kata-containers: CCv0: guest pull cannot work when agent policy is enabled
Description of problem
In CCv0 branch, I try to pull the image in the guest with agent policy check.
However, the agent seems to hang when it invokes pull_image function from image-rs to pull image in the guest.
$ git clone https://github.com/kata-containers/kata-containers.git -b CCv0
$ cd kata-containers/src/agent
$ make AGENT_POLICY=yes
Eventually, the pod creation timed out and failed, such as the following kata log:
level=debug msg="reading guest console" console-protocol=unix console-url=/run/vc/vm/1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b/console.sock name=containerd-shim-v2 pid=1669961 sandbox=1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b source=virtcontainers subsystem=sandbox vmconsole="{\"client_addr\":\"127.0.0.1:52118\",\"level\":\"info\",\"msg\":\"Received request.\",\"req_id\":14,\"req_method\":\"POST\",\"req_path\":\"/v1/data/agent_policy/CreateContainerRequest\",\"time\":\"2024-03-05T04:07:58Z\"}"
level=debug msg="reading guest console" console-protocol=unix console-url=/run/vc/vm/1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b/console.sock name=containerd-shim-v2 pid=1669961 sandbox=1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b source=virtcontainers subsystem=sandbox vmconsole="{\"client_addr\":\"127.0.0.1:52118\",\"level\":\"info\",\"msg\":\"Sent response.\",\"req_id\":14,\"req_method\":\"POST\",\"req_path\":\"/v1/data/agent_policy/CreateContainerRequest\",\"resp_bytes\":16,\"resp_duration\":1.241659,\"resp_status\":200,\"time\":\"2024-03-05T04:07:58Z\"}"
level=debug msg="reading guest console" console-protocol=unix console-url=/run/vc/vm/1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b/console.sock name=containerd-shim-v2 pid=1669961 sandbox=1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b source=virtcontainers subsystem=sandbox vmconsole="{\"msg\":\"rpc call from shim to agent: \\\"create_container\\\"\",\"level\":\"INFO\",\"ts\":\"2024-03-05T04:07:58.894149944Z\",\"version\":\"0.1.0\",\"subsystem\":\"rpc\",\"name\":\"kata-agent\",\"pid\":\"135\",\"source\":\"agent\"}"
level=debug msg="reading guest console" console-protocol=unix console-url=/run/vc/vm/1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b/console.sock name=containerd-shim-v2 pid=1669961 sandbox=1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b source=virtcontainers subsystem=sandbox vmconsole="{\"msg\":\"policy check: CreateContainerRequest\",\"level\":\"DEBG\",\"ts\":\"2024-03-05T04:07:58.894660728Z\",\"name\":\"kata-agent\",\"source\":\"agent\",\"version\":\"0.1.0\",\"subsystem\":\"rpc\",\"pid\":\"135\"}"
level=debug msg="reading guest console" console-protocol=unix console-url=/run/vc/vm/1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b/console.sock name=containerd-shim-v2 pid=1669961 sandbox=1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b source=virtcontainers subsystem=sandbox vmconsole="{\"msg\":\"receive createcontainer, spec: Spec { version: \\\"1.1.0-rc.1\\\", process: Some(Process { terminal: false, console_size: None, user: User { uid: 0, gid: 0, additional_gids: [0], username: \\\"\\\" }, args: [\\\"sh\\\"], env: [\\\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\\\", \\\"HOSTNAME=busybox-cc\\\", \\\"KUBERNETES_PORT=tcp://10.96.0.1:443\\\", \\\"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\\\", \\\"KUBERNETES_PORT_443_TCP_PROTO=tcp\\\", \\\"KUBERNETES_PORT_443_TCP_PORT=443\\\", \\\"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\\\", \\\"KUBERNETES_SERVICE_HOST=10.96.0.1\\\", \\\"KUBERNETES_SERVICE_PORT=443\\\", \\\"KUBERNETES_SERVICE_PORT_HTTPS=443\\\"], cwd: \\\"/\\\", capabilities: Some(LinuxCapabilities { bounding: [\\\"CAP_CHOWN\\\", \\\"CAP_DAC_OVERRIDE\\\", \\\"CAP_FSETID\\\", \\\"CAP_FOWNER\\\", \\\"CAP_MKNOD\\\", \\\"CAP_NET_RAW\\\", \\\"CAP_SETGID\\\", \\\"CAP_SETUID\\\", \\\"CAP_SETFCAP\\\", \\\"CAP_SETPCAP\\\", \\\"CAP_NET_BIND_SERVICE\\\", \\\"CAP_SYS_CHROOT\\\", \\\"CAP_KILL\\\", \\\"CAP_AUDIT_WRITE\\\"], effective: [\\\"CAP_CHOWN\\\", \\\"CAP_DAC_OVERRIDE\\\", \\\"CAP_FSETID\\\", \\\"CAP_FOWNER\\\", \\\"CAP_MKNOD\\\", \\\"CAP_NET_RAW\\\", \\\"CAP_SETGID\\\", \\\"CAP_SETUID\\\", \\\"CAP_SETFCAP\\\", \\\"CAP_SETPCAP\\\", \\\"CAP_NET_BIND_SERVICE\\\", \\\"CAP_SYS_CHROOT\\\", \\\"CAP_KILL\\\", \\\"CAP_AUDIT_WRITE\\\"], inheritable: [], permitted: [\\\"CAP_CHOWN\\\", \\\"CAP_DAC_OVERRIDE\\\", \\\"CAP_FSETID\\\", \\\"CAP_FOWNER\\\", \\\"CAP_MKNOD\\\", \\\"CAP_NET_RAW\\\", \\\"CAP_SETGID\\\", \\\"CAP_SETUID\\\", \\\"CAP_SETFCAP\\\", \\\"CAP_SETPCAP\\\", \\\"CAP_NET_BIND_SERVICE\\\", \\\"CAP_SYS_CHROOT\\\", \\\"CAP_KILL\\\", \\\"CAP_AUDIT_WRITE\\\"], ambient: [] }), rlimits: [], no_new_privileges: false, apparmor_profile: \\\"cri-containerd.apparmor.d\\\", oom_score_adj: Some(1000), selinux_label: \\\"\\\" }), root: Some(Root { path: \\\"/run/kata-containers/194c7587dc365a08f35167104d7555ec19b509ec82acc17a6559ba888857ea70/rootfs\\\", readonly: false }), hostname: \\\"\\\", mounts: [Mount { destination: \\\"/proc\\\", type: \\\"proc\\\", source: \\\"proc\\\", options: [\\\"nosuid\\\", \\\"noexec\\\", \\\"nodev\\\"] }, Mount { destination: \\\"/dev\\\", type: \\\"tmpfs\\\", source: \\\"tmpfs\\\", options: [\\\"nosuid\\\", \\\"strictatime\\\", \\\"mode=755\\\", \\\"size=65536k\\\"] }, Mount { destination: \\\"/dev/pts\\\", type: \\\"devpts\\\", source: \\\"devpts\\\", options: [\\\"nosuid\\\", \\\"noexec\\\", \\\"newinstance\\\", \\\"ptmxmode=0666\\\", \\\"mode=0620\\\", \\\"gid=5\\\"] }, Mount { destination: \\\"/dev/mqueue\\\", type: \\\"mqueue\\\", source: \\\"mqueue\\\", options: [\\\"nosuid\\\", \\\"noexec\\\", \\\"nodev\\\"] }, Mount { destination: \\\"/sys\\\", type: \\\"sysfs\\\", source: \\\"sysfs\\\", options: [\\\"nosuid\\\", \\\"noexec\\\", \\\"nodev\\\", \\\"ro\\\"] }, Mount { destination: \\\"/sys/fs/cgroup\\\", type: \\\"cgroup\\\", source: \\\"cgroup\\\", options: [\\\"nosuid\\\", \\\"noexec\\\", \\\"nodev\\\", \\\"relatime\\\", \\\"ro\\\"] }, Mount { destination: \\\"/etc/hosts\\\", type: \\\"bind\\\", source: \\\"/run/kata-containers/shared/containers/194c7587dc365a08f35167104d7555ec19b509ec82acc17a6559ba888857ea70-27393f9e77a12151-hosts\\\", options: [\\\"rbind\\\", \\\"rprivate\\\", \\\"rw\\\"] }, Mount { destination: \\\"/dev/termination-log\\\", type: \\\"bind\\\", source: \\\"/run/kata-containers/shared/containers/194c7587dc365a08f35167104d7555ec19b509ec82acc17a6559ba888857ea70-882b17c505a8366e-termination-log\\\", options: [\\\"rbind\\\", \\\"rprivate\\\", \\\"rw\\\"] }, Mount { destination: \\\"/etc/hostname\\\", type: \\\"bind\\\", source: \\\"/run/kata-containers/shared/containers/194c7587dc365a08f35167104d7555ec19b509ec82acc17a6559ba888857ea70-334c80c79120d104-hostname\\\", options: [\\\"rbind\\\", \\\"rprivate\\\", \\\"rw\\\"] }, Mount { destination: \\\"/etc/resolv.conf\\\", type: \\\"bind\\\", source: \\\"/run/kata-containers/shared/containers/194c7587dc365a08f35167104d7555ec19b509ec82acc17a6559ba888857ea70-18903b15f311dc84-resolv.conf\\\", options: [\\\"rbind\\\", \\\"rprivate\\\", \\\"rw\\\"] }, Mount { destination: \\\"/dev/shm\\\", type: \\\"bind\\\", source: \\\"/run/kata-containers/sandbox/shm\\\", options: [\\\"rbind\\\"] }, Mount { destination: \\\"/var/run/secrets/kubernetes.io/serviceaccount\\\", type: \\\"bind\\\", source: \\\"/run/kata-containers/shared/containers/194c7587dc365a08f35167104d7555ec19b509ec82acc17a6559ba888857ea70-af760f3db2d48c14-serviceaccount\\\", options: [\\\"rbind\\\", \\\"rprivate\\\", \\\"ro\\\"] }], hooks: None, annotations: {\\\"io.kubernetes.cri.sandbox-namespace\\\": \\\"default\\\", \\\"io.kubernetes.cri.sandbox-id\\\": \\\"1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b\\\", \\\"io.kubernetes.cri.container-type\\\": \\\"container\\\", \\\"io.kubernetes.cri.container-name\\\": \\\"busybox\\\", \\\"io.kubernetes.cri.image-name\\\": \\\"quay.io/prometheus/busybox:latest\\\", \\\"io.katacontainers.pkg.oci.bundle_path\\\": \\\"/run/containerd/io.containerd.runtime.v2.task/k8s.io/194c7587dc365a08f35167104d7555ec19b509ec82acc17a6559ba888857ea70\\\", \\\"io.kubernetes.cri.sandbox-uid\\\": \\\"5c188bb8-39d3-431b-b364-734d5bc90fac\\\", \\\"io.katacontainers.pkg.oci.container_type\\\": \\\"pod_container\\\", \\\"io.kubernetes.cri.sandbox-name\\\": \\\"busybox-cc\\\"}, linux: Some(Linux { uid_mappings: [], gid_mappings: [], sysctl: {}, resources: Some(LinuxResources { devices: [], memory: Some(LinuxMemory { limit: Some(0), reservation: Some(0), swap: Some(0), kernel: Some(0), kernel_tcp: Some(0), swappiness: Some(0), disable_oom_killer: Some(false) }), cpu: Some(LinuxCpu { shares: Some(2), quota: Some(0), period: Some(100000), realtime_runtime: Some(0), realtime_period: Some(0), cpus: \\\"\\\", mems: \\\"\\\" }), pids: None, block_io: None, hugepage_limits: [], network: None, rdma: {} }), cgroups_path: \\\"/kubepods/besteffort/pod5c188bb8-39d3-431b-b364-734d5bc90fac/194c7587dc365a08f35167104d7555ec19b509ec82acc17a6559ba888857ea70\\\", namespaces: [LinuxNamespace { type: \\\"ipc\\\", path: \\\"\\\" }, LinuxNamespace { type: \\\"uts\\\", path: \\\"\\\" }, LinuxNamespace { type: \\\"mount\\\", path: \\\"\\\" }], devices: [], seccomp: None, rootfs_propagation: \\\"\\\", masked_paths: [\\\"/proc/acpi\\\", \\\"/proc/kcore\\\", \\\"/proc/keys\\\", \\\"/proc/latency_stats\\\", \\\"/proc/timer_list\\\", \\\"/proc/timer_stats\\\", \\\"/proc/sched_debug\\\", \\\"/proc/scsi\\\", \\\"/sys/firmware\\\"], readonly_paths: [\\\"/proc/asound\\\", \\\"/proc/bus\\\", \\\"/proc/fs\\\", \\\"/proc/irq\\\", \\\"/proc/sys\\\", \\\"/proc/sysrq-trigger\\\"], mount_label: \\\"\\\", intel_rdt: None }), solaris: None, windows: None, vm: None }\",\"level\":\"INFO\",\"ts\":\"2024-03-05T04:07:58.897196348Z\",\"source\":\"agent\",\"name\":\"kata-agent\",\"subsystem\":\"rpc\",\"pid\":\"135\",\"version\":\"0.1.0\"}"
