11_7pX_.-mLlx...w_t-_.5.40Rw4D",
"operator": "NotIn",
"key": "p_.3--_9QW2JkU27_.-4T-I.-..K.-.0__sD.-e",
"operator": "In",
"values": [
"txb__-ex-_1_-ODgC_1-_V"
""
]
}
]
@ -1313,10 +1320,10 @@
"tolerations": [
{
"key": "416",
"operator": "堺ʣ",
"operator": "抄3昞财Î嘝zʄ!ć",
"value": "417",
"effect": "ŽɣB矗E¸",
"tolerationSeconds": -3532804738923434397
"effect": "緍k¢茤",
"tolerationSeconds": 4096844323391966153
}
],
"hostAliases": [
@ -1328,7 +1335,7 @@
}
],
"priorityClassName": "420",
"priority": -1852730577,
"priority": -1331113536,
"dnsConfig": {
"nameservers": [
"421"
@ -1345,31 +1352,28 @@
},
"readinessGates": [
{
"conditionType": "ź魊塾ɖ$rolȋɶuɋ5r儉ɩ柀ɨ鴅"
"conditionType": "mō6µɑ`ȗ\u003c8^翜"
}
],
"runtimeClassName": "425",
"enableServiceLinks": false,
"preemptionPolicy": "!ń1ċƹ|慼櫁色苆试揯遐",
"preemptionPolicy": "ý筞X",
"overhead": {
"4'ď曕椐敛n湙": "310"
"tHǽ÷閂抰^窄CǙķȈ": "97"
},
"topologySpreadConstraints": [
{
"maxSkew": -150478704,
"maxSkew": 1956797678,
"topologyKey": "426",
"whenUnsatisfiable": ";鹡鑓侅闍ŏŃŋŏ}ŀ",
"whenUnsatisfiable": "ƀ+瑏eCmAȥ睙",
"labelSelector": {
"matchLabels": {
"p2djmscp--ac8u23-k----26u5--72n-5.j8-0020-1-5/t5W_._._-2M2._i": "wvU"
"zp22o4a-w----11rqy3eo79p-f4r1--7p--053--suu--98.y1s8-j-6j4uvf1-sdg--132bid-7x0u738--7w-tdt-u-0--v/Ied-0-i_zZsY_o8t5Vl6_..7CY-_dc__G6N-_-0o.0C_gV.9_G5": "x_.4dwFbuvEf55Y2k.F-4"
},
"matchExpressions": [
{
"key": "4-4D-r.-F__r.oh..2_uGGP..-_N_h_4Hl-X0_2-W",
"operator": "In",
"values": [
"2-.s_6O-5_7_-0w_--5-_.3--_9QWJ"
]
"key": "88-i19.y-y7o-0-wq-zfdw73w0---4a18-f---ui6-48e-9-h4-w-qp25--7-n--kfk3g/1n1.--.._-x_4..u2-__3uM77U7._pz",
"operator": "DoesNotExist"
}
]
}
@ -1378,29 +1382,28 @@
}
},
"updateStrategy": {
"type": "荥ơ'禧ǵŊ)TiD¢ƿ媴h5",
"rollingUpdate": {
"maxUnavailable": 2
}
},
"minReadySeconds": 212061711,
"revisionHistoryLimit": -1092090658
"minReadySeconds": 997447044,
"revisionHistoryLimit": 989524452
},
"status": {
"currentNumberScheduled": -1979737528,
"numberMisscheduled": -1707056814,
"desiredNumberScheduled": -424698834,
"numberReady": 407742062,
"observedGeneration": 5741439505187758584,
"updatedNumberScheduled": 902022378,
"numberAvailable": 1660081568,
"numberUnavailable": 904244563,
"collisionCount": -449319810,
"currentNumberScheduled": 1606858231,
"numberMisscheduled": 1791868025,
"desiredNumberScheduled": -793692762,
"numberReady": -1152625369,
"observedGeneration": 3839991706170762113,
"updatedNumberScheduled": -1292943463,
"numberAvailable": -1734448297,
"numberUnavailable": -1757575936,
"collisionCount": 129237050,
"conditions": [
{
"type": "",
"status": "'ƈoIǢ龞瞯å",
"lastTransitionTime": "2469-07-10T03:20:34Z",
"type": "{ɦ!f親ʚ«Ǥ栌Ə侷ŧĞö",
"status": "",
"lastTransitionTime": "2733-02-09T15:36:31Z",
"reason": "433",
"message": "434"
}

View File

@ -30,8 +30,8 @@ metadata:
selfLink: "5"
uid: "7"
spec:
minReadySeconds: 212061711
revisionHistoryLimit: -1092090658
minReadySeconds: 997447044
revisionHistoryLimit: 989524452
selector:
matchExpressions:
- key: p503---477-49p---o61---4fy--9---7--9-9s-0-u5lj2--10pq-0-7-9-2-0/fP81.-.9Vdx.TB_M-H_5_.t..bG0
@ -78,25 +78,25 @@ spec:
- preference:
matchExpressions:
- key: "379"
operator: Ǹ|蕎'佉賞ǧĒz
operator: n覦灲閈誹ʅ蕉
values:
- "380"
matchFields:
- key: "381"
operator: ùfŭƽ
operator: ""
values:
- "382"
weight: -767058113
weight: 702968201
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: "375"
operator: Ã茓pȓɻ
operator: Ǚ(
values:
- "376"
matchFields:
- key: "377"
operator: ""
operator: 瘍Nʊ輔3璾ėȜv1b繐汚
values:
- "378"
podAffinity:
@ -104,21 +104,23 @@ spec:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: 3---g-----p8-d5-8-m8i--k0j5g.zrrw8-5ts-7-bp/6E__-.8_e_2
operator: DoesNotExist
- key: 8b-3-3b17cab-ppy5e--9p-61-2we16h--5-d-k-sm.2xv17r--32b-----4-670tfz-up3n/ov_Z--Zg-_Q
operator: NotIn
values:
- 0..KpiS.oK-.O--5-yp8q_s-L
matchLabels:
bx1y-8---3----p-pdn--j2---2--82--cj-1-s--op34-yy28-38xmu5nx4s-4/4b_9_1o.w_I: x-_.--4QQ.-s.H.Hu-k-_-0-T1mel--F......3_t_-l..-.DG7r-3.----.4
Bk.j._g-G-7--p9.-_0R.-_-3_L_2--_v2.5p_..Y-.wg_-b8a_68: Q4_.84.K_-_0_..u.F.pq..--Q
namespaces:
- "397"
topologyKey: "398"
weight: 801902541
weight: 1195176401
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: K_A-_9_Z_C..7o_x3..-.8-Jp-94
- key: d----v8-4--558n1asz-r886x.2-cgr6---r58-e-l203-8sln7-x/k2_9.v.--_.--4QQ.-s.H.Hu-k-_-0-T1mel--F......3_t_l
operator: DoesNotExist
matchLabels:
h-up52--sjo7799-skj5--9/R_rm: CR.s--f.-f.-zv._._.o
lm-e46-r-g63--gt1--6mx-r-927--m6-k8-c2---2etfh41ca-z-g/0p_3_J_SA995IKCR.s--f.-f.-zv._._.5-H.T.-.-.d: b_9_1o.w_aI._31-_I-A-_3bz._8M0U1_-__.71-_-9_._X-D---k..1Q7._l.I
namespaces:
- "389"
topologyKey: "390"
@ -127,23 +129,25 @@ spec:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: 0--0g-q-22r4wye52y-h7463lyps4483-o--3f1p7--43nw-l-x8/Hz_V_.r_v_._e_-78o_6Z..11_7pX_.-mLlx...w_t-_.5.40Rw4D
operator: NotIn
- key: p_.3--_9QW2JkU27_.-4T-I.-..K.-.0__sD.-e
operator: In
values:
- txb__-ex-_1_-ODgC_1-_V
- ""
matchLabels:
6V1-rU.___06.eqk5E_-4-.XH-.k.7.l_-W8o._xJ1-lFA_X3: V0H2-.zHw.H__V.VT
3--rgvf3q-z-5z80n--t5--9-4-d2-22--i--40wv--in-870w--it6k47-7y1.h72n-cnp-75/c10KkQ-R_R.-.--4_IT_O__3.5h_XC0_-3: 20_._.-_L-__bf_9_-C-PfNx__-U_.Pn-W23-_.z_.._s--_F-BR-.h_-2-.F
namespaces:
- "413"
topologyKey: "414"
weight: -1851436166
weight: -1508769491
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: QZ9p_6.C.e
operator: DoesNotExist
- key: d-XZ-x.__.Y_2-n_5023Xl-3Pw_-r7g
operator: NotIn
values:
- VT3sn-0_.i__a.O2G_J
matchLabels:
7F3p2_-_AmD-.0AP.1: A--.F5_x.KNC0-.-m_0-m-6Sp_N-S..O-BZ..n
H__V.Vz_6.Hz_V_.r_v_._e_-78o_6Z..11_7pX_.-mLlx...w_j: 35.40Rw4gD.._.-x6db-L7.-__-G_2kCpS_1
namespaces:
- "405"
topologyKey: "406"
@ -690,17 +694,18 @@ spec:
nodeSelector:
"358": "359"
overhead:
4'ď曕椐敛n湙: "310"
preemptionPolicy: '!ń1ċƹ|慼櫁色苆试揯遐'
priority: -1852730577
tHǽ÷閂抰^窄CǙķȈ: "97"
preemptionPolicy: ý筞X
priority: -1331113536
priorityClassName: "420"
readinessGates:
- conditionType: ź魊塾ɖ$rolȋɶuɋ5r儉ɩ柀ɨ鴅
- conditionType: mō6µɑ`ȗ<8^翜
restartPolicy: ɭɪǹ0衷,
runtimeClassName: "425"
schedulerName: "415"
securityContext:
fsGroup: 2585323675983182372
fsGroupChangePolicy: Ĕ\ɢX鰨松/Ȁĵ鴁ĩȲǸ|蕎
runAsGroup: 6386250802140824739
runAsNonRoot: false
runAsUser: -5315960194881172085
@ -724,23 +729,22 @@ spec:
subdomain: "374"
terminationGracePeriodSeconds: -3039830979334099524
tolerations:
- effect: ŽɣB矗E¸
- effect: 緍k¢茤
key: "416"
operator: 堺ʣ
tolerationSeconds: -3532804738923434397
operator: 抄3昞财Î嘝zʄ!ć
tolerationSeconds: 4096844323391966153
value: "417"
topologySpreadConstraints:
- labelSelector:
matchExpressions:
- key: 4-4D-r.-F__r.oh..2_uGGP..-_N_h_4Hl-X0_2-W
operator: In
values:
- 2-.s_6O-5_7_-0w_--5-_.3--_9QWJ
- key: 88-i19.y-y7o-0-wq-zfdw73w0---4a18-f---ui6-48e-9-h4-w-qp25--7-n--kfk3g/1n1.--.._-x_4..u2-__3uM77U7._pz
operator: DoesNotExist
matchLabels:
p2djmscp--ac8u23-k----26u5--72n-5.j8-0020-1-5/t5W_._._-2M2._i: wvU
maxSkew: -150478704
? zp22o4a-w----11rqy3eo79p-f4r1--7p--053--suu--98.y1s8-j-6j4uvf1-sdg--132bid-7x0u738--7w-tdt-u-0--v/Ied-0-i_zZsY_o8t5Vl6_..7CY-_dc__G6N-_-0o.0C_gV.9_G5
: x_.4dwFbuvEf55Y2k.F-4
maxSkew: 1956797678
topologyKey: "426"
whenUnsatisfiable: ;鹡鑓侅闍ŏŃŋŏ}ŀ
whenUnsatisfiable: ƀ+瑏eCmAȥ睙
volumes:
- awsElasticBlockStore:
fsType: "47"
@ -943,20 +947,19 @@ spec:
updateStrategy:
rollingUpdate:
maxUnavailable: 2
type: 荥ơ'禧ǵŊ)TiD¢ƿ媴h5
status:
collisionCount: -449319810
collisionCount: 129237050
conditions:
- lastTransitionTime: "2469-07-10T03:20:34Z"
- lastTransitionTime: "2733-02-09T15:36:31Z"
message: "434"
reason: "433"
status: '''ƈoIǢ龞瞯å'
type: ""
currentNumberScheduled: -1979737528
desiredNumberScheduled: -424698834
numberAvailable: 1660081568
numberMisscheduled: -1707056814
numberReady: 407742062
numberUnavailable: 904244563
observedGeneration: 5741439505187758584
updatedNumberScheduled: 902022378
status:
type: '{ɦ!f親ʚ«Ǥ栌Ə侷ŧĞö'
currentNumberScheduled: 1606858231
desiredNumberScheduled: -793692762
numberAvailable: -1734448297
numberMisscheduled: 1791868025
numberReady: -1152625369
numberUnavailable: -1757575936
observedGeneration: 3839991706170762113
updatedNumberScheduled: -1292943463

View File

@ -1154,7 +1154,8 @@
"name": "363",
"value": "364"
}
]
],
"fsGroupChangePolicy": "Ņ#耗Ǚ("
},
"imagePullSecrets": [
{
@ -1171,7 +1172,7 @@
"matchExpressions": [
{
"key": "368",
"operator": "ǧĒzŔ瘍N",
"operator": "",
"values": [
"369"
]

View File

@ -96,7 +96,7 @@ spec:
nodeSelectorTerms:
- matchExpressions:
- key: "368"
operator: ǧĒzŔ瘍N
operator: ""
values:
- "369"
matchFields:
@ -704,6 +704,7 @@ spec:
schedulerName: "408"
securityContext:
fsGroup: 760480547754807445
fsGroupChangePolicy: Ņ#耗Ǚ(
runAsGroup: -801152248124332545
runAsNonRoot: true
runAsUser: -2781126825051715248

View File

@ -1155,7 +1155,8 @@
"name": "371",
"value": "372"
}
]
],
"fsGroupChangePolicy": "蹔ŧ"
},
"imagePullSecrets": [
{
@ -1172,7 +1173,7 @@
"matchExpressions": [
{
"key": "376",
"operator": "6x$1sȣ±p鋄5弢ȹ均i绝5哇芆",
"operator": "1sȣ±p鋄5",
"values": [
"377"
]
@ -1181,7 +1182,7 @@
"matchFields": [
{
"key": "378",
"operator": "埮pɵ{WOŭW灬p",
"operator": "幩šeSvEȤƏ埮pɵ",
"values": [
"379"
]
@ -1192,12 +1193,12 @@
},
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": 199049889,
"weight": -1449289597,
"preference": {
"matchExpressions": [
{
"key": "380",
"operator": "擭銆jʒǚ鍰\\縑",
"operator": "",
"values": [
"381"
]
@ -1206,7 +1207,7 @@
"matchFields": [
{
"key": "382",
"operator": "鞤ɱďW賁Ěɭɪǹ0衷,Ʒƣ",
"operator": "ş",
"values": [
"383"
]
@ -1221,14 +1222,14 @@
{
"labelSelector": {
"matchLabels": {
"4--883d-v3j4-7y-p---up52--sjo7799-skj5---r-t.sumf7ew/u-5mj_9.M.134-5-.q6H_.--_---.M.U_-m.-P.yPS": "1Tvw39F_C-rtSY.g._2F7.-_e..r"
"3---93-2-23/8--21kF-c026.i": "9.M.134-5-.q6H_.--t"
},
"matchExpressions": [
{
"key": "6-x_rC9..__-6_k.N-2B_V.-tfh4.caTz_.g.w-o.8_WT-M.3_1",
"key": "7U_-m.-P.yP9S--858LI__.8U",
"operator": "NotIn",
"values": [
"z"
"7-_pP__up.2L_s-o779._-k-5___-Qq..csh-3--Z1Tvw39F_C-rtSY.g._2F7m"
]
}
]
@ -1241,16 +1242,19 @@
],
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": -217760519,
"weight": -280562323,
"podAffinityTerm": {
"labelSelector": {
"matchLabels": {
"4-yy28-38xmu5nx4s--41-7--6m/271-_-9_._X-D---k6": "Q.-s.H.Hu-k-_-0-T1mel--F......3_t_-l..-.DG7r-3.----._4__XOnP"
"gt._U.-x_rC9..__-6_k.N-2B_V.-tfh4.caTz5": "2w-o.8_WT-M.3_-1y_8DX"
},
"matchExpressions": [
{
"key": "3---g-----p8-d5-8-m8i--k0j5g.zrrw8-5ts-7-bp/6E__-.8_e_2",
"operator": "DoesNotExist"
"key": "z-ufkr-x0u-1meljf-5269893-t-kl35d6--7rs37zzgy3-4----nf---2/D8.TS-jJ.Ys_Mop34_-y.8_38xm-.nx.sEK4.B.__65m8_11",
"operator": "NotIn",
"values": [
"c-r.E__-.8_e_l2.._8s--7_3x_-J_....7"
]
}
]
},
@ -1267,11 +1271,11 @@
{
"labelSelector": {
"matchLabels": {
"7F3p2_-_AmD-.0AP.1": "A--.F5_x.KNC0-.-m_0-m-6Sp_N-S..O-BZ..n"
"mi-4xs-0-5k-67-3p2-t--m-l80--5o1--cp6-5-x4/n-p9.-_0R.-_-W": "7F.pq..--3QC1--L--v_Z--Zg-_4Q__-v_tu"
},
"matchExpressions": [
{
"key": "QZ9p_6.C.e",
"key": "r-7---064eqk5--f4e4--r1k278l-d-8o1-x-1wl----f31-0-9/X1rh-K5y_AzOBW.9oE9_6.--v17r__.b",
"operator": "DoesNotExist"
}
]
@ -1284,18 +1288,18 @@
],
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": -1851436166,
"weight": -1934575848,
"podAffinityTerm": {
"labelSelector": {
"matchLabels": {
"6V1-rU.___06.eqk5E_-4-.XH-.k.7.l_-W8o._xJ1-lFA_X3": "V0H2-.zHw.H__V.VT"
"72q--m--2k-p---139g-2wt-g-ve55m-27/k5v3aUK_--_o_2.--4Z7__i1T.miw_7a_...8-_0__5HG2_5XOAX.gUV": "nw_-_x18mtxb__-ex-_1_-ODgC_1-_8__T3sn-0_.i__a.O2G_-_K-.03.mp.1"
},
"matchExpressions": [
{
"key": "0--0g-q-22r4wye52y-h7463lyps4483-o--3f1p7--43nw-l-x8/Hz_V_.r_v_._e_-78o_6Z..11_7pX_.-mLlx...w_t-_.5.40Rw4D",
"key": "7--4_IT_O__3.5h_XC0_-7.-hj-O_8-b6E_--Y_Dp8O_._e_3_.4_E",
"operator": "NotIn",
"values": [
"txb__-ex-_1_-ODgC_1-_V"
"ZI-_P..w-W_-nE...-V"
]
}
]
@ -1313,10 +1317,10 @@
"tolerations": [
{
"key": "417",
"operator": "堺ʣ",
"operator": "ƴ磳藷曥摮Z Ǐg鲅",
"value": "418",
"effect": "ŽɣB矗E¸",
"tolerationSeconds": -3532804738923434397
"effect": "癯頯aɴí(Ȟ9\"忕(",
"tolerationSeconds": 3807599400818393626
}
],
"hostAliases": [
@ -1328,7 +1332,7 @@
}
],
"priorityClassName": "421",
"priority": -1852730577,
"priority": 1352980996,
"dnsConfig": {
"nameservers": [
"422"
@ -1345,30 +1349,30 @@
},
"readinessGates": [
{
"conditionType": "ź魊塾ɖ$rolȋɶuɋ5r儉ɩ柀ɨ鴅"
"conditionType": "Ɏ嵄箲Ů埞瞔ɏÊ锒e躜ƕ"
}
],
"runtimeClassName": "426",
"enableServiceLinks": false,
"preemptionPolicy": "!ń1ċƹ|慼櫁色苆试揯遐",
"preemptionPolicy": "鲛ô衞Ɵ鳝稃Ȍ液文?謮",
"overhead": {
"4'ď曕椐敛n湙": "310"
"Î磣:mʂ渢pɉ驻(+昒ȼȈɍ颬灲": "185"
},
"topologySpreadConstraints": [
{
"maxSkew": -150478704,
"maxSkew": 547935694,
"topologyKey": "427",
"whenUnsatisfiable": ";鹡鑓侅闍ŏŃŋŏ}ŀ",
"whenUnsatisfiable": "Ƨ钖孝0蛮xAǫ\u0026tŧK剛Ʀ",
"labelSelector": {
"matchLabels": {
"p2djmscp--ac8u23-k----26u5--72n-5.j8-0020-1-5/t5W_._._-2M2._i": "wvU"
"za42o/Y-YD-Q9_-__..YNFu7Pg-.1": "tE"
},
"matchExpressions": [
{
"key": "4-4D-r.-F__r.oh..2_uGGP..-_N_h_4Hl-X0_2-W",
"key": "9-t-4m7a-41-6j4m--4-r4p--w1k8-u.4-2-08vc-u/B_-X__Hs",
"operator": "In",
"values": [
"2-.s_6O-5_7_-0w_--5-_.3--_9QWJ"
"7h--m._fN._k8__._ep2P.B._A_090ERG2nV.__p_Y-.2I"
]
}
]
@ -1379,16 +1383,16 @@
}
},
"status": {
"replicas": -330302940,
"fullyLabeledReplicas": 138911331,
"readyReplicas": 1613009760,
"availableReplicas": -1469601144,
"observedGeneration": 6703635170896137755,
"replicas": -1165029050,
"fullyLabeledReplicas": 1893057016,
"readyReplicas": -2099726885,
"availableReplicas": -928976522,
"observedGeneration": 702392770146794584,
"conditions": [
{
"type": "ɡj瓇ɽ丿YƄZZ塖bʘ",
"status": "ɻ猶N嫡牿咸Ǻ潑鶋洅啶'ƈoIǢ龞瞯å",
"lastTransitionTime": "2469-07-10T03:20:34Z",
"type": "×軓鼐嵱宯ÙQ阉(闒ƈƳ",
"status": "ű孖站畦f黹ʩ鹸ɷ",
"lastTransitionTime": "2233-10-15T01:58:37Z",
"reason": "434",
"message": "435"
}

