snyk-container-monitor ○ success
⏱
Duration: 33s
⏳
Queued: 0s
📁
Stage: test
🖥
Runner: linux-aws-1
Average Duration
53s
This job: 33s
Failure Rate
3.0%
last 30 days
External Links
▶
Job Execution Phases
💡 Tip: Click on any phase bar to jump to that section in the log below
▶
Job Analysis
Job Status: Passed
Status: Job passed successfully
▶
Full Job Log
146 lines
Match - of 0
1
22:40:00
Running with gitlab-runner 18.9.0 (07e534ba)
2
22:40:00
on gitlab-runner-linux-1-746bdd58fd-8v6sn wRxjPbsJX, system ID: r_oFqP9F52TRh2
3
22:40:00
feature flags: FF_USE_FASTZIP:true, FF_USE_NEW_BASH_EVAL_STRATEGY:true, FF_USE_DYNAMIC_TRACE_FORCE_SEND_INTERVAL:true, FF_SCRIPT_SECTIONS:true, FF_USE_ADVANCED_POD_SPEC_CONFIGURATION:true, FF_PRINT_POD_EVENTS:true, FF_USE_DUMB_INIT_WITH_KUBERNETES_EXECUTOR:true, FF_LOG_IMAGES_CONFIGURED_FOR_JOB:true, FF_CLEAN_UP_FAILED_CACHE_EXTRACT:true, FF_GIT_URLS_WITHOUT_TOKENS:true, FF_WAIT_FOR_POD_TO_BE_REACHABLE:true, FF_USE_FLEETING_ACQUIRE_HEARTBEATS:true, FF_USE_JOB_ROUTER:true
4
22:40:00
Resolving secrets
5
22:40:00
section_start:1778107200:prepare_executor
6
22:40:00
+Preparing the "kubernetes" executor
7
22:40:00
Using Kubernetes namespace: gitlab-runner
8
22:40:00
Using Kubernetes executor with image registry.scandit.com/dockerfiles/snyk:ubuntu@sha256:980f0a2ea9c35afe7e5bee860ec61ff923eaad5dfcfbba0c143ec0f3e342c6f3 ...
9
22:40:00
Using attach strategy to execute scripts...
10
22:40:00
Using effective pull policy of [Always] for container init-permissions
11
22:40:00
Using effective pull policy of [Always] for container build
12
22:40:00
Using effective pull policy of [Always] for container helper
13
22:40:00
section_end:1778107200:prepare_executor
14
22:40:00
+section_start:1778107200:prepare_script
15
22:40:00
+Preparing environment
16
22:40:00
Using FF_USE_POD_ACTIVE_DEADLINE_SECONDS, the Pod activeDeadlineSeconds will be set to the job timeout: 1h0m0s...
17
22:40:00
WARNING: Advanced Pod Spec configuration enabled, merging the provided PodSpec to the generated one. This is a beta feature and is subject to change. Feedback is collected in this issue: https://gitlab.com/gitlab-org/gitlab-runner/-/issues/29659 ...
18
22:40:01
Subscribing to Kubernetes Pod events...
19
22:40:01
Type Reason Message
20
22:40:01
Normal Scheduled Successfully assigned gitlab-runner/runner-wrxjpbsjx-project-621-concurrent-2-hzesfttq to ip-10-0-24-152.eu-central-1.compute.internal
21
22:40:01
Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
22
22:40:01
Normal Created Created container: init-permissions
23
22:40:01
Normal Started Started container init-permissions
24
22:40:02
Normal Pulling Pulling image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/snyk@sha256:980f0a2ea9c35afe7e5bee860ec61ff923eaad5dfcfbba0c143ec0f3e342c6f3"
25
22:40:04
Normal Pulled Successfully pulled image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/snyk@sha256:980f0a2ea9c35afe7e5bee860ec61ff923eaad5dfcfbba0c143ec0f3e342c6f3" in 1.854s (1.854s including waiting). Image size: 123994716 bytes.
26
22:40:04
Normal Created Created container: build
27
22:40:04
Normal Started Started container build
28
22:40:04
Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
29
22:40:04
Normal Created Created container: helper
30
22:40:04
Normal Started Started container helper
31
22:40:08
Running on runner-wrxjpbsjx-project-621-concurrent-2-hzesfttq via gitlab-runner-linux-1-746bdd58fd-8v6sn...