level=debug msg="reading guest console" console-protocol=unix console-url=/run/vc/vm/1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b/console.sock name=containerd-shim-v2 pid=1669961 sandbox=1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b source=virtcontainers subsystem=sandbox vmconsole="{\"msg\":\"receive createcontainer, storages: [Storage { driver: \\\"image_guest_pull\\\", driver_options: [\\\"image_guest_pull={\\\\\\\"metadata\\\\\\\":{\\\\\\\"containerd.io/snapshot/cri.layer-digest\\\\\\\":\\\\\\\"sha256:1617e25568b2231fdd0d5caff63b06f6f7738d8d961f031c80e47d35aaec9733\\\\\\\",\\\\\\\"containerd.io/snapshot/nydus-proxy-mode\\\\\\\":\\\\\\\"true\\\\\\\",\\\\\\\"io.katacontainers.pkg.oci.bundle_path\\\\\\\":\\\\\\\"/run/containerd/io.containerd.runtime.v2.task/k8s.io/194c7587dc365a08f35167104d7555ec19b509ec82acc17a6559ba888857ea70\\\\\\\",\\\\\\\"io.katacontainers.pkg.oci.container_type\\\\\\\":\\\\\\\"pod_container\\\\\\\",\\\\\\\"io.kubernetes.cri.container-name\\\\\\\":\\\\\\\"busybox\\\\\\\",\\\\\\\"io.kubernetes.cri.container-type\\\\\\\":\\\\\\\"container\\\\\\\",\\\\\\\"io.kubernetes.cri.image-name\\\\\\\":\\\\\\\"quay.io/prometheus/busybox:latest\\\\\\\",\\\\\\\"io.kubernetes.cri.sandbox-id\\\\\\\":\\\\\\\"1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b\\\\\\\",\\\\\\\"io.kubernetes.cri.sandbox-name\\\\\\\":\\\\\\\"busybox-cc\\\\\\\",\\\\\\\"io.kubernetes.cri.sandbox-namespace\\\\\\\":\\\\\\\"default\\\\\\\",\\\\\\\"io.kubernetes.cri.sandbox-uid\\\\\\\":\\\\\\\"5c188bb8-39d3-431b-b364-734d5bc90fac\\\\\\\"}}\\\"], source: \\\"quay.io/prometheus/busybox:latest\\\", fstype: \\\"overlay\\\", options: [], mount_point: \\\"/run/kata-containers/194c7587dc365a08f35167104d7555ec19b509ec82acc17a6559ba888857ea70/rootfs\\\", fs_group: MessageField(None), special_fields: SpecialFields { unknown_fields: UnknownFields { fields: None }, cached_size: CachedSize { size: 0 } } }]\",\"level\":\"INFO\",\"ts\":\"2024-03-05T04:07:58.89735592Z\",\"subsystem\":\"rpc\",\"pid\":\"135\",\"source\":\"agent\",\"version\":\"0.1.0\",\"name\":\"kata-agent\"}"
level=debug msg="reading guest console" console-protocol=unix console-url=/run/vc/vm/1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b/console.sock name=containerd-shim-v2 pid=1669961 sandbox=1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b source=virtcontainers subsystem=sandbox vmconsole="{\"msg\":\"image_pull_volume = ImagePullVolume { metadata: {\\\"io.kubernetes.cri.container-type\\\": \\\"container\\\", \\\"io.kubernetes.cri.sandbox-namespace\\\": \\\"default\\\", \\\"io.kubernetes.cri.sandbox-uid\\\": \\\"5c188bb8-39d3-431b-b364-734d5bc90fac\\\", \\\"containerd.io/snapshot/nydus-proxy-mode\\\": \\\"true\\\", \\\"io.katacontainers.pkg.oci.container_type\\\": \\\"pod_container\\\", \\\"io.kubernetes.cri.container-name\\\": \\\"busybox\\\", \\\"io.kubernetes.cri.sandbox-id\\\": \\\"1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b\\\", \\\"containerd.io/snapshot/cri.layer-digest\\\": \\\"sha256:1617e25568b2231fdd0d5caff63b06f6f7738d8d961f031c80e47d35aaec9733\\\", \\\"io.kubernetes.cri.sandbox-name\\\": \\\"busybox-cc\\\", \\\"io.kubernetes.cri.image-name\\\": \\\"quay.io/prometheus/busybox:latest\\\", \\\"io.katacontainers.pkg.oci.bundle_path\\\": \\\"/run/containerd/io.containerd.runtime.v2.task/k8s.io/194c7587dc365a08f35167104d7555ec19b509ec82acc17a6559ba888857ea70\\\"} }\",\"level\":\"DEBG\",\"ts\":\"2024-03-05T04:07:58.897522463Z\",\"storage-type\":\"image_guest_pull\",\"source\":\"agent\",\"name\":\"kata-agent\",\"pid\":\"135\",\"version\":\"0.1.0\",\"subsystem\":\"storage\"}"
level=debug msg="reading guest console" console-protocol=unix console-url=/run/vc/vm/1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b/console.sock name=containerd-shim-v2 pid=1669961 sandbox=1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b source=virtcontainers subsystem=sandbox vmconsole="{\"msg\":\"image_name = \\\"quay.io/prometheus/busybox:latest\\\"\",\"level\":\"DEBG\",\"ts\":\"2024-03-05T04:07:58.89760405Z\",\"name\":\"kata-agent\",\"pid\":\"135\",\"version\":\"0.1.0\",\"storage-type\":\"image_guest_pull\",\"subsystem\":\"storage\",\"source\":\"agent\"}"
level=debug msg="reading guest console" console-protocol=unix console-url=/run/vc/vm/1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b/console.sock name=containerd-shim-v2 pid=1669961 sandbox=1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b source=virtcontainers subsystem=sandbox vmconsole="{\"msg\":\"image metadata: {\\\"io.kubernetes.cri.container-type\\\": \\\"container\\\", \\\"io.kubernetes.cri.sandbox-namespace\\\": \\\"default\\\", \\\"io.kubernetes.cri.sandbox-uid\\\": \\\"5c188bb8-39d3-431b-b364-734d5bc90fac\\\", \\\"containerd.io/snapshot/nydus-proxy-mode\\\": \\\"true\\\", \\\"io.katacontainers.pkg.oci.container_type\\\": \\\"pod_container\\\", \\\"io.kubernetes.cri.container-name\\\": \\\"busybox\\\", \\\"io.kubernetes.cri.sandbox-id\\\": \\\"1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b\\\", \\\"containerd.io/snapshot/cri.layer-digest\\\": \\\"sha256:1617e25568b2231fdd0d5caff63b06f6f7738d8d961f031c80e47d35aaec9733\\\", \\\"io.kubernetes.cri.sandbox-name\\\": \\\"busybox-cc\\\", \\\"io.kubernetes.cri.image-name\\\": \\\"quay.io/prometheus/busybox:latest\\\", \\\"io.katacontainers.pkg.oci.bundle_path\\\": \\\"/run/containerd/io.containerd.runtime.v2.task/k8s.io/194c7587dc365a08f35167104d7555ec19b509ec82acc17a6559ba888857ea70\\\"}\",\"level\":\"INFO\",\"ts\":\"2024-03-05T04:07:58.897688577Z\",\"pid\":\"135\",\"version\":\"0.1.0\",\"subsystem\":\"cgroups\",\"name\":\"kata-agent\",\"source\":\"agent\"}"
level=debug msg="reading guest console" console-protocol=unix console-url=/run/vc/vm/1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b/console.sock name=containerd-shim-v2 pid=1669961 sandbox=1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b source=virtcontainers subsystem=sandbox vmconsole="{\"msg\":\"pull image \\\"194c7587dc365a08f35167104d7555ec19b509ec82acc17a6559ba888857ea70\\\", bundle path \\\"/run/kata-containers/194c7587dc365a08f35167104d7555ec19b509ec82acc17a6559ba888857ea70/images\\\"\",\"level\":\"INFO\",\"ts\":\"2024-03-05T04:07:58.897824481Z\",\"source\":\"agent\",\"name\":\"kata-agent\",\"subsystem\":\"cgroups\",\"pid\":\"135\",\"version\":\"0.1.0\"}"