View File

@ -78,25 +78,25 @@ spec:
- preference:
matchExpressions:
- key: "380"
operator: 擭銆jʒǚ鍰\縑
operator: ""
values:
- "381"
matchFields:
- key: "382"
operator: 鞤ɱďW賁Ěɭɪǹ0衷,Ʒƣ
operator: ş
values:
- "383"
weight: 199049889
weight: -1449289597
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: "376"
operator: 6x$1sȣ±p鋄5弢ȹ均i绝5哇芆
operator: 1sȣ±p鋄5
values:
- "377"
matchFields:
- key: "378"
operator: 埮pɵ{WOŭW灬p
operator: 幩šeSvEȤƏ埮pɵ
values:
- "379"
podAffinity:
@ -104,23 +104,25 @@ spec:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: 3---g-----p8-d5-8-m8i--k0j5g.zrrw8-5ts-7-bp/6E__-.8_e_2
operator: DoesNotExist
- key: z-ufkr-x0u-1meljf-5269893-t-kl35d6--7rs37zzgy3-4----nf---2/D8.TS-jJ.Ys_Mop34_-y.8_38xm-.nx.sEK4.B.__65m8_11
operator: NotIn
values:
- c-r.E__-.8_e_l2.._8s--7_3x_-J_....7
matchLabels:
4-yy28-38xmu5nx4s--41-7--6m/271-_-9_._X-D---k6: Q.-s.H.Hu-k-_-0-T1mel--F......3_t_-l..-.DG7r-3.----._4__XOnP
gt._U.-x_rC9..__-6_k.N-2B_V.-tfh4.caTz5: 2w-o.8_WT-M.3_-1y_8DX
namespaces:
- "398"
topologyKey: "399"
weight: -217760519
weight: -280562323
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: 6-x_rC9..__-6_k.N-2B_V.-tfh4.caTz_.g.w-o.8_WT-M.3_1
- key: 7U_-m.-P.yP9S--858LI__.8U
operator: NotIn
values:
- z
- 7-_pP__up.2L_s-o779._-k-5___-Qq..csh-3--Z1Tvw39F_C-rtSY.g._2F7m
matchLabels:
4--883d-v3j4-7y-p---up52--sjo7799-skj5---r-t.sumf7ew/u-5mj_9.M.134-5-.q6H_.--_---.M.U_-m.-P.yPS: 1Tvw39F_C-rtSY.g._2F7.-_e..r
3---93-2-23/8--21kF-c026.i: 9.M.134-5-.q6H_.--t
namespaces:
- "390"
topologyKey: "391"
@ -129,23 +131,23 @@ spec:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: 0--0g-q-22r4wye52y-h7463lyps4483-o--3f1p7--43nw-l-x8/Hz_V_.r_v_._e_-78o_6Z..11_7pX_.-mLlx...w_t-_.5.40Rw4D
- key: 7--4_IT_O__3.5h_XC0_-7.-hj-O_8-b6E_--Y_Dp8O_._e_3_.4_E
operator: NotIn
values:
- txb__-ex-_1_-ODgC_1-_V
- ZI-_P..w-W_-nE...-V
matchLabels:
6V1-rU.___06.eqk5E_-4-.XH-.k.7.l_-W8o._xJ1-lFA_X3: V0H2-.zHw.H__V.VT
72q--m--2k-p---139g-2wt-g-ve55m-27/k5v3aUK_--_o_2.--4Z7__i1T.miw_7a_...8-_0__5HG2_5XOAX.gUV: nw_-_x18mtxb__-ex-_1_-ODgC_1-_8__T3sn-0_.i__a.O2G_-_K-.03.mp.1
namespaces:
- "414"
topologyKey: "415"
weight: -1851436166
weight: -1934575848
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: QZ9p_6.C.e
- key: r-7---064eqk5--f4e4--r1k278l-d-8o1-x-1wl----f31-0-9/X1rh-K5y_AzOBW.9oE9_6.--v17r__.b
operator: DoesNotExist
matchLabels:
7F3p2_-_AmD-.0AP.1: A--.F5_x.KNC0-.-m_0-m-6Sp_N-S..O-BZ..n
mi-4xs-0-5k-67-3p2-t--m-l80--5o1--cp6-5-x4/n-p9.-_0R.-_-W: 7F.pq..--3QC1--L--v_Z--Zg-_4Q__-v_tu
namespaces:
- "406"
topologyKey: "407"
@ -688,17 +690,18 @@ spec:
nodeSelector:
"359": "360"
overhead:
4'ď曕椐敛n湙: "310"
preemptionPolicy: '!ń1ċƹ|慼櫁色苆试揯遐'
priority: -1852730577
Î磣:mʂ渢pɉ驻(+昒ȼȈɍ颬灲: "185"
preemptionPolicy: 鲛ô衞Ɵ鳝稃Ȍ液文?謮
priority: 1352980996
priorityClassName: "421"
readinessGates:
- conditionType: ź魊塾ɖ$rolȋɶuɋ5r儉ɩ柀ɨ鴅
- conditionType: Ɏ嵄箲Ů埞瞔ɏÊ锒e躜ƕ
restartPolicy: ɘɢ鬍熖B芭花ª瘡
runtimeClassName: "426"
schedulerName: "416"
securityContext:
fsGroup: 7124276984274024394
fsGroupChangePolicy: 蹔ŧ
runAsGroup: -779972051078659613
runAsNonRoot: false
runAsUser: 2179199799235189619
@ -722,23 +725,23 @@ spec:
subdomain: "375"
terminationGracePeriodSeconds: 2666412258966278206
tolerations:
- effect: ŽɣB矗E¸
- effect: 癯頯aɴí(Ȟ9"忕(
key: "417"
operator: 堺ʣ
tolerationSeconds: -3532804738923434397
operator: ƴ磳藷曥摮Z Ǐg鲅
tolerationSeconds: 3807599400818393626
value: "418"
topologySpreadConstraints:
- labelSelector:
matchExpressions:
- key: 4-4D-r.-F__r.oh..2_uGGP..-_N_h_4Hl-X0_2-W
- key: 9-t-4m7a-41-6j4m--4-r4p--w1k8-u.4-2-08vc-u/B_-X__Hs
operator: In
values:
- 2-.s_6O-5_7_-0w_--5-_.3--_9QWJ
- 7h--m._fN._k8__._ep2P.B._A_090ERG2nV.__p_Y-.2I
matchLabels:
p2djmscp--ac8u23-k----26u5--72n-5.j8-0020-1-5/t5W_._._-2M2._i: wvU
maxSkew: -150478704
za42o/Y-YD-Q9_-__..YNFu7Pg-.1: tE
maxSkew: 547935694
topologyKey: "427"
whenUnsatisfiable: ;鹡鑓侅闍ŏŃŋŏ}ŀ
whenUnsatisfiable: Ƨ钖孝0蛮xAǫ&tŧK剛Ʀ
volumes:
- awsElasticBlockStore:
fsType: "47"
@ -938,14 +941,14 @@ spec:
storagePolicyName: "103"
volumePath: "101"
status:
availableReplicas: -1469601144
availableReplicas: -928976522
conditions:
- lastTransitionTime: "2469-07-10T03:20:34Z"
- lastTransitionTime: "2233-10-15T01:58:37Z"
message: "435"
reason: "434"
status: ɻ猶N嫡牿咸Ǻ潑鶋洅啶'ƈoIǢ龞瞯å
type: ɡj瓇ɽ丿YƄZZ塖bʘ
fullyLabeledReplicas: 138911331
observedGeneration: 6703635170896137755
readyReplicas: 1613009760
replicas: -330302940
status: ű孖站畦f黹ʩ鹸ɷ
type: ×軓鼐嵱宯ÙQ阉(闒ƈƳ
fullyLabeledReplicas: 1893057016
observedGeneration: 702392770146794584
readyReplicas: -2099726885
replicas: -1165029050

View File

@ -1154,7 +1154,8 @@
"name": "363",
"value": "364"
}
]
],
"fsGroupChangePolicy": "Ņ#耗Ǚ("
},
"imagePullSecrets": [
{
@ -1171,7 +1172,7 @@
"matchExpressions": [
{
"key": "368",
"operator": "ǧĒzŔ瘍N",
"operator": "",
"values": [
"369"
]

View File

@ -91,7 +91,7 @@ spec:
nodeSelectorTerms:
- matchExpressions:
- key: "368"
operator: ǧĒzŔ瘍N
operator: ""
values:
- "369"
matchFields:
@ -699,6 +699,7 @@ spec:
schedulerName: "408"
securityContext:
fsGroup: 760480547754807445
fsGroupChangePolicy: Ņ#耗Ǚ(
runAsGroup: -801152248124332545
runAsNonRoot: true
runAsUser: -2781126825051715248

View File

@ -1159,7 +1159,8 @@
"name": "367",
"value": "368"
}
]
],
"fsGroupChangePolicy": "展}硐庰%皧V垾现葢ŵ橨鬶l獕;跣"
},
"imagePullSecrets": [
{
@ -1176,7 +1177,7 @@
"matchExpressions": [
{
"key": "372",
"operator": "皥贸碔lNKƙ順\\E¦队",
"operator": "揻-$ɽ丟×x",
"values": [
"373"
]
@ -1185,7 +1186,7 @@
"matchFields": [
{
"key": "374",
"operator": "跣Hǝcw媀瓄\u0026翜舞拉Œɥ颶",
"operator": "妧Ö闊",
"values": [
"375"
]
@ -1196,12 +1197,12 @@
},
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": 1907998540,
"weight": -1666319281,
"preference": {
"matchExpressions": [
{
"key": "376",
"operator": " 鰔澝qV訆ƎżŧL²",
"operator": "",
"values": [
"377"
]
@ -1210,7 +1211,7 @@
"matchFields": [
{
"key": "378",
"operator": "Ä蚃ɣľ)酊龨δ摖ȱğ_\u003c",
"operator": "蘇KŅ/»頸+SÄ蚃",
"values": [
"379"
]
@ -1225,12 +1226,15 @@
{
"labelSelector": {
"matchLabels": {
"n5v-5925a-x12a-214-3s--gg93--p.2ql/B-.--g": "Y1"
"2-_.uB-.--.gb_2_-8-----yJY.__-X_.8xN._-_-vv-Q2qz.W..4....-0": "5GgT7_7B_D-..-.k4u-zA_--_.-.6GA26C-s.Nj-d-4_4--.-_Z3"
},
"matchExpressions": [
{
"key": "ao26--26-hs5-jedse.7vc0260ni-l11q5--uk5mj-94-8134i5kq/4_.-_-_-...1py_8-3..s._.x2",
"operator": "Exists"
"key": "y-9-te858----38----r-0.h-up52--sjo7799-skj5--9/H.I3.__-.0-z_z0sn_.hx_-a__0-8-.M-.7",
"operator": "In",
"values": [
"q..csh-3--Z1Tvw39F_C-rtSY.gR"
]
}
]
},
@ -1242,15 +1246,15 @@
],
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": -1058923098,
"weight": -478839383,
"podAffinityTerm": {
"labelSelector": {
"matchLabels": {
"3-----995----5sumf7ef8jzv4-9-30.rt--6g1-2-73m-e46-r-g63--gt1--6mx-r-927--m6-g/J0-8-.M-.-.-8v-J1zET_..3dCv3j._.-_pP__up.2L_s-7": "m.__G-8...__.Q_c8.G.b_9_1o.w_aI._1"
"e..Or_-.3OHgt._U.-x_rC9..__-6_k.N-2B_V.-tfh4.caTz_.g.w-o.8_Wf": "53_-1y_8D_XX"
},
"matchExpressions": [
{
"key": "3--j2---2--82--cj-1-s--op34-yw/A-_3bz._M",
"key": "O._D8.TS-jJ.Ys_Mop34_-y.8_38xm-.nx.sEK4.B.__65m8_1-1.99",
"operator": "Exists"
}
]
@ -1268,12 +1272,12 @@
{
"labelSelector": {
"matchLabels": {
"sEK4.B.__65m8_x": "29_.-.Ms7_t.P_3..H..k9M86.9a_-0R1"
"0--1----v8-4--558n1asz-r886-1--s/t": "r.E__-.8_e_l2.._8s--7_3x_-J_.....7..--w0_1V4.-r-8S5--_7_-Zp5"
},
"matchExpressions": [
{
"key": "v8_.O_..8n.--z_-..6W.K",
"operator": "Exists"
"key": "67F3p2_-_AmD-.0P",
"operator": "DoesNotExist"
}
]
},
@ -1285,19 +1289,16 @@
],
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": -168773629,
"weight": -1560706624,
"podAffinityTerm": {
"labelSelector": {
"matchLabels": {
"x-3/6-.7D.3_KPgL": "d._.Um.-__k.5"
"x.KNC0-.-m_0-m-6Sp_N-S..O-BZ..6-5": "bB3_.b17ca-p"
},
"matchExpressions": [
{
"key": "1-_-3_L_2--_v2.5p_..Y-.wg_-b8a_6_.0Q4_.84.K_-_0_..u.F.pq..--3C",
"operator": "In",
"values": [
"p_N-S..O-BZ..6-1.S-B3_.b17ca-_p-y.eQZ9p_6.Cw"
]
"key": "1rhm-5y--z-0/5eQ9",
"operator": "DoesNotExist"
}
]
},
@ -1314,10 +1315,9 @@
"tolerations": [
{
"key": "413",
"operator": "栣险¹贮獘薟8Mĕ霉",
"value": "414",
"effect": "ŪǗȦɆ悼j蛑q",
"tolerationSeconds": 4375148957048018073
"effect": "ɂ挃Ū",
"tolerationSeconds": 4056431723868092838
}
],
"hostAliases": [
@ -1329,7 +1329,7 @@
}
],
"priorityClassName": "417",
"priority": -1286809305,
"priority": -1965712376,
"dnsConfig": {
"nameservers": [
"418"
@ -1346,30 +1346,30 @@
},
"readinessGates": [
{
"conditionType": "ųŎ群E牬庘颮6(|ǖû"
"conditionType": "沷¾!蘋`翾"
}
],
"runtimeClassName": "422",
"enableServiceLinks": false,
"preemptionPolicy": "怨彬ɈNƋl塠傫ü",
"enableServiceLinks": true,
"preemptionPolicy": "Ŏ群E牬",
"overhead": {
"ɮ6)": "299"
"颮6(|ǖûǭg怨彬ɈNƋl塠": "609"
},
"topologySpreadConstraints": [
{
"maxSkew": -554557703,
"maxSkew": 163034368,
"topologyKey": "423",
"whenUnsatisfiable": "¹t骳ɰɰUʜʔŜ0¢",
"whenUnsatisfiable": "ĄÇ稕Eɒ杞¹t骳ɰɰUʜʔŜ0¢啥Ƶ",
"labelSelector": {
"matchLabels": {
"o--5r-v-5-e-m78o-6-s.4-7--i1-8miw-7a-2408m-0--5--2-5----00/l_.23--_l": "b-L7.-__-G_2kCpS__.3g"
"7p--3zm-lx300w-tj-5.a-50/Z659GE.l_.23--_6l.-5_BZk5v3aUK_--_o_2.-4": "gD.._.-x6db-L7.-_m"
},
"matchExpressions": [
{
"key": "nw0-3i--a7-2--o--u0038mp9c10-k-r---3g7nz4-------385h---0-u73pj.brgvf3q-z-5z80n--t5--9-4-d2-22--i--40wv--in-870w--itk/5.m_2_--XZ-x.__.Y_2-n_5023Xl-3Pw_-r75--_A",
"operator": "In",
"key": "Y.39g_.--_-_ve5.m_U",
"operator": "NotIn",
"values": [
"7M7y-Dy__3wc.q.8_00.0_._.-_L-__bf_9_-C-Pfx"
"nw_-_x18mtxb__-ex-_1_-ODgC_1-_8__T3sn-0_.i__a.O2G_-_K-.03.mp.1"
]
}
]
@ -1378,21 +1378,21 @@
]
}
},
"ttlSecondsAfterFinished": -1574276574
"ttlSecondsAfterFinished": -596285123
},
"status": {
"conditions": [
{
"type": "ļė[BN柌ë娒汙查o*Ĵ麻齔試",
"status": "",
"lastProbeTime": "2756-02-27T11:08:58Z",
"lastTransitionTime": "2296-12-01T04:10:44Z",
"type": "續-ÚŜĂwǐ擨^幸$Ż料",
"status": "色苆试揯遐e",
"lastProbeTime": "2947-08-17T19:40:02Z",
"lastTransitionTime": "2374-06-16T11:34:18Z",
"reason": "430",
"message": "431"
}
],
"active": -125022959,
"succeeded": 186118994,
"failed": 115522160
"active": 1921346963,
"succeeded": 135144999,
"failed": 1357487443
}
}