32
22:40:08
33
22:40:08
section_end:1778107208:prepare_script
34
22:40:08
+section_start:1778107208:get_sources
35
22:40:08
+Getting source from Git repository
36
22:40:08
Gitaly correlation ID: 01KQZQ5CK9F144MEMPV9Q743M5
37
22:40:08
Fetching changes with git depth set to 50...
38
22:40:08
Initialized empty Git repository in /build/internal/gitlab-templates/.git/
39
22:40:08
Created fresh repository.
40
22:40:09
Checking out b527f653 as detached HEAD (ref is master)...
41
22:40:09
42
22:40:09
Skipping Git submodules setup
43
22:40:09
44
22:40:09
section_end:1778107209:get_sources
45
22:40:09
+section_start:1778107209:step_script
46
22:40:09
+Executing "step_script" stage of the job script
47
22:40:10
section_start:1778107209:section_pre_build_script_0[hide_duration=true,collapsed=true]
$ function cleanup {
48
22:40:10
rv=$?
49
22:40:10
if [ $rv -ne 0 ]; then
50
22:40:10
echo ""
51
22:40:10
echo " Failure Cause Analysis might help, please open this link:"
52
22:40:10
echo " https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
53
22:40:10
echo ""
54
22:40:10
fi
55
22:40:10
echo ""
56
22:40:10
echo "Scout Analysis: https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
57
22:40:10
echo ""
58
22:40:10
echo ""
59
22:40:10
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=${EPOCHSECONDS}000"
60
22:40:10
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=${EPOCHSECONDS}000"
61
22:40:10
echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=${EPOCHSECONDS}000"
62
22:40:10
echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
63
22:40:10
echo ""
64
22:40:10
exit $rv
65
22:40:10
}
66
22:40:10
trap cleanup EXIT
67
22:40:10
echo "INFO: This is the CI job pre_build_script"
68
22:40:10
echo "INFO: It's defined in the backend/infra/aws repo."
69
22:40:10
echo "INFO: These additional Scandit variables are available to you:"
70
22:40:10
echo " SC_K8S_NODE_NAME: $SC_K8S_NODE_NAME"
71
22:40:10
echo " SC_K8S_IMAGE_ID: $SC_K8S_IMAGE_ID"
72
22:40:10
echo " SC_K8S_KYVERNO_PATCHES: |"
73
22:40:10
echo "$SC_K8S_KYVERNO_PATCHES" | sed 's/^/ /'
74
22:40:10
echo "cpu (r/l): ${SC_K8S_REQUESTS_CPU}/${SC_K8S_LIMITS_CPU}"
75
22:40:10
if command -v numfmt >/dev/null 2>&1; then
76
22:40:10
echo "memory (r/l): $(numfmt --to=iec --suffix=B $SC_K8S_REQUESTS_MEMORY)/$(numfmt --to=iec --suffix=B $SC_K8S_LIMITS_MEMORY)"
77
22:40:10
else
78
22:40:10
echo "memory (r/l): ${SC_K8S_REQUESTS_MEMORY}/${SC_K8S_LIMITS_MEMORY}"
79
22:40:10
fi
80
22:40:10
__start_time=${EPOCHSECONDS}
81
22:40:10
echo ""
82
22:40:10
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=now"
83
22:40:10
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=now"
84
22:40:10
echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=now"
85
22:40:10
echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
86
22:40:10
echo ""
87
22:40:10
echo "Setting up credentials for Gitlab Python registries"
88
22:40:10
mkdir -p ~
89
22:40:10
echo "machine gitlab.scandit.com" > ~/.netrc
90
22:40:10
echo "login gitlab-ci-token" >> ~/.netrc
91
22:40:10
echo "password ${CI_JOB_TOKEN}" >> ~/.netrc
92
22:40:10
chmod 600 ~/.netrc
93
22:40:10
if command -v git &> /dev/null && [ "$(id -u)" -ne 0 ]; then
94
22:40:10
git config --global --add safe.directory $CI_PROJECT_DIR
95
22:40:10
fi
96
22:40:10
# Sonarqube server is running on the same cluster. Use internal address
97
22:40:10
export SONAR_HOST_URL="http://sonarqube.sonarqube.svc.cluster.local:9000"
98
22:40:10
section_end:1778107209:section_pre_build_script_0
99
22:40:10
INFO: This is the CI job pre_build_script
100
22:40:10
INFO: It's defined in the backend/infra/aws repo.