level=debug msg="reading guest console" console-protocol=unix console-url=/run/vc/vm/1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b/console.sock name=containerd-shim-v2 pid=1669961 sandbox=1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b source=virtcontainers subsystem=sandbox vmconsole="{\"msg\":\"image_client.config.auth set to: true\",\"level\":\"INFO\",\"ts\":\"2024-03-05T04:07:58.897850711Z\",\"pid\":\"135\",\"subsystem\":\"cgroups\",\"source\":\"agent\",\"name\":\"kata-agent\",\"version\":\"0.1.0\"}"
level=debug msg="reading guest console" console-protocol=unix console-url=/run/vc/vm/1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b/console.sock name=containerd-shim-v2 pid=1669961 sandbox=1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b source=virtcontainers subsystem=sandbox vmconsole="{\"msg\":\"enable_signature_verification set to: false\",\"level\":\"INFO\",\"ts\":\"2024-03-05T04:07:58.897919071Z\",\"subsystem\":\"cgroups\",\"source\":\"agent\",\"name\":\"kata-agent\",\"pid\":\"135\",\"version\":\"0.1.0\"}"
level=error msg="container create failed" container=e1ae3647be7ff9070c6d6924e88eff09ee8fe51ccc0803dfe8916b7e468321f8 error="rpc error: code = DeadlineExceeded desc = timeout" name=containerd-shim-v2 pid=1669961 sandbox=1f50dbf49b15aff81c8ea9ddc72a3baaca03d2b8f10b9b67331275aa110aee8b source=virtcontainers subsystem=container
About this issue
- Original URL
- State: closed
- Created 4 months ago
- Comments: 16 (12 by maintainers)
Commits related to this issue
- agent: set https_proxy/no_proxy before initializing agent policy When the https_proxy/no_proxy settings are configured alongside agent-policy enabled, the process of pulling image in the guest will h... — committed to ChengyuZhu6/kata-containers by ChengyuZhu6 3 months ago
- agent: set https_proxy/no_proxy before initializing agent policy When the https_proxy/no_proxy settings are configured alongside agent-policy enabled, the process of pulling image in the guest will h... — committed to ChengyuZhu6/kata-containers by ChengyuZhu6 3 months ago
- agent: set https_proxy/no_proxy before initializing agent policy When the https_proxy/no_proxy settings are configured alongside agent-policy enabled, the process of pulling image in the guest will h... — committed to ChengyuZhu6/kata-containers by ChengyuZhu6 3 months ago
- agent: set https_proxy/no_proxy before initializing agent policy When the https_proxy/no_proxy settings are configured alongside agent-policy enabled, the process of pulling image in the guest will h... — committed to ChengyuZhu6/kata-containers by ChengyuZhu6 3 months ago
- agent: set https_proxy/no_proxy before initializing agent policy When the https_proxy/no_proxy settings are configured alongside agent-policy enabled, the process of pulling image in the guest will h... — committed to ChengyuZhu6/kata-containers by ChengyuZhu6 3 months ago