View File

@ -81,25 +81,25 @@ spec:
- preference:
matchExpressions:
- key: "376"
operator: ' 鰔澝qV訆ƎżŧL²'
operator: ""
values:
- "377"
matchFields:
- key: "378"
operator: Ä蚃ɣľ)酊龨δ摖ȱğ_<
operator: 蘇KŅ/»頸+SÄ蚃
values:
- "379"
weight: 1907998540
weight: -1666319281
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: "372"
operator: 皥贸碔lNKƙ順\E¦队
operator: 揻-$ɽ丟×x
values:
- "373"
matchFields:
- key: "374"
operator: 跣Hǝcw媀瓄&翜舞拉Œɥ
operator: 妧Ö闊
values:
- "375"
podAffinity:
@ -107,21 +107,23 @@ spec:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: 3--j2---2--82--cj-1-s--op34-yw/A-_3bz._M
- key: O._D8.TS-jJ.Ys_Mop34_-y.8_38xm-.nx.sEK4.B.__65m8_1-1.99
operator: Exists
matchLabels:
3-----995----5sumf7ef8jzv4-9-30.rt--6g1-2-73m-e46-r-g63--gt1--6mx-r-927--m6-g/J0-8-.M-.-.-8v-J1zET_..3dCv3j._.-_pP__up.2L_s-7: m.__G-8...__.Q_c8.G.b_9_1o.w_aI._1
e..Or_-.3OHgt._U.-x_rC9..__-6_k.N-2B_V.-tfh4.caTz_.g.w-o.8_Wf: 53_-1y_8D_XX
namespaces:
- "394"
topologyKey: "395"
weight: -1058923098
weight: -478839383
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: ao26--26-hs5-jedse.7vc0260ni-l11q5--uk5mj-94-8134i5kq/4_.-_-_-...1py_8-3..s._.x2
operator: Exists
- key: y-9-te858----38----r-0.h-up52--sjo7799-skj5--9/H.I3.__-.0-z_z0sn_.hx_-a__0-8-.M-.7
operator: In
values:
- q..csh-3--Z1Tvw39F_C-rtSY.gR
matchLabels:
n5v-5925a-x12a-214-3s--gg93--p.2ql/B-.--g: Y1
2-_.uB-.--.gb_2_-8-----yJY.__-X_.8xN._-_-vv-Q2qz.W..4....-0: 5GgT7_7B_D-..-.k4u-zA_--_.-.6GA26C-s.Nj-d-4_4--.-_Z3
namespaces:
- "386"
topologyKey: "387"
@ -130,23 +132,21 @@ spec:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: 1-_-3_L_2--_v2.5p_..Y-.wg_-b8a_6_.0Q4_.84.K_-_0_..u.F.pq..--3C
operator: In
values:
- p_N-S..O-BZ..6-1.S-B3_.b17ca-_p-y.eQZ9p_6.Cw
- key: 1rhm-5y--z-0/5eQ9
operator: DoesNotExist
matchLabels:
x-3/6-.7D.3_KPgL: d._.Um.-__k.5
x.KNC0-.-m_0-m-6Sp_N-S..O-BZ..6-5: bB3_.b17ca-p
namespaces:
- "410"
topologyKey: "411"
weight: -168773629
weight: -1560706624
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: v8_.O_..8n.--z_-..6W.K
operator: Exists
- key: 67F3p2_-_AmD-.0P
operator: DoesNotExist
matchLabels:
sEK4.B.__65m8_x: 29_.-.Ms7_t.P_3..H..k9M86.9a_-0R1
0--1----v8-4--558n1asz-r886-1--s/t: r.E__-.8_e_l2.._8s--7_3x_-J_.....7..--w0_1V4.-r-8S5--_7_-Zp5
namespaces:
- "402"
topologyKey: "403"
@ -333,7 +333,7 @@ spec:
searches:
- "419"
dnsPolicy: 遰=E
enableServiceLinks: false
enableServiceLinks: true
ephemeralContainers:
- args:
- "289"
@ -691,17 +691,18 @@ spec:
nodeSelector:
"355": "356"
overhead:
ɮ6): "299"
preemptionPolicy: 怨彬ɈNƋl塠傫ü
priority: -1286809305
颮6(|ǖûǭg怨彬ɈNƋl塠: "609"
preemptionPolicy: Ŏ群E牬
priority: -1965712376
priorityClassName: "417"
readinessGates:
- conditionType: ųŎ群E牬庘颮6(|ǖû
- conditionType: 沷¾!蘋`翾
restartPolicy: 媁荭gw忊
runtimeClassName: "422"
schedulerName: "412"
securityContext:
fsGroup: -1212012606981050727
fsGroupChangePolicy: 展}硐庰%皧V垾现葢ŵ橨鬶l獕;跣
runAsGroup: 2695823502041400376
runAsNonRoot: false
runAsUser: 2651364835047718925
@ -725,23 +726,22 @@ spec:
subdomain: "371"
terminationGracePeriodSeconds: -4333562938396485230
tolerations:
- effect: ŪǗȦɆ悼j蛑q
- effect: ɂ挃Ū
key: "413"
operator: 栣险¹贮獘薟8Mĕ霉
tolerationSeconds: 4375148957048018073
tolerationSeconds: 4056431723868092838
value: "414"
topologySpreadConstraints:
- labelSelector:
matchExpressions:
- key: nw0-3i--a7-2--o--u0038mp9c10-k-r---3g7nz4-------385h---0-u73pj.brgvf3q-z-5z80n--t5--9-4-d2-22--i--40wv--in-870w--itk/5.m_2_--XZ-x.__.Y_2-n_5023Xl-3Pw_-r75--_A
operator: In
- key: Y.39g_.--_-_ve5.m_U
operator: NotIn
values:
- 7M7y-Dy__3wc.q.8_00.0_._.-_L-__bf_9_-C-Pfx
- nw_-_x18mtxb__-ex-_1_-ODgC_1-_8__T3sn-0_.i__a.O2G_-_K-.03.mp.1
matchLabels:
o--5r-v-5-e-m78o-6-s.4-7--i1-8miw-7a-2408m-0--5--2-5----00/l_.23--_l: b-L7.-__-G_2kCpS__.3g
maxSkew: -554557703
7p--3zm-lx300w-tj-5.a-50/Z659GE.l_.23--_6l.-5_BZk5v3aUK_--_o_2.-4: gD.._.-x6db-L7.-_m
maxSkew: 163034368
topologyKey: "423"
whenUnsatisfiable: ¹t骳ɰɰUʜʔŜ0¢
whenUnsatisfiable: ĄÇ稕Eɒ杞¹t骳ɰɰUʜʔŜ0¢啥Ƶ
volumes:
- awsElasticBlockStore:
fsType: "47"
@ -939,15 +939,15 @@ spec:
storagePolicyID: "104"
storagePolicyName: "103"
volumePath: "101"
ttlSecondsAfterFinished: -1574276574
ttlSecondsAfterFinished: -596285123
status:
active: -125022959
active: 1921346963
conditions:
- lastProbeTime: "2756-02-27T11:08:58Z"
lastTransitionTime: "2296-12-01T04:10:44Z"
- lastProbeTime: "2947-08-17T19:40:02Z"
lastTransitionTime: "2374-06-16T11:34:18Z"
message: "431"
reason: "430"
status:
type: ļė[BN柌ë娒汙查o*Ĵ麻齔試
failed: 115522160
succeeded: 186118994
status: 色苆试揯遐e
type: 續-ÚŜĂwǐ擨^幸$Ż料
failed: 1357487443
succeeded: 135144999

View File

@ -1202,7 +1202,8 @@
"name": "384",
"value": "385"
}
]
],
"fsGroupChangePolicy": "蹔ŧ"
},
"imagePullSecrets": [
{
@ -1219,7 +1220,7 @@
"matchExpressions": [
{
"key": "389",
"operator": "6x$1sȣ±p鋄5弢ȹ均i绝5哇芆",
"operator": "1sȣ±p鋄5",
"values": [
"390"
]
@ -1228,7 +1229,7 @@
"matchFields": [
{
"key": "391",
"operator": "埮pɵ{WOŭW灬p",
"operator": "幩šeSvEȤƏ埮pɵ",
"values": [
"392"
]
@ -1239,12 +1240,12 @@
},
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": 199049889,
"weight": -1449289597,
"preference": {
"matchExpressions": [
{
"key": "393",
"operator": "擭銆jʒǚ鍰\\縑",
"operator": "",
"values": [
"394"
]
@ -1253,7 +1254,7 @@
"matchFields": [
{
"key": "395",
"operator": "鞤ɱďW賁Ěɭɪǹ0衷,Ʒƣ",
"operator": "ş",
"values": [
"396"
]
@ -1268,14 +1269,14 @@
{
"labelSelector": {
"matchLabels": {
"4--883d-v3j4-7y-p---up52--sjo7799-skj5---r-t.sumf7ew/u-5mj_9.M.134-5-.q6H_.--_---.M.U_-m.-P.yPS": "1Tvw39F_C-rtSY.g._2F7.-_e..r"
"3---93-2-23/8--21kF-c026.i": "9.M.134-5-.q6H_.--t"
},
"matchExpressions": [
{
"key": "6-x_rC9..__-6_k.N-2B_V.-tfh4.caTz_.g.w-o.8_WT-M.3_1",
"key": "7U_-m.-P.yP9S--858LI__.8U",
"operator": "NotIn",
"values": [
"z"
"7-_pP__up.2L_s-o779._-k-5___-Qq..csh-3--Z1Tvw39F_C-rtSY.g._2F7m"
]
}
]
@ -1288,16 +1289,19 @@
],
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": -217760519,
"weight": -280562323,
"podAffinityTerm": {
"labelSelector": {
"matchLabels": {
"4-yy28-38xmu5nx4s--41-7--6m/271-_-9_._X-D---k6": "Q.-s.H.Hu-k-_-0-T1mel--F......3_t_-l..-.DG7r-3.----._4__XOnP"
"gt._U.-x_rC9..__-6_k.N-2B_V.-tfh4.caTz5": "2w-o.8_WT-M.3_-1y_8DX"
},
"matchExpressions": [
{
"key": "3---g-----p8-d5-8-m8i--k0j5g.zrrw8-5ts-7-bp/6E__-.8_e_2",
"operator": "DoesNotExist"
"key": "z-ufkr-x0u-1meljf-5269893-t-kl35d6--7rs37zzgy3-4----nf---2/D8.TS-jJ.Ys_Mop34_-y.8_38xm-.nx.sEK4.B.__65m8_11",
"operator": "NotIn",
"values": [
"c-r.E__-.8_e_l2.._8s--7_3x_-J_....7"
]
}
]
},
@ -1314,11 +1318,11 @@
{
"labelSelector": {
"matchLabels": {
"7F3p2_-_AmD-.0AP.1": "A--.F5_x.KNC0-.-m_0-m-6Sp_N-S..O-BZ..n"
"mi-4xs-0-5k-67-3p2-t--m-l80--5o1--cp6-5-x4/n-p9.-_0R.-_-W": "7F.pq..--3QC1--L--v_Z--Zg-_4Q__-v_tu"
},
"matchExpressions": [
{
"key": "QZ9p_6.C.e",
"key": "r-7---064eqk5--f4e4--r1k278l-d-8o1-x-1wl----f31-0-9/X1rh-K5y_AzOBW.9oE9_6.--v17r__.b",
"operator": "DoesNotExist"
}
]
@ -1331,18 +1335,18 @@
],
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": -1851436166,
"weight": -1934575848,
"podAffinityTerm": {
"labelSelector": {
"matchLabels": {
"6V1-rU.___06.eqk5E_-4-.XH-.k.7.l_-W8o._xJ1-lFA_X3": "V0H2-.zHw.H__V.VT"
"72q--m--2k-p---139g-2wt-g-ve55m-27/k5v3aUK_--_o_2.--4Z7__i1T.miw_7a_...8-_0__5HG2_5XOAX.gUV": "nw_-_x18mtxb__-ex-_1_-ODgC_1-_8__T3sn-0_.i__a.O2G_-_K-.03.mp.1"
},
"matchExpressions": [
{
"key": "0--0g-q-22r4wye52y-h7463lyps4483-o--3f1p7--43nw-l-x8/Hz_V_.r_v_._e_-78o_6Z..11_7pX_.-mLlx...w_t-_.5.40Rw4D",
"key": "7--4_IT_O__3.5h_XC0_-7.-hj-O_8-b6E_--Y_Dp8O_._e_3_.4_E",
"operator": "NotIn",
"values": [
"txb__-ex-_1_-ODgC_1-_V"
"ZI-_P..w-W_-nE...-V"
]
}
]
@ -1360,10 +1364,10 @@
"tolerations": [
{
"key": "430",
"operator": "堺ʣ",
"operator": "ƴ磳藷曥摮Z Ǐg鲅",
"value": "431",
"effect": "ŽɣB矗E¸",
"tolerationSeconds": -3532804738923434397
"effect": "癯頯aɴí(Ȟ9\"忕(",
"tolerationSeconds": 3807599400818393626
}
],
"hostAliases": [
@ -1375,7 +1379,7 @@
}
],
"priorityClassName": "434",
"priority": -1852730577,
"priority": 1352980996,
"dnsConfig": {
"nameservers": [
"435"
@ -1392,30 +1396,30 @@
},
"readinessGates": [
{
"conditionType": "ź魊塾ɖ$rolȋɶuɋ5r儉ɩ柀ɨ鴅"
"conditionType": "Ɏ嵄箲Ů埞瞔ɏÊ锒e躜ƕ"
}
],
"runtimeClassName": "439",
"enableServiceLinks": false,
"preemptionPolicy": "!ń1ċƹ|慼櫁色苆试揯遐",
"preemptionPolicy": "鲛ô衞Ɵ鳝稃Ȍ液文?謮",
"overhead": {
"4'ď曕椐敛n湙": "310"
"Î磣:mʂ渢pɉ驻(+昒ȼȈɍ颬灲": "185"
},
"topologySpreadConstraints": [
{
"maxSkew": -150478704,
"maxSkew": 547935694,
"topologyKey": "440",
"whenUnsatisfiable": ";鹡鑓侅闍ŏŃŋŏ}ŀ",
"whenUnsatisfiable": "Ƨ钖孝0蛮xAǫ\u0026tŧK剛Ʀ",
"labelSelector": {
"matchLabels": {
"p2djmscp--ac8u23-k----26u5--72n-5.j8-0020-1-5/t5W_._._-2M2._i": "wvU"
"za42o/Y-YD-Q9_-__..YNFu7Pg-.1": "tE"
},
"matchExpressions": [
{
"key": "4-4D-r.-F__r.oh..2_uGGP..-_N_h_4Hl-X0_2-W",
"key": "9-t-4m7a-41-6j4m--4-r4p--w1k8-u.4-2-08vc-u/B_-X__Hs",
"operator": "In",
"values": [
"2-.s_6O-5_7_-0w_--5-_.3--_9QWJ"
"7h--m._fN._k8__._ep2P.B._A_090ERG2nV.__p_Y-.2I"
]
}
]
@ -1424,11 +1428,11 @@
]
}
},
"ttlSecondsAfterFinished": 920774957
"ttlSecondsAfterFinished": -1754419098
}
},
"successfulJobsHistoryLimit": 1613009760,
"failedJobsHistoryLimit": 1560811691
"successfulJobsHistoryLimit": -2099726885,
"failedJobsHistoryLimit": 163538560
},
"status": {
"active": [
@ -1436,7 +1440,7 @@
"kind": "447",
"namespace": "448",
"name": "449",
"uid": "Ŋ)TiD¢ƿ媴h",
"uid": "ɦ?鮻ȧH僠 \u0026G",
"apiVersion": "450",
"resourceVersion": "451",
"fieldPath": "452"