101
22:40:10
INFO: These additional Scandit variables are available to you:
102
22:40:10
SC_K8S_NODE_NAME: ip-10-0-24-152.eu-central-1.compute.internal
103
22:40:10
SC_K8S_IMAGE_ID:
104
22:40:10
SC_K8S_KYVERNO_PATCHES: |
105
22:40:10
106
22:40:10
cpu (r/l): 1/4
107
22:40:10
memory (r/l): 1.0GB/16GB
108
22:40:10
109
22:40:10
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-24-152.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-2-hzesfttq&var-resolution=15&from=1778107209000&to=now
110
22:40:10
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-24-152.eu-central-1.compute.internal&var-resolution=15s&from=1778107209000&to=now
111
22:40:10
Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1582489&var-filters=CI_JOB_ID|=|54539369&sortOrder=Ascending&from=1778107209000&to=now
112
22:40:10
Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=2026-04-29~2026-05-13&job_name=snyk-container-monitor&project=internal/gitlab-templates
113
22:40:10
114
22:40:10
Setting up credentials for Gitlab Python registries
115
22:40:10
$ test -n "${SNYK_TOKEN}" || (echo "No SNYK_TOKEN defined. You have to provide a valid token for accessing Snyk."; false)
116
22:40:10
$ test -n "${IMAGE_URL}" || (echo "No IMAGE_URL defined. You have to provide a valid image for container scanner."; false)
117
22:40:10
$ echo "This job scans the given image, determines the software installed and makes a snapshot of it to snyk.io server."
118
22:40:10
This job scans the given image, determines the software installed and makes a snapshot of it to snyk.io server.
119
22:40:10
$ echo "Running 'snyk container monitor' on image $IMAGE_URL."
120
22:40:10
Running 'snyk container monitor' on image registry.scandit.com/internal/gitlab-templates/python:3.12.
121
22:40:10
$ snyk container monitor ${IMAGE_URL} --file=${DOCKERFILE_PATH} --exclude-base-image-vulns --exclude-app-vulns --policy-path=${SNYK_POLICY_PATH} --org=${SNYK_ORG} ${SNYK_EXTRA_PARAMETERS}
122
22:40:32
123
22:40:32
Monitoring registry.scandit.com/internal/gitlab-templates/python:3.12 (docker-image|registry.scandit.com/internal/gitlab-templates/python)...
124
22:40:32
125
22:40:32
Explore this snapshot at https://app.snyk.io/org/scandit-internal/project/c1f2e1f2-5df8-4ee1-bb92-12720868582b/history/2efd9a32-c0f3-45d5-b159-a0f4cc97be78
126
22:40:32
127
22:40:32
Notifications about newly disclosed issues related to these dependencies will be emailed to you.
128
22:40:32
129
22:40:32
130
22:40:32
Scout Analysis: https://scout.scandit.io/analysis/projects/621/jobs/54539369
131
22:40:32
132
22:40:32
133
22:40:32
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-24-152.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-2-hzesfttq&var-resolution=15&from=1778107209000&to=1778107232000
134
22:40:32
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-24-152.eu-central-1.compute.internal&var-resolution=15s&from=1778107209000&to=1778107232000
135
22:40:32
Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1582489&var-filters=CI_JOB_ID|=|54539369&sortOrder=Ascending&from=1778107209000&to=1778107232000
136
22:40:32
Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=2026-04-29~2026-05-13&job_name=snyk-container-monitor&project=internal/gitlab-templates
137
22:40:32
138
22:40:32
139
22:40:32
section_end:1778107232:step_script
140
22:40:32
+section_start:1778107232:cleanup_file_variables
141
22:40:32
+Cleaning up project directory and file based variables
142
22:40:33
143
22:40:33
section_end:1778107233:cleanup_file_variables
144
22:40:33
+
145
22:40:33
Job succeeded
146