- agent: set https_proxy/no_proxy before initializing agent policy When the https_proxy/no_proxy settings are configured alongside agent-policy enabled, the process of pulling image in the guest will h... — committed to ChengyuZhu6/kata-containers by ChengyuZhu6 3 months ago
- agent: set https_proxy/no_proxy before initializing agent policy When the https_proxy/no_proxy settings are configured alongside agent-policy enabled, the process of pulling image in the guest will h... — committed to ChengyuZhu6/kata-containers by ChengyuZhu6 3 months ago
- agent: set https_proxy/no_proxy before initializing agent policy When the https_proxy/no_proxy settings are configured alongside agent-policy enabled, the process of pulling image in the guest will h... — committed to ChengyuZhu6/kata-containers by ChengyuZhu6 3 months ago
- agent: set https_proxy/no_proxy before initializing agent policy When the https_proxy/no_proxy settings are configured alongside agent-policy enabled, the process of pulling image in the guest will h... — committed to ChengyuZhu6/kata-containers by ChengyuZhu6 3 months ago
- agent: set https_proxy/no_proxy before initializing agent policy When the https_proxy/no_proxy settings are configured alongside agent-policy enabled, the process of pulling image in the guest will h... — committed to ChengyuZhu6/kata-containers by ChengyuZhu6 3 months ago
- agent: set https_proxy/no_proxy before initializing agent policy When the https_proxy/no_proxy settings are configured alongside agent-policy enabled, the process of pulling image in the guest will h... — committed to ChengyuZhu6/kata-containers by ChengyuZhu6 3 months ago
- agent: set https_proxy/no_proxy before initializing agent policy When the https_proxy/no_proxy settings are configured alongside agent-policy enabled, the process of pulling image in the guest will h... — committed to ChengyuZhu6/kata-containers by ChengyuZhu6 3 months ago
- agent: set https_proxy/no_proxy before initializing agent policy When the https_proxy/no_proxy settings are configured alongside agent-policy enabled, the process of pulling image in the guest will h... — committed to ChengyuZhu6/kata-containers by ChengyuZhu6 3 months ago
- agent: set https_proxy/no_proxy before initializing agent policy When the https_proxy/no_proxy settings are configured alongside agent-policy enabled, the process of pulling image in the guest will h... — committed to ChengyuZhu6/kata-containers by ChengyuZhu6 3 months ago
- agent: set https_proxy/no_proxy before initializing agent policy When the https_proxy/no_proxy settings are configured alongside agent-policy enabled, the process of pulling image in the guest will h... — committed to zvonkok/kata-containers by ChengyuZhu6 3 months ago
- agent: set https_proxy/no_proxy before initializing agent policy When the https_proxy/no_proxy settings are configured alongside agent-policy enabled, the process of pulling image in the guest will h... — committed to zvonkok/kata-containers by ChengyuZhu6 3 months ago
Thanks a lot. That’s very helpful for me.
sorry, there is something wrong with my cluster, I will rebuild it asap. and share the log with you