View File

@ -31,7 +31,7 @@ metadata:
uid: "7"
spec:
concurrencyPolicy: Hr鯹)晿<o,c鮽ort昍řČ扷5Ɨ
failedJobsHistoryLimit: 1560811691
failedJobsHistoryLimit: 163538560
jobTemplate:
metadata:
annotations:
@ -112,25 +112,25 @@ spec:
- preference:
matchExpressions:
- key: "393"
operator: 擭銆jʒǚ鍰\縑
operator: ""
values:
- "394"
matchFields:
- key: "395"
operator: 鞤ɱďW賁Ěɭɪǹ0衷,Ʒƣ
operator: ş
values:
- "396"
weight: 199049889
weight: -1449289597
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: "389"
operator: 6x$1sȣ±p鋄5弢ȹ均i绝5哇芆
operator: 1sȣ±p鋄5
values:
- "390"
matchFields:
- key: "391"
operator: 埮pɵ{WOŭW灬p
operator: 幩šeSvEȤƏ埮pɵ
values:
- "392"
podAffinity:
@ -138,23 +138,25 @@ spec:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: 3---g-----p8-d5-8-m8i--k0j5g.zrrw8-5ts-7-bp/6E__-.8_e_2
operator: DoesNotExist
- key: z-ufkr-x0u-1meljf-5269893-t-kl35d6--7rs37zzgy3-4----nf---2/D8.TS-jJ.Ys_Mop34_-y.8_38xm-.nx.sEK4.B.__65m8_11
operator: NotIn
values:
- c-r.E__-.8_e_l2.._8s--7_3x_-J_....7
matchLabels:
4-yy28-38xmu5nx4s--41-7--6m/271-_-9_._X-D---k6: Q.-s.H.Hu-k-_-0-T1mel--F......3_t_-l..-.DG7r-3.----._4__XOnP
gt._U.-x_rC9..__-6_k.N-2B_V.-tfh4.caTz5: 2w-o.8_WT-M.3_-1y_8DX
namespaces:
- "411"
topologyKey: "412"
weight: -217760519
weight: -280562323
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: 6-x_rC9..__-6_k.N-2B_V.-tfh4.caTz_.g.w-o.8_WT-M.3_1
- key: 7U_-m.-P.yP9S--858LI__.8U
operator: NotIn
values:
- z
- 7-_pP__up.2L_s-o779._-k-5___-Qq..csh-3--Z1Tvw39F_C-rtSY.g._2F7m
matchLabels:
4--883d-v3j4-7y-p---up52--sjo7799-skj5---r-t.sumf7ew/u-5mj_9.M.134-5-.q6H_.--_---.M.U_-m.-P.yPS: 1Tvw39F_C-rtSY.g._2F7.-_e..r
3---93-2-23/8--21kF-c026.i: 9.M.134-5-.q6H_.--t
namespaces:
- "403"
topologyKey: "404"
@ -163,23 +165,23 @@ spec:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: 0--0g-q-22r4wye52y-h7463lyps4483-o--3f1p7--43nw-l-x8/Hz_V_.r_v_._e_-78o_6Z..11_7pX_.-mLlx...w_t-_.5.40Rw4D
- key: 7--4_IT_O__3.5h_XC0_-7.-hj-O_8-b6E_--Y_Dp8O_._e_3_.4_E
operator: NotIn
values:
- txb__-ex-_1_-ODgC_1-_V
- ZI-_P..w-W_-nE...-V
matchLabels:
6V1-rU.___06.eqk5E_-4-.XH-.k.7.l_-W8o._xJ1-lFA_X3: V0H2-.zHw.H__V.VT
72q--m--2k-p---139g-2wt-g-ve55m-27/k5v3aUK_--_o_2.--4Z7__i1T.miw_7a_...8-_0__5HG2_5XOAX.gUV: nw_-_x18mtxb__-ex-_1_-ODgC_1-_8__T3sn-0_.i__a.O2G_-_K-.03.mp.1
namespaces:
- "427"
topologyKey: "428"
weight: -1851436166
weight: -1934575848
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: QZ9p_6.C.e
- key: r-7---064eqk5--f4e4--r1k278l-d-8o1-x-1wl----f31-0-9/X1rh-K5y_AzOBW.9oE9_6.--v17r__.b
operator: DoesNotExist
matchLabels:
7F3p2_-_AmD-.0AP.1: A--.F5_x.KNC0-.-m_0-m-6Sp_N-S..O-BZ..n
mi-4xs-0-5k-67-3p2-t--m-l80--5o1--cp6-5-x4/n-p9.-_0R.-_-W: 7F.pq..--3QC1--L--v_Z--Zg-_4Q__-v_tu
namespaces:
- "419"
topologyKey: "420"
@ -724,17 +726,18 @@ spec:
nodeSelector:
"372": "373"
overhead:
4'ď曕椐敛n湙: "310"
preemptionPolicy: '!ń1ċƹ|慼櫁色苆试揯遐'
priority: -1852730577
Î磣:mʂ渢pɉ驻(+昒ȼȈɍ颬灲: "185"
preemptionPolicy: 鲛ô衞Ɵ鳝稃Ȍ液文?謮
priority: 1352980996
priorityClassName: "434"
readinessGates:
- conditionType: ź魊塾ɖ$rolȋɶuɋ5r儉ɩ柀ɨ鴅
- conditionType: Ɏ嵄箲Ů埞瞔ɏÊ锒e躜ƕ
restartPolicy: ɘɢ鬍熖B芭花ª瘡
runtimeClassName: "439"
schedulerName: "429"
securityContext:
fsGroup: 7124276984274024394
fsGroupChangePolicy: 蹔ŧ
runAsGroup: -779972051078659613
runAsNonRoot: false
runAsUser: 2179199799235189619
@ -758,23 +761,23 @@ spec:
subdomain: "388"
terminationGracePeriodSeconds: 2666412258966278206
tolerations:
- effect: ŽɣB矗E¸
- effect: 癯頯aɴí(Ȟ9"忕(
key: "430"
operator: 堺ʣ
tolerationSeconds: -3532804738923434397
operator: ƴ磳藷曥摮Z Ǐg鲅
tolerationSeconds: 3807599400818393626
value: "431"
topologySpreadConstraints:
- labelSelector:
matchExpressions:
- key: 4-4D-r.-F__r.oh..2_uGGP..-_N_h_4Hl-X0_2-W
- key: 9-t-4m7a-41-6j4m--4-r4p--w1k8-u.4-2-08vc-u/B_-X__Hs
operator: In
values:
- 2-.s_6O-5_7_-0w_--5-_.3--_9QWJ
- 7h--m._fN._k8__._ep2P.B._A_090ERG2nV.__p_Y-.2I
matchLabels:
p2djmscp--ac8u23-k----26u5--72n-5.j8-0020-1-5/t5W_._._-2M2._i: wvU
maxSkew: -150478704
za42o/Y-YD-Q9_-__..YNFu7Pg-.1: tE
maxSkew: 547935694
topologyKey: "440"
whenUnsatisfiable: ;鹡鑓侅闍ŏŃŋŏ}ŀ
whenUnsatisfiable: Ƨ钖孝0蛮xAǫ&tŧK剛Ʀ
volumes:
- awsElasticBlockStore:
fsType: "65"
@ -973,10 +976,10 @@ spec:
storagePolicyID: "122"
storagePolicyName: "121"
volumePath: "119"
ttlSecondsAfterFinished: 920774957
ttlSecondsAfterFinished: -1754419098
schedule: "19"
startingDeadlineSeconds: -2555947251840004808
successfulJobsHistoryLimit: 1613009760
successfulJobsHistoryLimit: -2099726885
suspend: true
status:
active:
@ -986,4 +989,4 @@ status:
name: "449"
namespace: "448"
resourceVersion: "451"
uid: Ŋ)TiD¢ƿ媴h
uid: ɦ?鮻ȧH僠 &G

View File

@ -1203,7 +1203,8 @@
"name": "380",
"value": "381"
}
]
],
"fsGroupChangePolicy": "ɱďW賁Ě"
},
"imagePullSecrets": [
{
@ -1220,7 +1221,7 @@
"matchExpressions": [
{
"key": "385",
"operator": "餑噭DµņP)",
"operator": ")DŽ髐njʉBn(fǂ",
"values": [
"386"
]
@ -1229,7 +1230,7 @@
"matchFields": [
{
"key": "387",
"operator": "ƷƣMț",
"operator": "鑳w妕眵笭/9崍h趭",
"values": [
"388"
]
@ -1240,12 +1241,12 @@
},
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": -1588068441,
"weight": -17241638,
"preference": {
"matchExpressions": [
{
"key": "389",
"operator": "W疪鑳w妕眵",
"operator": "E增猍",
"values": [
"390"
]
@ -1254,7 +1255,7 @@
"matchFields": [
{
"key": "391",
"operator": "躒訙Ǫʓ)ǂť嗆u8晲T[irȎ",
"operator": "[irȎ3Ĕ\\ɢX鰨松/Ȁĵ鴁ĩȲ",
"values": [
"392"
]
@ -1269,12 +1270,15 @@
{
"labelSelector": {
"matchLabels": {
"W_0-8-.M-.-.-8v-J1zET_..3dCv3j._.-p": "H_up.2L_s-o779._-k-5___-Qq..csh-3--Z1v"
"83980c7f0p-3-----995----5sumf7ef8jzv4-9-35o-1-5w5z3-d----0p--8.463--gt1--6mx-r-927--m6-k8-c2---2etfh41ca-z-5g2wco28---fn/d.-.-8v-J1zET_..3dCv3j._.-_pH": "G31-_I-A-_3bz._8M0U1_-__.71-_-9_.X"
},
"matchExpressions": [
{
"key": "39d4im.2---2etfh41ca-z-5g2wco280/C-rtSY.g._2F7.-_e..Or_-.3OHgt._U.-x_rC97",
"operator": "Exists"
"key": "lk9-8609a-e0--1----v8-4--558n1asz-r886-1--0s-t1e--mv56.l203-8sln7-3x-b--55039780bdw0-9/7._l.._Q.6.I--2_9.v.--_.--4QQ.-s.H.Hu-k-_-0-T1mej",
"operator": "In",
"values": [
"7-r-8S5--_7_-Zp_._.-miJ4x-_0_5-_.7F3p2_-_AmD-.0AP.-C"
]
}
]
},
@ -1286,19 +1290,16 @@
],
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": 2102595797,
"weight": 1792673033,
"podAffinityTerm": {
"labelSelector": {
"matchLabels": {
"5m8-1x129-9d8-s7-t7--336-11k8/3bz._8M0U1_-__.71-_-9_._X-D---k..1Q7._l.._Q.6.I--2_9.v.--3": "8.3_t_-l..-.DG7r-3.----._4__Xn"
"4-m_0-m-6Sp_N-S..O-BZ..6-1.S-B33": "17ca-_p-y.eQZ9p_1"
},
"matchExpressions": [
{
"key": "Ue_l2.._8s--Z",
"operator": "In",
"values": [
"A-._d._.Um.-__k.j._g-G-7--p9.-_0R.-_-3_L_2a"
]
"key": "yp8q-sf1--gw-jz-659--0l-023bm-6l2e5---k5v3a---9/tA.W5_-5_.V1-rU.___06.eqk5E_-4-.XH-.k.7.l_-W81",
"operator": "DoesNotExist"
}
]
},
@ -1315,14 +1316,14 @@
{
"labelSelector": {
"matchLabels": {
"D-0": "P.-.C_--.5"
"3-72q--m--2k-p---139g-2wt-g-ve55m-2-dm--ux3--0--2pu.exr-1-o--g--1l-8---3snw0-3i--a2/4Z7__i1T.miw_7a_...8-_0__5HG2_5XOAX.U": "4wrbW_E..24-O._.v._9-cz.-Y6T4g_-.._Lf2t_m3"
},
"matchExpressions": [
{
"key": "d4----q-x3w3dn5-1rhm-5y--z---69o-9-69mxv7.05-6-1xr-7---064eqk5--f4e4--r1k278l-d8/NN-S..O-BZ..6-1.S-BX",
"key": "rN7_B__--v-3-BzO5z80n_Ht5W_._._-2M2._I-_P..w-W_-n8",
"operator": "NotIn",
"values": [
"1_xJ1-lFA_Xf3.V0H2-.zHw.H__7"
"8u.._-__BM.6-.Y_72-_--pT751"
]
}
]
@ -1335,16 +1336,19 @@
],
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": 754095416,
"weight": -1229089770,
"podAffinityTerm": {
"labelSelector": {
"matchLabels": {
"0--0g-q-22r4wye52y-h7463lyps4483-o--3f1p7--43nw-l-x8/Hz_V_.r_v_._e_-78o_6Z..11_7pX_.-mLlx...w_t-_.5.40Rw4D": "Y_2-n_5023Xl-3Pw_-r7g"
"j9-w-n-f-v.yoh782-u---76g---h-4-lx-0-2qg--4i/wwv3D": "s_6O-5_7a"
},
"matchExpressions": [
{
"key": "3hjo--8kb6--ut---p8--3-e-3-44-e.w--i--40wv--in-870w--it6k47-7yd-y--3wc8q8/wrbW_E..24-O._.v._9-cz.-Y6T4g_-.._Lf2t_m...Cr",
"operator": "DoesNotExist"
"key": "fz2zy0e428-4-k-2-08vc--8/T9QW2JkU27_.-4T-I.-..K.-.0__sD.-.-_I-F.PWtO4-7-P41_.-.-Q",
"operator": "NotIn",
"values": [
"h--m._fN._k8__._ep2P.B._A_090ERG2nV.__p_Y-.2__a_dWUV"
]
}
]
},
@ -1361,10 +1365,10 @@
"tolerations": [
{
"key": "426",
"operator": "z* 皗u疲fɎ嵄箲Ů埞瞔ɏÊ锒e躜",
"operator": "ȧH僠",
"value": "427",
"effect": "ǣʛsĊ剞鮧軷șlļė[BN柌ë",
"tolerationSeconds": -9161243904952859304
"effect": "ÙQ阉(闒ƈƳ萎Ŋ\u003ceÙ蝌铀í",
"tolerationSeconds": 4315581051482382801
}
],
"hostAliases": [
@ -1376,7 +1380,7 @@
}
],
"priorityClassName": "430",
"priority": -966330786,
"priority": 466142803,
"dnsConfig": {
"nameservers": [
"431"
@ -1393,27 +1397,27 @@
},
"readinessGates": [
{
"conditionType": "齔試ŭ"
"conditionType": "帵(弬NĆɜɘ灢7ưg"
}
],
"runtimeClassName": "435",
"enableServiceLinks": false,
"preemptionPolicy": "鬙Ǒȃ绡\u003e堵zŕƧ钖孝0蛮xAǫ",
"enableServiceLinks": true,
"preemptionPolicy": "Lå\u003cƨ襌ę鶫礗渶刄[",
"overhead": {
"tŧK剛Ʀ魨练脨,Ƃ3貊": "972"
"ŚȆĸs": "489"
},
"topologySpreadConstraints": [
{
"maxSkew": 2088809792,
"maxSkew": -2146985013,
"topologyKey": "436",
"whenUnsatisfiable": "縊CkǚŨ镦",
"whenUnsatisfiable": "幻/饑Ȉ@|{t亪鸑躓1Ǐ詁Ȟ鮩ĺJ",
"labelSelector": {
"matchLabels": {
"rf-l67-9a-trt-03-7z2zy0e428-4-k2/kU27_.-4T-I.-..K.-.0__sD.-.-_I-FP": "q-JM"
"u--.K--g__..2bd": "7-0-...WE.-_tdt_-Z0T"
},
"matchExpressions": [
{
"key": "RT.0zo",
"key": "lM.Y-nd_.b_-gL_1..5a-1-CdM._bk81S3.s_s_6.-_vX",
"operator": "DoesNotExist"
}
]
@ -1422,7 +1426,7 @@
]
}
},
"ttlSecondsAfterFinished": 246849509
"ttlSecondsAfterFinished": -1746367307
}
}
}

View File

@ -111,25 +111,25 @@ template:
- preference:
matchExpressions:
- key: "389"
operator: W疪鑳w妕眵
operator: E增猍
values:
- "390"
matchFields:
- key: "391"
operator: 躒訙Ǫʓ)ǂť嗆u8晲T[irȎ
operator: '[irȎ3Ĕ\ɢX鰨松/Ȁĵ鴁ĩȲ'
values:
- "392"
weight: -1588068441
weight: -17241638
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: "385"
operator: 餑噭DµņP)
operator: )DŽ髐njʉBn(fǂ
values:
- "386"
matchFields:
- key: "387"
operator: ƷƣMț
operator: 鑳w妕眵笭/9崍h趭
values:
- "388"
podAffinity:
@ -137,23 +137,24 @@ template:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: Ue_l2.._8s--Z
operator: In
values:
- A-._d._.Um.-__k.j._g-G-7--p9.-_0R.-_-3_L_2a
- key: yp8q-sf1--gw-jz-659--0l-023bm-6l2e5---k5v3a---9/tA.W5_-5_.V1-rU.___06.eqk5E_-4-.XH-.k.7.l_-W81
operator: DoesNotExist
matchLabels:
5m8-1x129-9d8-s7-t7--336-11k8/3bz._8M0U1_-__.71-_-9_._X-D---k..1Q7._l.._Q.6.I--2_9.v.--3: 8.3_t_-l..-.DG7r-3.----._4__Xn
4-m_0-m-6Sp_N-S..O-BZ..6-1.S-B33: 17ca-_p-y.eQZ9p_1
namespaces:
- "407"
topologyKey: "408"
weight: 2102595797
weight: 1792673033
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: 39d4im.2---2etfh41ca-z-5g2wco280/C-rtSY.g._2F7.-_e..Or_-.3OHgt._U.-x_rC97
operator: Exists
- key: lk9-8609a-e0--1----v8-4--558n1asz-r886-1--0s-t1e--mv56.l203-8sln7-3x-b--55039780bdw0-9/7._l.._Q.6.I--2_9.v.--_.--4QQ.-s.H.Hu-k-_-0-T1mej
operator: In
values:
- 7-r-8S5--_7_-Zp_._.-miJ4x-_0_5-_.7F3p2_-_AmD-.0AP.-C
matchLabels:
W_0-8-.M-.-.-8v-J1zET_..3dCv3j._.-p: H_up.2L_s-o779._-k-5___-Qq..csh-3--Z1v
? 83980c7f0p-3-----995----5sumf7ef8jzv4-9-35o-1-5w5z3-d----0p--8.463--gt1--6mx-r-927--m6-k8-c2---2etfh41ca-z-5g2wco28---fn/d.-.-8v-J1zET_..3dCv3j._.-_pH
: G31-_I-A-_3bz._8M0U1_-__.71-_-9_.X
namespaces:
- "399"
topologyKey: "400"
@ -162,23 +163,25 @@ template:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: 3hjo--8kb6--ut---p8--3-e-3-44-e.w--i--40wv--in-870w--it6k47-7yd-y--3wc8q8/wrbW_E..24-O._.v._9-cz.-Y6T4g_-.._Lf2t_m...Cr
operator: DoesNotExist
- key: fz2zy0e428-4-k-2-08vc--8/T9QW2JkU27_.-4T-I.-..K.-.0__sD.-.-_I-F.PWtO4-7-P41_.-.-Q
operator: NotIn
values:
- h--m._fN._k8__._ep2P.B._A_090ERG2nV.__p_Y-.2__a_dWUV
matchLabels:
0--0g-q-22r4wye52y-h7463lyps4483-o--3f1p7--43nw-l-x8/Hz_V_.r_v_._e_-78o_6Z..11_7pX_.-mLlx...w_t-_.5.40Rw4D: Y_2-n_5023Xl-3Pw_-r7g
j9-w-n-f-v.yoh782-u---76g---h-4-lx-0-2qg--4i/wwv3D: s_6O-5_7a
namespaces:
- "423"
topologyKey: "424"
weight: 754095416
weight: -1229089770
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: d4----q-x3w3dn5-1rhm-5y--z---69o-9-69mxv7.05-6-1xr-7---064eqk5--f4e4--r1k278l-d8/NN-S..O-BZ..6-1.S-BX
- key: rN7_B__--v-3-BzO5z80n_Ht5W_._._-2M2._I-_P..w-W_-n8
operator: NotIn
values:
- 1_xJ1-lFA_Xf3.V0H2-.zHw.H__7
- 8u.._-__BM.6-.Y_72-_--pT751
matchLabels:
D-0: P.-.C_--.5
3-72q--m--2k-p---139g-2wt-g-ve55m-2-dm--ux3--0--2pu.exr-1-o--g--1l-8---3snw0-3i--a2/4Z7__i1T.miw_7a_...8-_0__5HG2_5XOAX.U: 4wrbW_E..24-O._.v._9-cz.-Y6T4g_-.._Lf2t_m3
namespaces:
- "415"
topologyKey: "416"
@ -364,7 +367,7 @@ template:
searches:
- "432"
dnsPolicy: ʐşƧ
enableServiceLinks: false
enableServiceLinks: true
ephemeralContainers:
- args:
- "299"
@ -723,17 +726,18 @@ template:
nodeSelector:
"368": "369"
overhead:
tŧK剛Ʀ魨练脨,Ƃ3貊: "972"
preemptionPolicy: 鬙Ǒȃ绡>堵zŕƧ钖孝0蛮xAǫ
priority: -966330786
ŚȆĸs: "489"
preemptionPolicy: Lå<ƨ襌ę鶫礗渶刄[
priority: 466142803
priorityClassName: "430"
readinessGates:
- conditionType: 齔試ŭ
- conditionType: 帵(弬NĆɜɘ灢7ưg
restartPolicy: 幩šeSvEȤƏ埮pɵ
runtimeClassName: "435"
schedulerName: "425"
securityContext:
fsGroup: -5265121980497361308
fsGroupChangePolicy: ɱďW賁Ě
runAsGroup: 2006200781539567705
runAsNonRoot: true
runAsUser: 1287380841622288898
@ -757,21 +761,21 @@ template:
subdomain: "384"
terminationGracePeriodSeconds: -3123571459188372202
tolerations:
- effect: ǣʛsĊ剞鮧軷șlļė[BN柌ë
- effect: ÙQ阉(闒ƈƳ萎Ŋ<eÙ蝌铀í
key: "426"
operator: z* 皗u疲fɎ嵄箲Ů埞瞔ɏÊ锒e躜
tolerationSeconds: -9161243904952859304
operator: ȧH僠
tolerationSeconds: 4315581051482382801
value: "427"
topologySpreadConstraints:
- labelSelector:
matchExpressions:
- key: RT.0zo
- key: lM.Y-nd_.b_-gL_1..5a-1-CdM._bk81S3.s_s_6.-_vX
operator: DoesNotExist
matchLabels:
rf-l67-9a-trt-03-7z2zy0e428-4-k2/kU27_.-4T-I.-..K.-.0__sD.-.-_I-FP: q-JM
maxSkew: 2088809792
u--.K--g__..2bd: 7-0-...WE.-_tdt_-Z0T
maxSkew: -2146985013
topologyKey: "436"
whenUnsatisfiable: 縊CkǚŨ镦
whenUnsatisfiable: 幻/饑Ȉ@|{t亪鸑躓1Ǐ詁Ȟ鮩ĺJ
volumes:
- awsElasticBlockStore:
fsType: "64"
@ -973,4 +977,4 @@ template:
storagePolicyID: "121"
storagePolicyName: "120"
volumePath: "118"
ttlSecondsAfterFinished: 246849509
ttlSecondsAfterFinished: -1746367307

View File

@ -1202,7 +1202,8 @@
"name": "384",
"value": "385"
}
]
],
"fsGroupChangePolicy": "蹔ŧ"
},
"imagePullSecrets": [
{
@ -1219,7 +1220,7 @@
"matchExpressions": [
{
"key": "389",
"operator": "6x$1sȣ±p鋄5弢ȹ均i绝5哇芆",
"operator": "1sȣ±p鋄5",
"values": [
"390"
]
@ -1228,7 +1229,7 @@
"matchFields": [
{
"key": "391",
"operator": "埮pɵ{WOŭW灬p",
"operator": "幩šeSvEȤƏ埮pɵ",
"values": [
"392"
]
@ -1239,12 +1240,12 @@
},
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": 199049889,
"weight": -1449289597,
"preference": {
"matchExpressions": [
{
"key": "393",
"operator": "擭銆jʒǚ鍰\\縑",
"operator": "",
"values": [
"394"
]
@ -1253,7 +1254,7 @@
"matchFields": [
{
"key": "395",
"operator": "鞤ɱďW賁Ěɭɪǹ0衷,Ʒƣ",
"operator": "ş",
"values": [
"396"
]
@ -1268,14 +1269,14 @@
{
"labelSelector": {
"matchLabels": {
"4--883d-v3j4-7y-p---up52--sjo7799-skj5---r-t.sumf7ew/u-5mj_9.M.134-5-.q6H_.--_---.M.U_-m.-P.yPS": "1Tvw39F_C-rtSY.g._2F7.-_e..r"
"3---93-2-23/8--21kF-c026.i": "9.M.134-5-.q6H_.--t"
},
"matchExpressions": [
{
"key": "6-x_rC9..__-6_k.N-2B_V.-tfh4.caTz_.g.w-o.8_WT-M.3_1",
"key": "7U_-m.-P.yP9S--858LI__.8U",
"operator": "NotIn",
"values": [
"z"
"7-_pP__up.2L_s-o779._-k-5___-Qq..csh-3--Z1Tvw39F_C-rtSY.g._2F7m"
]
}
]
@ -1288,16 +1289,19 @@
],
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": -217760519,
"weight": -280562323,
"podAffinityTerm": {
"labelSelector": {
"matchLabels": {
"4-yy28-38xmu5nx4s--41-7--6m/271-_-9_._X-D---k6": "Q.-s.H.Hu-k-_-0-T1mel--F......3_t_-l..-.DG7r-3.----._4__XOnP"
"gt._U.-x_rC9..__-6_k.N-2B_V.-tfh4.caTz5": "2w-o.8_WT-M.3_-1y_8DX"
},
"matchExpressions": [
{
"key": "3---g-----p8-d5-8-m8i--k0j5g.zrrw8-5ts-7-bp/6E__-.8_e_2",
"operator": "DoesNotExist"
"key": "z-ufkr-x0u-1meljf-5269893-t-kl35d6--7rs37zzgy3-4----nf---2/D8.TS-jJ.Ys_Mop34_-y.8_38xm-.nx.sEK4.B.__65m8_11",
"operator": "NotIn",
"values": [
"c-r.E__-.8_e_l2.._8s--7_3x_-J_....7"
]
}
]
},
@ -1314,11 +1318,11 @@
{
"labelSelector": {
"matchLabels": {
"7F3p2_-_AmD-.0AP.1": "A--.F5_x.KNC0-.-m_0-m-6Sp_N-S..O-BZ..n"
"mi-4xs-0-5k-67-3p2-t--m-l80--5o1--cp6-5-x4/n-p9.-_0R.-_-W": "7F.pq..--3QC1--L--v_Z--Zg-_4Q__-v_tu"
},
"matchExpressions": [
{
"key": "QZ9p_6.C.e",
"key": "r-7---064eqk5--f4e4--r1k278l-d-8o1-x-1wl----f31-0-9/X1rh-K5y_AzOBW.9oE9_6.--v17r__.b",
"operator": "DoesNotExist"
}
]
@ -1331,18 +1335,18 @@
],
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": -1851436166,
"weight": -1934575848,
"podAffinityTerm": {
"labelSelector": {
"matchLabels": {
"6V1-rU.___06.eqk5E_-4-.XH-.k.7.l_-W8o._xJ1-lFA_X3": "V0H2-.zHw.H__V.VT"
"72q--m--2k-p---139g-2wt-g-ve55m-27/k5v3aUK_--_o_2.--4Z7__i1T.miw_7a_...8-_0__5HG2_5XOAX.gUV": "nw_-_x18mtxb__-ex-_1_-ODgC_1-_8__T3sn-0_.i__a.O2G_-_K-.03.mp.1"
},
"matchExpressions": [
{
"key": "0--0g-q-22r4wye52y-h7463lyps4483-o--3f1p7--43nw-l-x8/Hz_V_.r_v_._e_-78o_6Z..11_7pX_.-mLlx...w_t-_.5.40Rw4D",
"key": "7--4_IT_O__3.5h_XC0_-7.-hj-O_8-b6E_--Y_Dp8O_._e_3_.4_E",
"operator": "NotIn",
"values": [
"txb__-ex-_1_-ODgC_1-_V"
"ZI-_P..w-W_-nE...-V"
]
}
]
@ -1360,10 +1364,10 @@
"tolerations": [
{
"key": "430",
"operator": "堺ʣ",
"operator": "ƴ磳藷曥摮Z Ǐg鲅",
"value": "431",
"effect": "ŽɣB矗E¸",
"tolerationSeconds": -3532804738923434397
"effect": "癯頯aɴí(Ȟ9\"忕(",
"tolerationSeconds": 3807599400818393626
}
],
"hostAliases": [
@ -1375,7 +1379,7 @@
}
],
"priorityClassName": "434",
"priority": -1852730577,
"priority": 1352980996,
"dnsConfig": {
"nameservers": [
"435"
@ -1392,30 +1396,30 @@
},
"readinessGates": [
{
"conditionType": "ź魊塾ɖ$rolȋɶuɋ5r儉ɩ柀ɨ鴅"
"conditionType": "Ɏ嵄箲Ů埞瞔ɏÊ锒e躜ƕ"
}
],
"runtimeClassName": "439",
"enableServiceLinks": false,
"preemptionPolicy": "!ń1ċƹ|慼櫁色苆试揯遐",
"preemptionPolicy": "鲛ô衞Ɵ鳝稃Ȍ液文?謮",
"overhead": {
"4'ď曕椐敛n湙": "310"
"Î磣:mʂ渢pɉ驻(+昒ȼȈɍ颬灲": "185"
},
"topologySpreadConstraints": [
{
"maxSkew": -150478704,
"maxSkew": 547935694,
"topologyKey": "440",
"whenUnsatisfiable": ";鹡鑓侅闍ŏŃŋŏ}ŀ",
"whenUnsatisfiable": "Ƨ钖孝0蛮xAǫ\u0026tŧK剛Ʀ",
"labelSelector": {
"matchLabels": {
"p2djmscp--ac8u23-k----26u5--72n-5.j8-0020-1-5/t5W_._._-2M2._i": "wvU"
"za42o/Y-YD-Q9_-__..YNFu7Pg-.1": "tE"
},
"matchExpressions": [
{
"key": "4-4D-r.-F__r.oh..2_uGGP..-_N_h_4Hl-X0_2-W",
"key": "9-t-4m7a-41-6j4m--4-r4p--w1k8-u.4-2-08vc-u/B_-X__Hs",
"operator": "In",
"values": [
"2-.s_6O-5_7_-0w_--5-_.3--_9QWJ"
"7h--m._fN._k8__._ep2P.B._A_090ERG2nV.__p_Y-.2I"
]
}
]
@ -1424,11 +1428,11 @@
]
}
},
"ttlSecondsAfterFinished": 920774957
"ttlSecondsAfterFinished": -1754419098
}
},
"successfulJobsHistoryLimit": 1613009760,
"failedJobsHistoryLimit": 1560811691
"successfulJobsHistoryLimit": -2099726885,
"failedJobsHistoryLimit": 163538560
},
"status": {
"active": [
@ -1436,7 +1440,7 @@
"kind": "447",
"namespace": "448",
"name": "449",
"uid": "Ŋ)TiD¢ƿ媴h",
"uid": "ɦ?鮻ȧH僠 \u0026G",
"apiVersion": "450",
"resourceVersion": "451",
"fieldPath": "452"

View File

@ -31,7 +31,7 @@ metadata:
uid: "7"
spec:
concurrencyPolicy: Hr鯹)晿<o,c鮽ort昍řČ扷5Ɨ
failedJobsHistoryLimit: 1560811691
failedJobsHistoryLimit: 163538560
jobTemplate:
metadata:
annotations:
@ -112,25 +112,25 @@ spec:
- preference:
matchExpressions:
- key: "393"
operator: 擭銆jʒǚ鍰\縑
operator: ""
values:
- "394"
matchFields:
- key: "395"
operator: 鞤ɱďW賁Ěɭɪǹ0衷,Ʒƣ
operator: ş
values:
- "396"
weight: 199049889
weight: -1449289597
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: "389"
operator: 6x$1sȣ±p鋄5弢ȹ均i绝5哇芆
operator: 1sȣ±p鋄5
values:
- "390"
matchFields:
- key: "391"
operator: 埮pɵ{WOŭW灬p
operator: 幩šeSvEȤƏ埮pɵ
values:
- "392"
podAffinity:
@ -138,23 +138,25 @@ spec:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: 3---g-----p8-d5-8-m8i--k0j5g.zrrw8-5ts-7-bp/6E__-.8_e_2
operator: DoesNotExist
- key: z-ufkr-x0u-1meljf-5269893-t-kl35d6--7rs37zzgy3-4----nf---2/D8.TS-jJ.Ys_Mop34_-y.8_38xm-.nx.sEK4.B.__65m8_11
operator: NotIn
values:
- c-r.E__-.8_e_l2.._8s--7_3x_-J_....7
matchLabels:
4-yy28-38xmu5nx4s--41-7--6m/271-_-9_._X-D---k6: Q.-s.H.Hu-k-_-0-T1mel--F......3_t_-l..-.DG7r-3.----._4__XOnP
gt._U.-x_rC9..__-6_k.N-2B_V.-tfh4.caTz5: 2w-o.8_WT-M.3_-1y_8DX
namespaces:
- "411"
topologyKey: "412"
weight: -217760519
weight: -280562323
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: 6-x_rC9..__-6_k.N-2B_V.-tfh4.caTz_.g.w-o.8_WT-M.3_1
- key: 7U_-m.-P.yP9S--858LI__.8U
operator: NotIn
values:
- z
- 7-_pP__up.2L_s-o779._-k-5___-Qq..csh-3--Z1Tvw39F_C-rtSY.g._2F7m
matchLabels:
4--883d-v3j4-7y-p---up52--sjo7799-skj5---r-t.sumf7ew/u-5mj_9.M.134-5-.q6H_.--_---.M.U_-m.-P.yPS: 1Tvw39F_C-rtSY.g._2F7.-_e..r
3---93-2-23/8--21kF-c026.i: 9.M.134-5-.q6H_.--t
namespaces:
- "403"
topologyKey: "404"
@ -163,23 +165,23 @@ spec:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: 0--0g-q-22r4wye52y-h7463lyps4483-o--3f1p7--43nw-l-x8/Hz_V_.r_v_._e_-78o_6Z..11_7pX_.-mLlx...w_t-_.5.40Rw4D
- key: 7--4_IT_O__3.5h_XC0_-7.-hj-O_8-b6E_--Y_Dp8O_._e_3_.4_E
operator: NotIn
values:
- txb__-ex-_1_-ODgC_1-_V
- ZI-_P..w-W_-nE...-V
matchLabels:
6V1-rU.___06.eqk5E_-4-.XH-.k.7.l_-W8o._xJ1-lFA_X3: V0H2-.zHw.H__V.VT
72q--m--2k-p---139g-2wt-g-ve55m-27/k5v3aUK_--_o_2.--4Z7__i1T.miw_7a_...8-_0__5HG2_5XOAX.gUV: nw_-_x18mtxb__-ex-_1_-ODgC_1-_8__T3sn-0_.i__a.O2G_-_K-.03.mp.1
namespaces:
- "427"
topologyKey: "428"
weight: -1851436166
weight: -1934575848
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: QZ9p_6.C.e
- key: r-7---064eqk5--f4e4--r1k278l-d-8o1-x-1wl----f31-0-9/X1rh-K5y_AzOBW.9oE9_6.--v17r__.b
operator: DoesNotExist
matchLabels:
7F3p2_-_AmD-.0AP.1: A--.F5_x.KNC0-.-m_0-m-6Sp_N-S..O-BZ..n
mi-4xs-0-5k-67-3p2-t--m-l80--5o1--cp6-5-x4/n-p9.-_0R.-_-W: 7F.pq..--3QC1--L--v_Z--Zg-_4Q__-v_tu
namespaces:
- "419"
topologyKey: "420"
@ -724,17 +726,18 @@ spec:
nodeSelector:
"372": "373"
overhead:
4'ď曕椐敛n湙: "310"
preemptionPolicy: '!ń1ċƹ|慼櫁色苆试揯遐'
priority: -1852730577
Î磣:mʂ渢pɉ驻(+昒ȼȈɍ颬灲: "185"
preemptionPolicy: 鲛ô衞Ɵ鳝稃Ȍ液文?謮
priority: 1352980996
priorityClassName: "434"
readinessGates:
- conditionType: ź魊塾ɖ$rolȋɶuɋ5r儉ɩ柀ɨ鴅
- conditionType: Ɏ嵄箲Ů埞瞔ɏÊ锒e躜ƕ
restartPolicy: ɘɢ鬍熖B芭花ª瘡
runtimeClassName: "439"
schedulerName: "429"
securityContext:
fsGroup: 7124276984274024394
fsGroupChangePolicy: 蹔ŧ
runAsGroup: -779972051078659613
runAsNonRoot: false
runAsUser: 2179199799235189619
@ -758,23 +761,23 @@ spec:
subdomain: "388"
terminationGracePeriodSeconds: 2666412258966278206
tolerations:
- effect: ŽɣB矗E¸
- effect: 癯頯aɴí(Ȟ9"忕(
key: "430"
operator: 堺ʣ
tolerationSeconds: -3532804738923434397
operator: ƴ磳藷曥摮Z Ǐg鲅
tolerationSeconds: 3807599400818393626
value: "431"
topologySpreadConstraints:
- labelSelector:
matchExpressions:
- key: 4-4D-r.-F__r.oh..2_uGGP..-_N_h_4Hl-X0_2-W
- key: 9-t-4m7a-41-6j4m--4-r4p--w1k8-u.4-2-08vc-u/B_-X__Hs
operator: In
values:
- 2-.s_6O-5_7_-0w_--5-_.3--_9QWJ
- 7h--m._fN._k8__._ep2P.B._A_090ERG2nV.__p_Y-.2I
matchLabels:
p2djmscp--ac8u23-k----26u5--72n-5.j8-0020-1-5/t5W_._._-2M2._i: wvU
maxSkew: -150478704
za42o/Y-YD-Q9_-__..YNFu7Pg-.1: tE
maxSkew: 547935694
topologyKey: "440"
whenUnsatisfiable: ;鹡鑓侅闍ŏŃŋŏ}ŀ
whenUnsatisfiable: Ƨ钖孝0蛮xAǫ&tŧK剛Ʀ
volumes:
- awsElasticBlockStore:
fsType: "65"
@ -973,10 +976,10 @@ spec:
storagePolicyID: "122"
storagePolicyName: "121"
volumePath: "119"
ttlSecondsAfterFinished: 920774957
ttlSecondsAfterFinished: -1754419098
schedule: "19"
startingDeadlineSeconds: -2555947251840004808
successfulJobsHistoryLimit: 1613009760
successfulJobsHistoryLimit: -2099726885
suspend: true
status:
active:
@ -986,4 +989,4 @@ status:
name: "449"
namespace: "448"
resourceVersion: "451"
uid: Ŋ)TiD¢ƿ媴h
uid: ɦ?鮻ȧH僠 &G

View File

@ -1203,7 +1203,8 @@
"name": "380",
"value": "381"
}
]
],
"fsGroupChangePolicy": "ɱďW賁Ě"
},
"imagePullSecrets": [
{
@ -1220,7 +1221,7 @@
"matchExpressions": [
{
"key": "385",
"operator": "餑噭DµņP)",
"operator": ")DŽ髐njʉBn(fǂ",
"values": [
"386"
]
@ -1229,7 +1230,7 @@
"matchFields": [
{
"key": "387",
"operator": "ƷƣMț",
"operator": "鑳w妕眵笭/9崍h趭",
"values": [
"388"
]
@ -1240,12 +1241,12 @@
},
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": -1588068441,
"weight": -17241638,
"preference": {
"matchExpressions": [
{
"key": "389",
"operator": "W疪鑳w妕眵",
"operator": "E增猍",
"values": [
"390"
]
@ -1254,7 +1255,7 @@
"matchFields": [
{
"key": "391",
"operator": "躒訙Ǫʓ)ǂť嗆u8晲T[irȎ",
"operator": "[irȎ3Ĕ\\ɢX鰨松/Ȁĵ鴁ĩȲ",
"values": [
"392"
]
@ -1269,12 +1270,15 @@
{
"labelSelector": {
"matchLabels": {
"W_0-8-.M-.-.-8v-J1zET_..3dCv3j._.-p": "H_up.2L_s-o779._-k-5___-Qq..csh-3--Z1v"
"83980c7f0p-3-----995----5sumf7ef8jzv4-9-35o-1-5w5z3-d----0p--8.463--gt1--6mx-r-927--m6-k8-c2---2etfh41ca-z-5g2wco28---fn/d.-.-8v-J1zET_..3dCv3j._.-_pH": "G31-_I-A-_3bz._8M0U1_-__.71-_-9_.X"
},
"matchExpressions": [
{
"key": "39d4im.2---2etfh41ca-z-5g2wco280/C-rtSY.g._2F7.-_e..Or_-.3OHgt._U.-x_rC97",
"operator": "Exists"
"key": "lk9-8609a-e0--1----v8-4--558n1asz-r886-1--0s-t1e--mv56.l203-8sln7-3x-b--55039780bdw0-9/7._l.._Q.6.I--2_9.v.--_.--4QQ.-s.H.Hu-k-_-0-T1mej",
"operator": "In",
"values": [
"7-r-8S5--_7_-Zp_._.-miJ4x-_0_5-_.7F3p2_-_AmD-.0AP.-C"
]
}
]
},
@ -1286,19 +1290,16 @@
],
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": 2102595797,
"weight": 1792673033,
"podAffinityTerm": {
"labelSelector": {
"matchLabels": {
"5m8-1x129-9d8-s7-t7--336-11k8/3bz._8M0U1_-__.71-_-9_._X-D---k..1Q7._l.._Q.6.I--2_9.v.--3": "8.3_t_-l..-.DG7r-3.----._4__Xn"
"4-m_0-m-6Sp_N-S..O-BZ..6-1.S-B33": "17ca-_p-y.eQZ9p_1"
},
"matchExpressions": [
{
"key": "Ue_l2.._8s--Z",
"operator": "In",
"values": [
"A-._d._.Um.-__k.j._g-G-7--p9.-_0R.-_-3_L_2a"
]
"key": "yp8q-sf1--gw-jz-659--0l-023bm-6l2e5---k5v3a---9/tA.W5_-5_.V1-rU.___06.eqk5E_-4-.XH-.k.7.l_-W81",
"operator": "DoesNotExist"
}
]
},
@ -1315,14 +1316,14 @@
{
"labelSelector": {
"matchLabels": {
"D-0": "P.-.C_--.5"
"3-72q--m--2k-p---139g-2wt-g-ve55m-2-dm--ux3--0--2pu.exr-1-o--g--1l-8---3snw0-3i--a2/4Z7__i1T.miw_7a_...8-_0__5HG2_5XOAX.U": "4wrbW_E..24-O._.v._9-cz.-Y6T4g_-.._Lf2t_m3"
},
"matchExpressions": [
{
"key": "d4----q-x3w3dn5-1rhm-5y--z---69o-9-69mxv7.05-6-1xr-7---064eqk5--f4e4--r1k278l-d8/NN-S..O-BZ..6-1.S-BX",
"key": "rN7_B__--v-3-BzO5z80n_Ht5W_._._-2M2._I-_P..w-W_-n8",
"operator": "NotIn",
"values": [
"1_xJ1-lFA_Xf3.V0H2-.zHw.H__7"
"8u.._-__BM.6-.Y_72-_--pT751"
]
}
]
@ -1335,16 +1336,19 @@
],
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": 754095416,
"weight": -1229089770,
"podAffinityTerm": {
"labelSelector": {
"matchLabels": {
"0--0g-q-22r4wye52y-h7463lyps4483-o--3f1p7--43nw-l-x8/Hz_V_.r_v_._e_-78o_6Z..11_7pX_.-mLlx...w_t-_.5.40Rw4D": "Y_2-n_5023Xl-3Pw_-r7g"
"j9-w-n-f-v.yoh782-u---76g---h-4-lx-0-2qg--4i/wwv3D": "s_6O-5_7a"
},
"matchExpressions": [
{
"key": "3hjo--8kb6--ut---p8--3-e-3-44-e.w--i--40wv--in-870w--it6k47-7yd-y--3wc8q8/wrbW_E..24-O._.v._9-cz.-Y6T4g_-.._Lf2t_m...Cr",
"operator": "DoesNotExist"
"key": "fz2zy0e428-4-k-2-08vc--8/T9QW2JkU27_.-4T-I.-..K.-.0__sD.-.-_I-F.PWtO4-7-P41_.-.-Q",
"operator": "NotIn",
"values": [
"h--m._fN._k8__._ep2P.B._A_090ERG2nV.__p_Y-.2__a_dWUV"
]
}
]
},
@ -1361,10 +1365,10 @@
"tolerations": [
{
"key": "426",
"operator": "z* 皗u疲fɎ嵄箲Ů埞瞔ɏÊ锒e躜",
"operator": "ȧH僠",
"value": "427",
"effect": "ǣʛsĊ剞鮧軷șlļė[BN柌ë",
"tolerationSeconds": -9161243904952859304
"effect": "ÙQ阉(闒ƈƳ萎Ŋ\u003ceÙ蝌铀í",
"tolerationSeconds": 4315581051482382801
}
],
"hostAliases": [
@ -1376,7 +1380,7 @@
}
],
"priorityClassName": "430",
"priority": -966330786,
"priority": 466142803,
"dnsConfig": {
"nameservers": [
"431"
@ -1393,27 +1397,27 @@
},
"readinessGates": [
{
"conditionType": "齔試ŭ"
"conditionType": "帵(弬NĆɜɘ灢7ưg"
}
],
"runtimeClassName": "435",
"enableServiceLinks": false,
"preemptionPolicy": "鬙Ǒȃ绡\u003e堵zŕƧ钖孝0蛮xAǫ",
"enableServiceLinks": true,
"preemptionPolicy": "Lå\u003cƨ襌ę鶫礗渶刄[",
"overhead": {
"tŧK剛Ʀ魨练脨,Ƃ3貊": "972"
"ŚȆĸs": "489"
},
"topologySpreadConstraints": [
{
"maxSkew": 2088809792,
"maxSkew": -2146985013,
"topologyKey": "436",
"whenUnsatisfiable": "縊CkǚŨ镦",
"whenUnsatisfiable": "幻/饑Ȉ@|{t亪鸑躓1Ǐ詁Ȟ鮩ĺJ",
"labelSelector": {
"matchLabels": {
"rf-l67-9a-trt-03-7z2zy0e428-4-k2/kU27_.-4T-I.-..K.-.0__sD.-.-_I-FP": "q-JM"
"u--.K--g__..2bd": "7-0-...WE.-_tdt_-Z0T"
},
"matchExpressions": [
{
"key": "RT.0zo",
"key": "lM.Y-nd_.b_-gL_1..5a-1-CdM._bk81S3.s_s_6.-_vX",
"operator": "DoesNotExist"
}
]
@ -1422,7 +1426,7 @@
]
}
},
"ttlSecondsAfterFinished": 246849509
"ttlSecondsAfterFinished": -1746367307
}
}
}

View File

@ -111,25 +111,25 @@ template:
- preference:
matchExpressions:
- key: "389"
operator: W疪鑳w妕眵
operator: E增猍
values:
- "390"
matchFields:
- key: "391"
operator: 躒訙Ǫʓ)ǂť嗆u8晲T[irȎ
operator: '[irȎ3Ĕ\ɢX鰨松/Ȁĵ鴁ĩȲ'
values:
- "392"
weight: -1588068441
weight: -17241638
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: "385"
operator: 餑噭DµņP)
operator: )DŽ髐njʉBn(fǂ
values:
- "386"
matchFields:
- key: "387"
operator: ƷƣMț
operator: 鑳w妕眵笭/9崍h趭
values:
- "388"
podAffinity:
@ -137,23 +137,24 @@ template:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: Ue_l2.._8s--Z
operator: In
values:
- A-._d._.Um.-__k.j._g-G-7--p9.-_0R.-_-3_L_2a
- key: yp8q-sf1--gw-jz-659--0l-023bm-6l2e5---k5v3a---9/tA.W5_-5_.V1-rU.___06.eqk5E_-4-.XH-.k.7.l_-W81
operator: DoesNotExist
matchLabels:
5m8-1x129-9d8-s7-t7--336-11k8/3bz._8M0U1_-__.71-_-9_._X-D---k..1Q7._l.._Q.6.I--2_9.v.--3: 8.3_t_-l..-.DG7r-3.----._4__Xn
4-m_0-m-6Sp_N-S..O-BZ..6-1.S-B33: 17ca-_p-y.eQZ9p_1
namespaces:
- "407"
topologyKey: "408"
weight: 2102595797
weight: 1792673033
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: 39d4im.2---2etfh41ca-z-5g2wco280/C-rtSY.g._2F7.-_e..Or_-.3OHgt._U.-x_rC97
operator: Exists
- key: lk9-8609a-e0--1----v8-4--558n1asz-r886-1--0s-t1e--mv56.l203-8sln7-3x-b--55039780bdw0-9/7._l.._Q.6.I--2_9.v.--_.--4QQ.-s.H.Hu-k-_-0-T1mej
operator: In
values:
- 7-r-8S5--_7_-Zp_._.-miJ4x-_0_5-_.7F3p2_-_AmD-.0AP.-C
matchLabels:
W_0-8-.M-.-.-8v-J1zET_..3dCv3j._.-p: H_up.2L_s-o779._-k-5___-Qq..csh-3--Z1v
? 83980c7f0p-3-----995----5sumf7ef8jzv4-9-35o-1-5w5z3-d----0p--8.463--gt1--6mx-r-927--m6-k8-c2---2etfh41ca-z-5g2wco28---fn/d.-.-8v-J1zET_..3dCv3j._.-_pH
: G31-_I-A-_3bz._8M0U1_-__.71-_-9_.X
namespaces:
- "399"
topologyKey: "400"
@ -162,23 +163,25 @@ template:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: 3hjo--8kb6--ut---p8--3-e-3-44-e.w--i--40wv--in-870w--it6k47-7yd-y--3wc8q8/wrbW_E..24-O._.v._9-cz.-Y6T4g_-.._Lf2t_m...Cr
operator: DoesNotExist
- key: fz2zy0e428-4-k-2-08vc--8/T9QW2JkU27_.-4T-I.-..K.-.0__sD.-.-_I-F.PWtO4-7-P41_.-.-Q
operator: NotIn
values:
- h--m._fN._k8__._ep2P.B._A_090ERG2nV.__p_Y-.2__a_dWUV
matchLabels:
0--0g-q-22r4wye52y-h7463lyps4483-o--3f1p7--43nw-l-x8/Hz_V_.r_v_._e_-78o_6Z..11_7pX_.-mLlx...w_t-_.5.40Rw4D: Y_2-n_5023Xl-3Pw_-r7g
j9-w-n-f-v.yoh782-u---76g---h-4-lx-0-2qg--4i/wwv3D: s_6O-5_7a
namespaces:
- "423"
topologyKey: "424"
weight: 754095416
weight: -1229089770
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: d4----q-x3w3dn5-1rhm-5y--z---69o-9-69mxv7.05-6-1xr-7---064eqk5--f4e4--r1k278l-d8/NN-S..O-BZ..6-1.S-BX
- key: rN7_B__--v-3-BzO5z80n_Ht5W_._._-2M2._I-_P..w-W_-n8
operator: NotIn
values:
- 1_xJ1-lFA_Xf3.V0H2-.zHw.H__7
- 8u.._-__BM.6-.Y_72-_--pT751
matchLabels:
D-0: P.-.C_--.5
3-72q--m--2k-p---139g-2wt-g-ve55m-2-dm--ux3--0--2pu.exr-1-o--g--1l-8---3snw0-3i--a2/4Z7__i1T.miw_7a_...8-_0__5HG2_5XOAX.U: 4wrbW_E..24-O._.v._9-cz.-Y6T4g_-.._Lf2t_m3
namespaces:
- "415"
topologyKey: "416"
@ -364,7 +367,7 @@ template:
searches:
- "432"
dnsPolicy: ʐşƧ
enableServiceLinks: false
enableServiceLinks: true
ephemeralContainers:
- args:
- "299"
@ -723,17 +726,18 @@ template:
nodeSelector:
"368": "369"
overhead:
tŧK剛Ʀ魨练脨,Ƃ3貊: "972"
preemptionPolicy: 鬙Ǒȃ绡>堵zŕƧ钖孝0蛮xAǫ
priority: -966330786
ŚȆĸs: "489"
preemptionPolicy: Lå<ƨ襌ę鶫礗渶刄[
priority: 466142803
priorityClassName: "430"
readinessGates:
- conditionType: 齔試ŭ
- conditionType: 帵(弬NĆɜɘ灢7ưg
restartPolicy: 幩šeSvEȤƏ埮pɵ
runtimeClassName: "435"
schedulerName: "425"
securityContext:
fsGroup: -5265121980497361308
fsGroupChangePolicy: ɱďW賁Ě
runAsGroup: 2006200781539567705
runAsNonRoot: true
runAsUser: 1287380841622288898
@ -757,21 +761,21 @@ template:
subdomain: "384"
terminationGracePeriodSeconds: -3123571459188372202
tolerations:
- effect: ǣʛsĊ剞鮧軷șlļė[BN柌ë
- effect: ÙQ阉(闒ƈƳ萎Ŋ<eÙ蝌铀í
key: "426"
operator: z* 皗u疲fɎ嵄箲Ů埞瞔ɏÊ锒e躜
tolerationSeconds: -9161243904952859304
operator: ȧH僠
tolerationSeconds: 4315581051482382801
value: "427"
topologySpreadConstraints:
- labelSelector:
matchExpressions:
- key: RT.0zo
- key: lM.Y-nd_.b_-gL_1..5a-1-CdM._bk81S3.s_s_6.-_vX
operator: DoesNotExist
matchLabels:
rf-l67-9a-trt-03-7z2zy0e428-4-k2/kU27_.-4T-I.-..K.-.0__sD.-.-_I-FP: q-JM
maxSkew: 2088809792
u--.K--g__..2bd: 7-0-...WE.-_tdt_-Z0T
maxSkew: -2146985013
topologyKey: "436"
whenUnsatisfiable: 縊CkǚŨ镦
whenUnsatisfiable: 幻/饑Ȉ@|{t亪鸑躓1Ǐ詁Ȟ鮩ĺJ
volumes:
- awsElasticBlockStore:
fsType: "64"
@ -973,4 +977,4 @@ template:
storagePolicyID: "121"
storagePolicyName: "120"
volumePath: "118"
ttlSecondsAfterFinished: 246849509
ttlSecondsAfterFinished: -1746367307

View File

@ -1099,7 +1099,8 @@
"name": "345",
"value": "346"
}
]
],
"fsGroupChangePolicy": "勅跦Opwǩ曬逴褜1Ø"
},
"imagePullSecrets": [
{
@ -1116,7 +1117,7 @@
"matchExpressions": [
{
"key": "350",
"operator": "}潷ʒ胵輓Ɔȓ蹣ɐǛv+8Ƥ熪军g\u003e",
"operator": "8Ƥ熪军g\u003e郵[+",
"values": [
"351"
]
@ -1125,7 +1126,7 @@
"matchFields": [
{
"key": "352",
"operator": "偢ɇ卷荙JLĹ]佱¿\u003e犵殇ŕ-Ɂ圯W",
"operator": "荙JLĹ]佱¿\u003e犵殇ŕ",
"values": [
"353"
]
@ -1136,12 +1137,12 @@
},
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": -1418092595,
"weight": -979584143,
"preference": {
"matchExpressions": [
{
"key": "354",
"operator": "唊#v",
"operator": "W:ĸ輦唊#v",
"values": [
"355"
]
@ -1150,7 +1151,7 @@
"matchFields": [
{
"key": "356",
"operator": "埄趛",
"operator": "q埄趛屡ʁ岼昕ĬÇó藢xɮĵȑ6L*",
"values": [
"357"
]
@ -1165,15 +1166,12 @@
{
"labelSelector": {
"matchLabels": {
"zo--4-1-2s39--6---fv--m-8--72-bca4m56au3f---tx-8----2d-4u-d7sn/48Y.q.0-_1-F.h-__k_K5._..O_.J_-G_--V-42E_--o90G_A6": "9_.5vN5.25aWx.2aM214_.-N_g-..__._____K_g1cXfr.4_.-_-_-...1y"
"A_k_K5._..O_.J_-G_--V-42E_--o90G_A4..-L..L": "0N_N.O30-_u._-2hT.-z-._7-5lL..-_--.VEa-_gn.8-c.C3_F._oX-9"
},
"matchExpressions": [
{
"key": "8x.2K_2qu_0S-CqW.D_8--21kF-c026.-iTl.1-.T",
"operator": "NotIn",
"values": [
"H.I3.__-.u"
]
"key": "ao26--26-hs5-jedse.7vc0260ni-l11q5--uk5mj-94-8134i5kq/aWx.2aM214_.-N_g-..__._____K_g1cXfr.4_.-_-_-...1py_8-3..s._.x2",
"operator": "Exists"
}
]
},
@ -1185,19 +1183,16 @@
],
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": -819013491,
"weight": -1058923098,
"podAffinityTerm": {
"labelSelector": {
"matchLabels": {
"x_-a__0-8-.M-.-.-8v-J1zET_..3dCv3j._.-_pP__up2": "Ns-o779._-k5"
"3-----995----5sumf7ef8jzv4-9-30.rt--6g1-2-73m-e46-r-g63--gt1--6mx-r-927--m6-g/J0-8-.M-.-.-8v-J1zET_..3dCv3j._.-_pP__up.2L_s-7": "m.__G-8...__.Q_c8.G.b_9_1o.w_aI._1"
},
"matchExpressions": [
{
"key": "9d4i-m7---k8235--8--c83-4b-9-1o8w-4/4csh-3--Z1Tvw39F_C-rtSY.g._2F7.-_e..Or_-.3OHgt._U.-x_rC9.D",
"operator": "NotIn",
"values": [
"G31-_I-A-_3bz._8M0U1_-__.71-_-9_.X"
]
"key": "3--j2---2--82--cj-1-s--op34-yw/A-_3bz._M",
"operator": "Exists"
}
]
},
@ -1214,7 +1209,7 @@
{
"labelSelector": {
"matchLabels": {
"xm-.nx.sEK4.B.__65m8_x": "29_.-.Ms7_t.P_3..H..k9M86.9a_-0R1"
"sEK4.B.__65m8_x": "29_.-.Ms7_t.P_3..H..k9M86.9a_-0R1"
},
"matchExpressions": [
{

View File

@ -37,25 +37,25 @@ spec:
- preference:
matchExpressions:
- key: "354"
operator: 唊#v
operator: W:ĸ輦唊#v
values:
- "355"
matchFields:
- key: "356"
operator: 埄趛
operator: q埄趛屡ʁ岼昕ĬÇó藢xɮĵȑ6L*
values:
- "357"
weight: -1418092595
weight: -979584143
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: "350"
operator: '}潷ʒ胵輓Ɔȓ蹣ɐǛv+8Ƥ熪军g>'
operator: 8Ƥ熪军g>郵[+
values:
- "351"
matchFields:
- key: "352"
operator: 偢ɇ卷荙JLĹ]佱¿>犵殇ŕ-Ɂ圯W
operator: 荙JLĹ]佱¿>犵殇ŕ
values:
- "353"
podAffinity:
@ -63,25 +63,21 @@ spec:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: 9d4i-m7---k8235--8--c83-4b-9-1o8w-4/4csh-3--Z1Tvw39F_C-rtSY.g._2F7.-_e..Or_-.3OHgt._U.-x_rC9.D
operator: NotIn
values:
- G31-_I-A-_3bz._8M0U1_-__.71-_-9_.X
- key: 3--j2---2--82--cj-1-s--op34-yw/A-_3bz._M
operator: Exists
matchLabels:
x_-a__0-8-.M-.-.-8v-J1zET_..3dCv3j._.-_pP__up2: Ns-o779._-k5
3-----995----5sumf7ef8jzv4-9-30.rt--6g1-2-73m-e46-r-g63--gt1--6mx-r-927--m6-g/J0-8-.M-.-.-8v-J1zET_..3dCv3j._.-_pP__up.2L_s-7: m.__G-8...__.Q_c8.G.b_9_1o.w_aI._1
namespaces:
- "372"
topologyKey: "373"
weight: -819013491
weight: -1058923098
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: 8x.2K_2qu_0S-CqW.D_8--21kF-c026.-iTl.1-.T
operator: NotIn
values:
- H.I3.__-.u
- key: ao26--26-hs5-jedse.7vc0260ni-l11q5--uk5mj-94-8134i5kq/aWx.2aM214_.-N_g-..__._____K_g1cXfr.4_.-_-_-...1py_8-3..s._.x2
operator: Exists
matchLabels:
zo--4-1-2s39--6---fv--m-8--72-bca4m56au3f---tx-8----2d-4u-d7sn/48Y.q.0-_1-F.h-__k_K5._..O_.J_-G_--V-42E_--o90G_A6: 9_.5vN5.25aWx.2aM214_.-N_g-..__._____K_g1cXfr.4_.-_-_-...1y
A_k_K5._..O_.J_-G_--V-42E_--o90G_A4..-L..L: 0N_N.O30-_u._-2hT.-z-._7-5lL..-_--.VEa-_gn.8-c.C3_F._oX-9
namespaces:
- "364"
topologyKey: "365"
@ -106,7 +102,7 @@ spec:
- key: v8_.O_..8n.--z_-..6W.K
operator: Exists
matchLabels:
xm-.nx.sEK4.B.__65m8_x: 29_.-.Ms7_t.P_3..H..k9M86.9a_-0R1
sEK4.B.__65m8_x: 29_.-.Ms7_t.P_3..H..k9M86.9a_-0R1
namespaces:
- "380"
topologyKey: "381"
@ -664,6 +660,7 @@ spec:
schedulerName: "390"
securityContext:
fsGroup: 6347577485454457915
fsGroupChangePolicy: 勅跦Opwǩ曬逴褜1Ø
runAsGroup: -860974700141841896
runAsNonRoot: true
runAsUser: 7525448836100188460

View File

@ -1144,7 +1144,8 @@
"name": "358",
"value": "359"
}
]
],
"fsGroupChangePolicy": "勅跦Opwǩ曬逴褜1Ø"
},
"imagePullSecrets": [
{
@ -1161,7 +1162,7 @@
"matchExpressions": [
{
"key": "363",
"operator": "}潷ʒ胵輓Ɔȓ蹣ɐǛv+8Ƥ熪军g\u003e",
"operator": "8Ƥ熪军g\u003e郵[+",
"values": [
"364"
]
@ -1170,7 +1171,7 @@
"matchFields": [
{
"key": "365",
"operator": "偢ɇ卷荙JLĹ]佱¿\u003e犵殇ŕ-Ɂ圯W",
"operator": "荙JLĹ]佱¿\u003e犵殇ŕ",
"values": [
"366"
]
@ -1181,12 +1182,12 @@
},
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": -1418092595,
"weight": -979584143,
"preference": {
"matchExpressions": [
{
"key": "367",
"operator": "唊#v",
"operator": "W:ĸ輦唊#v",
"values": [
"368"
]
@ -1195,7 +1196,7 @@
"matchFields": [
{
"key": "369",
"operator": "埄趛",
"operator": "q埄趛屡ʁ岼昕ĬÇó藢xɮĵȑ6L*",
"values": [
"370"
]
@ -1210,15 +1211,12 @@
{
"labelSelector": {
"matchLabels": {
"zo--4-1-2s39--6---fv--m-8--72-bca4m56au3f---tx-8----2d-4u-d7sn/48Y.q.0-_1-F.h-__k_K5._..O_.J_-G_--V-42E_--o90G_A6": "9_.5vN5.25aWx.2aM214_.-N_g-..__._____K_g1cXfr.4_.-_-_-...1y"
"A_k_K5._..O_.J_-G_--V-42E_--o90G_A4..-L..L": "0N_N.O30-_u._-2hT.-z-._7-5lL..-_--.VEa-_gn.8-c.C3_F._oX-9"
},
"matchExpressions": [
{
"key": "8x.2K_2qu_0S-CqW.D_8--21kF-c026.-iTl.1-.T",
"operator": "NotIn",
"values": [
"H.I3.__-.u"
]
"key": "ao26--26-hs5-jedse.7vc0260ni-l11q5--uk5mj-94-8134i5kq/aWx.2aM214_.-N_g-..__._____K_g1cXfr.4_.-_-_-...1py_8-3..s._.x2",
"operator": "Exists"
}
]
},
@ -1230,19 +1228,16 @@
],
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": -819013491,
"weight": -1058923098,
"podAffinityTerm": {
"labelSelector": {
"matchLabels": {
"x_-a__0-8-.M-.-.-8v-J1zET_..3dCv3j._.-_pP__up2": "Ns-o779._-k5"
"3-----995----5sumf7ef8jzv4-9-30.rt--6g1-2-73m-e46-r-g63--gt1--6mx-r-927--m6-g/J0-8-.M-.-.-8v-J1zET_..3dCv3j._.-_pP__up.2L_s-7": "m.__G-8...__.Q_c8.G.b_9_1o.w_aI._1"
},
"matchExpressions": [
{
"key": "9d4i-m7---k8235--8--c83-4b-9-1o8w-4/4csh-3--Z1Tvw39F_C-rtSY.g._2F7.-_e..Or_-.3OHgt._U.-x_rC9.D",
"operator": "NotIn",
"values": [
"G31-_I-A-_3bz._8M0U1_-__.71-_-9_.X"
]
"key": "3--j2---2--82--cj-1-s--op34-yw/A-_3bz._M",
"operator": "Exists"
}
]
},
@ -1259,7 +1254,7 @@
{
"labelSelector": {
"matchLabels": {
"xm-.nx.sEK4.B.__65m8_x": "29_.-.Ms7_t.P_3..H..k9M86.9a_-0R1"
"sEK4.B.__65m8_x": "29_.-.Ms7_t.P_3..H..k9M86.9a_-0R1"
},
"matchExpressions": [
{

View File

@ -67,25 +67,25 @@ template:
- preference:
matchExpressions:
- key: "367"
operator: 唊#v
operator: W:ĸ輦唊#v
values:
- "368"
matchFields:
- key: "369"
operator: 埄趛
operator: q埄趛屡ʁ岼昕ĬÇó藢xɮĵȑ6L*
values:
- "370"
weight: -1418092595
weight: -979584143
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: "363"
operator: '}潷ʒ胵輓Ɔȓ蹣ɐǛv+8Ƥ熪军g>'
operator: 8Ƥ熪军g>郵[+
values:
- "364"
matchFields:
- key: "365"
operator: 偢ɇ卷荙JLĹ]佱¿>犵殇ŕ-Ɂ圯W
operator: 荙JLĹ]佱¿>犵殇ŕ
values:
- "366"
podAffinity:
@ -93,25 +93,21 @@ template:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: 9d4i-m7---k8235--8--c83-4b-9-1o8w-4/4csh-3--Z1Tvw39F_C-rtSY.g._2F7.-_e..Or_-.3OHgt._U.-x_rC9.D
operator: NotIn
values:
- G31-_I-A-_3bz._8M0U1_-__.71-_-9_.X
- key: 3--j2---2--82--cj-1-s--op34-yw/A-_3bz._M
operator: Exists
matchLabels:
x_-a__0-8-.M-.-.-8v-J1zET_..3dCv3j._.-_pP__up2: Ns-o779._-k5
3-----995----5sumf7ef8jzv4-9-30.rt--6g1-2-73m-e46-r-g63--gt1--6mx-r-927--m6-g/J0-8-.M-.-.-8v-J1zET_..3dCv3j._.-_pP__up.2L_s-7: m.__G-8...__.Q_c8.G.b_9_1o.w_aI._1
namespaces:
- "385"
topologyKey: "386"
weight: -819013491
weight: -1058923098
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: 8x.2K_2qu_0S-CqW.D_8--21kF-c026.-iTl.1-.T
operator: NotIn
values:
- H.I3.__-.u
- key: ao26--26-hs5-jedse.7vc0260ni-l11q5--uk5mj-94-8134i5kq/aWx.2aM214_.-N_g-..__._____K_g1cXfr.4_.-_-_-...1py_8-3..s._.x2
operator: Exists
matchLabels:
zo--4-1-2s39--6---fv--m-8--72-bca4m56au3f---tx-8----2d-4u-d7sn/48Y.q.0-_1-F.h-__k_K5._..O_.J_-G_--V-42E_--o90G_A6: 9_.5vN5.25aWx.2aM214_.-N_g-..__._____K_g1cXfr.4_.-_-_-...1y
A_k_K5._..O_.J_-G_--V-42E_--o90G_A4..-L..L: 0N_N.O30-_u._-2hT.-z-._7-5lL..-_--.VEa-_gn.8-c.C3_F._oX-9
namespaces:
- "377"
topologyKey: "378"
@ -136,7 +132,7 @@ template:
- key: v8_.O_..8n.--z_-..6W.K
operator: Exists
matchLabels:
xm-.nx.sEK4.B.__65m8_x: 29_.-.Ms7_t.P_3..H..k9M86.9a_-0R1
sEK4.B.__65m8_x: 29_.-.Ms7_t.P_3..H..k9M86.9a_-0R1
namespaces:
- "393"
topologyKey: "394"
@ -697,6 +693,7 @@ template:
schedulerName: "403"
securityContext:
fsGroup: 6347577485454457915
fsGroupChangePolicy: 勅跦Opwǩ曬逴褜1Ø
runAsGroup: -860974700141841896
runAsNonRoot: true
runAsUser: 7525448836100188460

View File

@ -1145,7 +1145,8 @@
"name": "366",
"value": "367"
}
]
],
"fsGroupChangePolicy": ""
},
"imagePullSecrets": [
{
@ -1162,7 +1163,7 @@
"matchExpressions": [
{
"key": "371",
"operator": "ɇ荙JLĹ]佱¿\u003e犵殇ŕ-Ɂ",
"operator": "卷",
"values": [
"372"
]
@ -1171,7 +1172,7 @@
"matchFields": [
{
"key": "373",
"operator": "t叀碧闳ȩr嚧ʣq埄",
"operator": "+",
"values": [
"374"
]
@ -1182,12 +1183,12 @@
},
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": -379385405,
"weight": 1724958480,
"preference": {
"matchExpressions": [
{
"key": "375",
"operator": "岼昕ĬÇó藢xɮĵȑ6L*Z",
"operator": "ljVX1虊谇j爻ƙt叀碧",
"values": [
"376"
]
@ -1196,7 +1197,7 @@
"matchFields": [
{
"key": "377",
"operator": "绤fʀļ腩墺Ò媁荭g",
"operator": "#v铿ʩȂ4ē鐭#嬀ơŸ8T 苧y",
"values": [
"378"
]
@ -1211,11 +1212,11 @@
{
"labelSelector": {
"matchLabels": {
"6-d42--clo90---461v-07r--0---8-30i-uo/9DF": "AH-Q.GM72_-c-.-.6--3-__t"
"i_18_...E.-2o_-.N.9D-F45eJK7Q5-R4_F": "7M.JP_oA_41"
},
"matchExpressions": [
{
"key": "8SUGP.-_.uB-.--.gb_2_-8--z",
"key": "b25a-x12a-214-3s--gg93--5------g/L6_EU--AH-Q.GM72_-c-.-.6--3-___t-Z8SUGP.-_.uB-.--.gb_2o",
"operator": "Exists"
}
]
@ -1228,16 +1229,16 @@
],
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": 1258370227,
"weight": 409029209,
"podAffinityTerm": {
"labelSelector": {
"matchLabels": {
"N-_-vv-Q2q7": "3.4....-h._.GgT7_7P"
"h._.GgT7_7B_D-..-.k4u-zA_--8": "6"
},
"matchExpressions": [
{
"key": "ftie4-7--gm4p-8y-9-te858----38----r-m-a--q3980c7fp/26GA26C-s.Nj-d-4_4--.-_Z4.LA3HVG93_._.I3.__-.0-z_z0sn_.x",
"operator": "DoesNotExist"
"key": "Nj-d-4_4--.-_Z4.LA3HVG9G",
"operator": "Exists"
}
]
},
@ -1254,12 +1255,12 @@
{
"labelSelector": {
"matchLabels": {
"927--m6-k8-c2---2etfh41ca-z-5g2wco28---f-53-x1y-8---3----7/mf.-f.-zv._._.5-H.T.-.-.T-V_D_0-K_A-_9_Z_C..7o_x32": "0U1_-__.71-_-9_._X-D---k..1Q7N"
"k.q6H_.--_---.M.U_-m.-P.yP9Se": "58LI__.8____rO-S-P_-...0c.-.p_3_J_SA995IKCR.s--f.-f.-v"
},
"matchExpressions": [
{
"key": "2I--2_9.v.--_.--4QQ.-s.H.Hu-k-_-0-T1mel--F......3_t_-l..-.DG7s",
"operator": "DoesNotExist"
"key": "mm6-k8-c2---2t.n--8--c83-4b-9-1o8w-a-6-31g-1/0-K_A-_9_Z_C..7o_x3..-.w",
"operator": "Exists"
}
]
},
@ -1271,18 +1272,18 @@
],
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": 1289969734,
"weight": -533093249,
"podAffinityTerm": {
"labelSelector": {
"matchLabels": {
"gr-y7nlp97v-0-1y-t3---2ga-v205p-26-l.p2-t--m-l80--5o1--cp6-5-x1---0w4rm0/f_ZN.-_--r.E__-.8_e_l2.._8s--7_3x_-J_.....7..--wO": ""
"r3po4-f/TS-jJ.Ys_Mop34_-y.8_38xm-.nx.sEK1": "x1.9_.-.M7"
},
"matchExpressions": [
{
"key": "8b-3-3b17cab-ppy5e--9p-61-2we16h--5-d-k-sm.2xv17r--32b-----4-670tfz-up3n/ov_Z--Zg-_Q",
"key": "37zzgy3-4----nf---3a-cgr6---r58-e-l203-8sln7-3x-b--550397801/1.k9M86.9a_-0R_.Z__v",
"operator": "NotIn",
"values": [
"0..KpiS.oK-.O--5-yp8q_s-L"
"0_1V4.-r-8S5--_7_-Zp_._.-miJ4x-_0_5-_.7F3p2_-_AmD-.0AP.-.Cc"
]
}
]
@ -1300,10 +1301,10 @@
"tolerations": [
{
"key": "412",
"operator": "}缫,",
"operator": "ù灹8緔Tj§E蓋",
"value": "413",
"effect": "ɉ愂",
"tolerationSeconds": 5005983565679986804
"effect": "ƫZɀȩ愉",
"tolerationSeconds": -1390311149947249535
}
],
"hostAliases": [
@ -1315,7 +1316,7 @@
}
],
"priorityClassName": "416",
"priority": 178156526,
"priority": -88455527,
"dnsConfig": {
"nameservers": [
"417"
@ -1332,30 +1333,30 @@
},
"readinessGates": [
{
"conditionType": "糮R(_âŔ獎$ƆJije檗"
"conditionType": "普闎Ť萃Q+駟à稨氙"
}
],
"runtimeClassName": "421",
"enableServiceLinks": true,
"preemptionPolicy": "ʜ_ȭwɵ糫武诰ð",
"preemptionPolicy": "\u003e",
"overhead": {
"娒Ġ滔xvŗÑ\"虆k遚釾ʼn{": "803"
"'o儿Ƭ銭u裡_": "986"
},
"topologySpreadConstraints": [
{
"maxSkew": -1531421126,
"maxSkew": -1676200318,
"topologyKey": "422",
"whenUnsatisfiable": "墘ȕûy\u003cvĝ線Ưȫ喆5O2.",
"whenUnsatisfiable": "唞鹚蝉茲ʛ饊ɣKIJW",
"labelSelector": {
"matchLabels": {
"7s4483-o--3f1p7--43nw-l-x18mtxb--kexr-1-o--g--1l8.bc-coa--y--4-1204wrb---1024g-5-3v9-9jcz9f-6-4g-z46--f2t-k/db-L7.-__-G_2kCpSY": "0"
"l-d-8o1-x-1wl----f31-0-2t3z-w5----7-z-63-z---5r-v-5-e-m8.o-20st4-7--i1-8miw-7a-2404/5y_AzOBW.9oE9_6.--v17r__.2bIZ___._6..tf-_u-3-_n0..KpS": "5.0"
},
"matchExpressions": [
{
"key": "vf3q-z-5z80n--t5--9-4-d2-22--i--40wv--in-870w--it6k47-7yd-y-3/hjO",
"key": "7s4483-o--3f1p7--43nw-l-x18mtxb--kexr-1-o--g--1l8.bc-coa--y--4-1204wrb---1024g-5-3v9-9jcz9f-6-4g-z46--f2t-k/db-L7.-__-G_2kCpSY",
"operator": "NotIn",
"values": [
"c.q.8_00.0_._.-_L-__bf_9_-C-PfNxG"
"9CqrN7_B__--v-3-BzO5z80n_Ht5W_._._-2M2._I-_P..w-W_-nE...-__--k"
]
}
]
@ -1366,16 +1367,16 @@
}
},
"status": {
"replicas": -1530496417,
"fullyLabeledReplicas": -1698525469,
"readyReplicas": -525943726,
"availableReplicas": -578926701,
"observedGeneration": 8034206547748752944,
"replicas": -580887468,
"fullyLabeledReplicas": 189301373,
"readyReplicas": -1235733921,
"availableReplicas": -1438616392,
"observedGeneration": 7696803627798560212,
"conditions": [
{
"type": "Î磣:mʂ渢pɉ驻(+昒ȼȈɍ颬灲",
"status": "\u003e堵zŕƧ钖孝0蛮xAǫ\u0026tŧK剛Ʀ",
"lastTransitionTime": "2837-10-14T23:23:27Z",
"type": "獰Ĉ癯頯aɴí(Ȟ9\"",
"status": "oǰ'źĄ栧焷蜪sÛ°",
"lastTransitionTime": "2129-09-06T04:28:43Z",
"reason": "429",
"message": "430"
}

View File

@ -72,25 +72,25 @@ spec:
- preference:
matchExpressions:
- key: "375"
operator: 岼昕ĬÇó藢xɮĵȑ6L*Z
operator: ljVX1虊谇j爻ƙt叀碧
values:
- "376"
matchFields:
- key: "377"
operator: 绤fʀļ腩墺Ò媁荭g
operator: '#v铿ʩȂ4ē鐭#嬀ơŸ8T 苧y'
values:
- "378"
weight: -379385405
weight: 1724958480
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: "371"
operator: ɇ荙JLĹ]佱¿>犵殇ŕ-Ɂ
operator:
values:
- "372"
matchFields:
- key: "373"
operator: t叀碧闳ȩr嚧ʣq埄
operator: +
values:
- "374"
podAffinity:
@ -98,21 +98,21 @@ spec:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: ftie4-7--gm4p-8y-9-te858----38----r-m-a--q3980c7fp/26GA26C-s.Nj-d-4_4--.-_Z4.LA3HVG93_._.I3.__-.0-z_z0sn_.x
operator: DoesNotExist
- key: Nj-d-4_4--.-_Z4.LA3HVG9G
operator: Exists
matchLabels:
N-_-vv-Q2q7: 3.4....-h._.GgT7_7P
h._.GgT7_7B_D-..-.k4u-zA_--8: "6"
namespaces:
- "393"
topologyKey: "394"
weight: 1258370227
weight: 409029209
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: 8SUGP.-_.uB-.--.gb_2_-8--z
- key: b25a-x12a-214-3s--gg93--5------g/L6_EU--AH-Q.GM72_-c-.-.6--3-___t-Z8SUGP.-_.uB-.--.gb_2o
operator: Exists
matchLabels:
6-d42--clo90---461v-07r--0---8-30i-uo/9DF: AH-Q.GM72_-c-.-.6--3-__t
i_18_...E.-2o_-.N.9D-F45eJK7Q5-R4_F: 7M.JP_oA_41
namespaces:
- "385"
topologyKey: "386"
@ -121,23 +121,23 @@ spec:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: 8b-3-3b17cab-ppy5e--9p-61-2we16h--5-d-k-sm.2xv17r--32b-----4-670tfz-up3n/ov_Z--Zg-_Q
- key: 37zzgy3-4----nf---3a-cgr6---r58-e-l203-8sln7-3x-b--550397801/1.k9M86.9a_-0R_.Z__v
operator: NotIn
values:
- 0..KpiS.oK-.O--5-yp8q_s-L
- 0_1V4.-r-8S5--_7_-Zp_._.-miJ4x-_0_5-_.7F3p2_-_AmD-.0AP.-.Cc
matchLabels:
gr-y7nlp97v-0-1y-t3---2ga-v205p-26-l.p2-t--m-l80--5o1--cp6-5-x1---0w4rm0/f_ZN.-_--r.E__-.8_e_l2.._8s--7_3x_-J_.....7..--wO: ""
r3po4-f/TS-jJ.Ys_Mop34_-y.8_38xm-.nx.sEK1: x1.9_.-.M7
namespaces:
- "409"
topologyKey: "410"
weight: 1289969734
weight: -533093249
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchExpressions:
- key: 2I--2_9.v.--_.--4QQ.-s.H.Hu-k-_-0-T1mel--F......3_t_-l..-.DG7s
operator: DoesNotExist
- key: mm6-k8-c2---2t.n--8--c83-4b-9-1o8w-a-6-31g-1/0-K_A-_9_Z_C..7o_x3..-.w
operator: Exists
matchLabels:
927--m6-k8-c2---2etfh41ca-z-5g2wco28---f-53-x1y-8---3----7/mf.-f.-zv._._.5-H.T.-.-.T-V_D_0-K_A-_9_Z_C..7o_x32: 0U1_-__.71-_-9_._X-D---k..1Q7N
k.q6H_.--_---.M.U_-m.-P.yP9Se: 58LI__.8____rO-S-P_-...0c.-.p_3_J_SA995IKCR.s--f.-f.-v
namespaces:
- "401"
topologyKey: "402"
@ -683,17 +683,18 @@ spec:
nodeSelector:
"354": "355"
overhead:
娒Ġ滔xvŗÑ"虆k遚釾ʼn{: "803"
preemptionPolicy: ʜ_ȭwɵ糫武诰ð
priority: 178156526
'''o儿Ƭ銭u裡_': "986"
preemptionPolicy: '>'
priority: -88455527
priorityClassName: "416"
readinessGates:
- conditionType: 糮R(_âŔ獎$ƆJije檗
- conditionType: 普闎Ť萃Q+駟à稨氙
restartPolicy: Ì
runtimeClassName: "421"
schedulerName: "411"
securityContext:
fsGroup: 7861919711004065015
fsGroupChangePolicy: ""
runAsGroup: -4105014793515441558
runAsNonRoot: true
runAsUser: -7059779929916534575
@ -717,23 +718,24 @@ spec:
subdomain: "370"
terminationGracePeriodSeconds: -860974700141841896
tolerations:
- effect: ɉ愂
- effect: ƫZɀȩ愉
key: "412"
operator: '}缫,'
tolerationSeconds: 5005983565679986804
operator: ù灹8緔Tj§E蓋
tolerationSeconds: -1390311149947249535
value: "413"
topologySpreadConstraints:
- labelSelector:
matchExpressions:
- key: vf3q-z-5z80n--t5--9-4-d2-22--i--40wv--in-870w--it6k47-7yd-y-3/hjO
- key: 7s4483-o--3f1p7--43nw-l-x18mtxb--kexr-1-o--g--1l8.bc-coa--y--4-1204wrb---1024g-5-3v9-9jcz9f-6-4g-z46--f2t-k/db-L7.-__-G_2kCpSY
operator: NotIn
values:
- c.q.8_00.0_._.-_L-__bf_9_-C-PfNxG
- 9CqrN7_B__--v-3-BzO5z80n_Ht5W_._._-2M2._I-_P..w-W_-nE...-__--k
matchLabels:
7s4483-o--3f1p7--43nw-l-x18mtxb--kexr-1-o--g--1l8.bc-coa--y--4-1204wrb---1024g-5-3v9-9jcz9f-6-4g-z46--f2t-k/db-L7.-__-G_2kCpSY: "0"
maxSkew: -1531421126
? l-d-8o1-x-1wl----f31-0-2t3z-w5----7-z-63-z---5r-v-5-e-m8.o-20st4-7--i1-8miw-7a-2404/5y_AzOBW.9oE9_6.--v17r__.2bIZ___._6..tf-_u-3-_n0..KpS
: "5.0"
maxSkew: -1676200318
topologyKey: "422"
whenUnsatisfiable: 墘ȕûy<vĝ線Ưȫ喆5O2.
whenUnsatisfiable: 唞鹚蝉茲ʛ饊ɣKIJW
volumes:
- awsElasticBlockStore:
fsType: "43"
@ -931,14 +933,14 @@ spec:
storagePolicyName: "99"
volumePath: "97"
status:
availableReplicas: -578926701
availableReplicas: -1438616392
conditions:
- lastTransitionTime: "2837-10-14T23:23:27Z"
- lastTransitionTime: "2129-09-06T04:28:43Z"
message: "430"
reason: "429"
status: '>堵zŕƧ钖孝0蛮xAǫ&tŧK剛Ʀ'
type: Î磣:mʂ渢pɉ驻(+昒ȼȈɍ颬灲
fullyLabeledReplicas: -1698525469
observedGeneration: 8034206547748752944
readyReplicas: -525943726
replicas: -1530496417
status: oǰ'źĄ栧焷蜪sÛ°
type: 獰Ĉ癯頯aɴí(Ȟ9"
fullyLabeledReplicas: 189301373
observedGeneration: 7696803627798560212
readyReplicas: -1235733921
replicas: -580887468

View File

@ -1158,7 +1158,8 @@
"name": "370",
"value": "371"
}
]
],
"fsGroupChangePolicy": "Ĕ\\ɢX鰨松/Ȁĵ鴁ĩȲǸ|蕎"
},
"imagePullSecrets": [
{
@ -1175,7 +1176,7 @@
"matchExpressions": [
{
"key": "375",
"operator": "Ã茓pȓɻ",
"operator": "Ǚ(",
"values": [
"376"
]
@ -1184,7 +1185,7 @@
"matchFields": [
{
"key": "377",
"operator": "",
"operator": "瘍Nʊ輔3璾ėȜv1b繐汚",
"values": [
"378"
]
@ -1195,12 +1196,12 @@
},
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": -767058113,
"weight": 702968201,
"preference": {
"matchExpressions": [
{
"key": "379",
"operator": "Ǹ|蕎'佉賞ǧĒz",
"operator": "n覦灲閈誹ʅ蕉",
"values": [
"380"
]
@ -1209,7 +1210,7 @@
"matchFields": [
{
"key": "381",
"operator": "ùfŭƽ",
"operator": "",
"values": [
"382"
]
@ -1224,11 +1225,11 @@
{
"labelSelector": {
"matchLabels": {
"h-up52--sjo7799-skj5--9/R_rm": "CR.s--f.-f.-zv._._.o"
"lm-e46-r-g63--gt1--6mx-r-927--m6-k8-c2---2etfh41ca-z-g/0p_3_J_SA995IKCR.s--f.-f.-zv._._.5-H.T.-.-.d": "b_9_1o.w_aI._31-_I-A-_3bz._8M0U1_-__.71-_-9_._X-D---k..1Q7._l.I"
},
"matchExpressions": [
{
"key": "K_A-_9_Z_C..7o_x3..-.8-Jp-94",
"key": "d----v8-4--558n1asz-r886x.2-cgr6---r58-e-l203-8sln7-x/k2_9.v.--_.--4QQ.-s.H.Hu-k-_-0-T1mel--F......3_t_l",
"operator": "DoesNotExist"
}
]
@ -1241,16 +1242,19 @@
],
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": 801902541,
"weight": 1195176401,
"podAffinityTerm": {
"labelSelector": {
"matchLabels": {
"bx1y-8---3----p-pdn--j2---2--82--cj-1-s--op34-yy28-38xmu5nx4s-4/4b_9_1o.w_I": "x-_.--4QQ.-s.H.Hu-k-_-0-T1mel--F......3_t_-l..-.DG7r-3.----.4"
"Bk.j._g-G-7--p9.-_0R.-_-3_L_2--_v2.5p_..Y-.wg_-b8a_68": "Q4_.84.K_-_0_..u.F.pq..--Q"
},
"matchExpressions": [
{
"key": "3---g-----p8-d5-8-m8i--k0j5g.zrrw8-5ts-7-bp/6E__-.8_e_2",
"operator": "DoesNotExist"
"key": "8b-3-3b17cab-ppy5e--9p-61-2we16h--5-d-k-sm.2xv17r--32b-----4-670tfz-up3n/ov_Z--Zg-_Q",
"operator": "NotIn",
"values": [
"0..KpiS.oK-.O--5-yp8q_s-L"
]
}
]
},
@ -1267,12 +1271,15 @@
{
"labelSelector": {
"matchLabels": {
"7F3p2_-_AmD-.0AP.1": "A--.F5_x.KNC0-.-m_0-m-6Sp_N-S..O-BZ..n"
"H__V.Vz_6.Hz_V_.r_v_._e_-78o_6Z..11_7pX_.-mLlx...w_j": "35.40Rw4gD.._.-x6db-L7.-__-G_2kCpS_1"
},
"matchExpressions": [
{
"key": "QZ9p_6.C.e",
"operator": "DoesNotExist"
"key": "d-XZ-x.__.Y_2-n_5023Xl-3Pw_-r7g",
"operator": "NotIn",
"values": [
"VT3sn-0_.i__a.O2G_J"
]
}
]
},
@ -1284,18 +1291,18 @@
],
"preferredDuringSchedulingIgnoredDuringExecution": [
{
"weight": -1851436166,
"weight": -1508769491,
"podAffinityTerm": {
"labelSelector": {
"matchLabels": {
"6V1-rU.___06.eqk5E_-4-.XH-.k.7.l_-W8o._xJ1-lFA_X3": "V0H2-.zHw.H__V.VT"
"3--rgvf3q-z-5z80n--t5--9-4-d2-22--i--40wv--in-870w--it6k47-7y1.h72n-cnp-75/c10KkQ-R_R.-.--4_IT_O__3.5h_XC0_-3": "20_._.-_L-__bf_9_-C-PfNx__-U_.Pn-W23-_.z_.._s--_F-BR-.h_-2-.F"
},
"matchExpressions": [
{
"key": "0--0g-q-22r4wye52y-h7463lyps4483-o--3f1p7--43nw-l-x8/Hz_V_.r_v_._e_-78o_6Z..11_7pX_.-mLlx...w_t-_.5.40Rw4D",
"operator": "NotIn",
"key": "p_.3--_9QW2JkU27_.-4T-I.-..K.-.0__sD.-e",
"operator": "In",
"values": [
"txb__-ex-_1_-ODgC_1-_V"
""
]
}
]
@ -1313,10 +1320,10 @@
"tolerations": [
{
"key": "416",
"operator": "堺ʣ",
"operator": "抄3昞财Î嘝zʄ!ć",
"value": "417",
"effect": "ŽɣB矗E¸",
"tolerationSeconds": -3532804738923434397
"effect": "緍k¢茤",
"tolerationSeconds": 4096844323391966153
}
],
"hostAliases": [
@ -1328,7 +1335,7 @@
}
],
"priorityClassName": "420",
"priority": -1852730577,
"priority": -1331113536,
"dnsConfig": {
"nameservers": [
"421"
@ -1345,31 +1352,28 @@
},
"readinessGates": [
{
"conditionType": "ź魊塾ɖ$rolȋɶuɋ5r儉ɩ柀ɨ鴅"
"conditionType": "mō6µɑ`ȗ\u003c8^翜"
}
],
"runtimeClassName": "425",
"enableServiceLinks": false,
"preemptionPolicy": "!ń1ċƹ|慼櫁色苆试揯遐",
"preemptionPolicy": "ý筞X",
"overhead": {
"4'ď曕椐敛n湙": "310"
"tHǽ÷閂抰^窄CǙķȈ": "97"
},
"topologySpreadConstraints": [
{
"maxSkew": -150478704,
"maxSkew": 1956797678,
"topologyKey": "426",
"whenUnsatisfiable": ";鹡鑓侅闍ŏŃŋŏ}ŀ",
"whenUnsatisfiable": "ƀ+瑏eCmAȥ睙",
"labelSelector": {
"matchLabels": {
"p2djmscp--ac8u23-k----26u5--72n-5.j8-0020-1-5/t5W_._._-2M2._i": "wvU"
"zp22o4a-w----11rqy3eo79p-f4r1--7p--053--suu--98.y1s8-j-6j4uvf1-sdg--132bid-7x0u738--7w-tdt-u-0--v/Ied-0-i_zZsY_o8t5Vl6_..7CY-_dc__G6N-_-0o.0C_gV.9_G5": "x_.4dwFbuvEf55Y2k.F-4"
},
"matchExpressions": [
{
"key": "4-4D-r.-F__r.oh..2_uGGP..-_N_h_4Hl-X0_2-W",
"operator": "In",
"values": [
"2-.s_6O-5_7_-0w_--5-_.3--_9QWJ"
]
"key": "88-i19.y-y7o-0-wq-zfdw73w0---4a18-f---ui6-48e-9-h4-w-qp25--7-n--kfk3g/1n1.--.._-x_4..u2-__3uM77U7._pz",
"operator": "DoesNotExist"
}
]
}
@ -1378,30 +1382,29 @@
}
},
"updateStrategy": {
"type": "荥ơ'禧ǵŊ)TiD¢ƿ媴h5",
"rollingUpdate": {
"maxUnavailable": 2
}
},
"minReadySeconds": 212061711,
"templateGeneration": 8027668557984017414,
"revisionHistoryLimit": -1979737528
"minReadySeconds": 997447044,
"templateGeneration": 117144906028254972,
"revisionHistoryLimit": 1606858231
},
"status": {
"currentNumberScheduled": -1707056814,
"numberMisscheduled": -424698834,
"desiredNumberScheduled": 407742062,
"numberReady": 2115789304,
"observedGeneration": -455484136992029462,
"updatedNumberScheduled": 1660081568,
"numberAvailable": 904244563,
"numberUnavailable": -1245696932,
"collisionCount": 2063260600,
"currentNumberScheduled": 1791868025,
"numberMisscheduled": -793692762,
"desiredNumberScheduled": -1152625369,
"numberReady": -1832836223,
"observedGeneration": 289178836781711257,
"updatedNumberScheduled": -1734448297,
"numberAvailable": -1757575936,
"numberUnavailable": -1151395185,
"collisionCount": 2022921268,
"conditions": [
{
"type": "Ƅ抄3昞财Î嘝zʄ",
"status": "\u003ec緍k¢茤Ƣǟ½灶du汎mō6µɑ",
"lastTransitionTime": "2196-03-13T21:02:11Z",
"type": "ɦ!",
"status": "(XEfê澙凋B/ü橚2ț",
"lastTransitionTime": "2733-02-09T15:36:31Z",
"reason": "433",
"message": "434"
}

Some files were not shown because too many files have changed in this diff Show More