From 2aca302ab54f31790bcdc808213c12fbe24f9916 Mon Sep 17 00:00:00 2001 From: Prathamesh Lohakare <49603432+theyashl@users.noreply.github.com> Date: Tue, 17 Mar 2026 13:16:45 +0530 Subject: [PATCH] remove commands used from report --- .../aws-cloudwatch-overused-ec2/runbook.robot | 1 - .../azure-loadbalancer-triage/runbook.robot | 1 - .../runbook.robot | 3 --- .../runbook.robot | 2 -- codebundles/curl-http-ok/runbook.robot | 1 - codebundles/dns-health/runbook.robot | 5 ---- .../gcloud-log-inspection/runbook.robot | 1 - codebundles/gh-actions-health/runbook.robot | 7 ------ .../k8s-app-troubleshoot/runbook.robot | 2 -- .../k8s-daemonset-healthcheck/runbook.robot | 9 -------- codebundles/k8s-deployment-ops/runbook.robot | 23 ------------------- codebundles/k8s-image-check/runbook.robot | 4 ---- .../k8s-ingress-gce-healthcheck/runbook.robot | 4 ---- .../k8s-ingress-healthcheck/runbook.robot | 2 -- .../k8s-jenkins-healthcheck/runbook.robot | 4 +--- .../k8s-loki-healthcheck/runbook.robot | 2 -- .../k8s-prometheus-healthcheck/runbook.robot | 5 ---- .../k8s-redis-healthcheck/runbook.robot | 2 -- .../k8s-restart-resource/runbook.robot | 3 --- .../k8s-serviceaccount-check/runbook.robot | 1 - .../k8s-statefulset-healthcheck/runbook.robot | 8 ------- .../k8s-tail-logs-dynamic/runbook.robot | 2 -- .../k8s-vault-healthcheck/runbook.robot | 8 ------- .../runbook.robot | 1 - 24 files changed, 1 insertion(+), 100 deletions(-) diff --git a/codebundles/aws-cloudwatch-overused-ec2/runbook.robot b/codebundles/aws-cloudwatch-overused-ec2/runbook.robot index a0434cbb5..6f67b7d57 100644 --- a/codebundles/aws-cloudwatch-overused-ec2/runbook.robot +++ b/codebundles/aws-cloudwatch-overused-ec2/runbook.robot @@ -36,7 +36,6 @@ Check For Overutilized Ec2 Instances ... The following EC2 instances in ${AWS_DEFAULT_REGION} are classified as over-utilized according to the threshold: ${UTILIZATION_THRESHOLD}:\n\n RW.Core.Add Pre To Report ${util_metrics.stdout} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} *** Keywords *** diff --git a/codebundles/azure-loadbalancer-triage/runbook.robot b/codebundles/azure-loadbalancer-triage/runbook.robot index 461312c98..2d2cc8918 100644 --- a/codebundles/azure-loadbalancer-triage/runbook.robot +++ b/codebundles/azure-loadbalancer-triage/runbook.robot @@ -41,7 +41,6 @@ Check Activity Logs for Azure Load Balancer `${AZ_LB_NAME}` END ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report ${activity_logs_report} - RW.Core.Add Pre To Report Commands Used: ${history} *** Keywords *** diff --git a/codebundles/curl-gmp-kong-ingress-inspection/runbook.robot b/codebundles/curl-gmp-kong-ingress-inspection/runbook.robot index 6ab860f22..68eab6852 100644 --- a/codebundles/curl-gmp-kong-ingress-inspection/runbook.robot +++ b/codebundles/curl-gmp-kong-ingress-inspection/runbook.robot @@ -47,7 +47,6 @@ Check If Kong Ingress HTTP Error Rate Violates HTTP Error Threshold in GCP Proje ... env=${env} ... secret_file__gcp_credentials=${gcp_credentials} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} RW.Core.Add Pre To Report HTTP Error Violation & Details:\n${gmp_rsp.stdout} RW.Core.Add Pre To Report GMP Json Data:\n${gmp_json.stdout} @@ -82,7 +81,6 @@ Check If Kong Ingress HTTP Request Latency Violates Threshold in GCP Project `${ ... next_steps=Troubleshoot Namespace `${namespace_name.stdout}` Services and Application Workloads for HTTP-related errors. END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} RW.Core.Add Pre To Report HTTP Request Latency Within Acceptable Parameters:\n${gmp_rsp.stdout} Check If Kong Ingress Controller Reports Upstream Errors in GCP Project `${GCP_PROJECT_ID}` @@ -126,7 +124,6 @@ Check If Kong Ingress Controller Reports Upstream Errors in GCP Project `${GCP_P ... next_steps=Investigate upstream service health and Kong ingress controller configuration END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} RW.Core.Add Pre To Report Kong Upstream Healthchecks Enabled:\n${gmp_healthchecks_off_rsp.stdout} RW.Core.Add Pre To Report Kong Upstream Healthcheck Issues:\n${gmp_healthchecks_rsp.stdout} diff --git a/codebundles/curl-gmp-nginx-ingress-inspection/runbook.robot b/codebundles/curl-gmp-nginx-ingress-inspection/runbook.robot index a5ff16c0a..8a38bcadc 100644 --- a/codebundles/curl-gmp-nginx-ingress-inspection/runbook.robot +++ b/codebundles/curl-gmp-nginx-ingress-inspection/runbook.robot @@ -68,7 +68,6 @@ Fetch Nginx HTTP Errors From GMP for Ingress `${INGRESS_OBJECT_NAME}` ... Kubernetes Ingress Details include: \n${k8s_ingress_details.stdout} END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} RW.Core.Add Pre To Report Ingress Info:\n${ingress_info} Ingress Owner:${ingress_owner.stdout} RW.Core.Add Pre To Report GMP Json Data:\n${gmp_json.stdout} @@ -82,7 +81,6 @@ Find Owner and Service Health for Ingress `${INGRESS_OBJECT_NAME}` ... show_in_rwl_cheatsheet=true ... render_in_commandlist=true ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} RW.Core.Add Pre To Report Ingress Info:\n${k8s_ingress_details.stdout} *** Keywords *** diff --git a/codebundles/curl-http-ok/runbook.robot b/codebundles/curl-http-ok/runbook.robot index 6d06d1b8c..c4b04af25 100644 --- a/codebundles/curl-http-ok/runbook.robot +++ b/codebundles/curl-http-ok/runbook.robot @@ -111,7 +111,6 @@ Check Single HTTP URL END END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} # Add reporting with safe defaults for failed curl commands IF ${curl_rsp.returncode} == 0 diff --git a/codebundles/dns-health/runbook.robot b/codebundles/dns-health/runbook.robot index 48e162841..4cced1020 100755 --- a/codebundles/dns-health/runbook.robot +++ b/codebundles/dns-health/runbook.robot @@ -87,7 +87,6 @@ Check DNS Zone Records ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report === Task Summary === RW.Core.Add Pre To Report DNS zone health check completed for all specified zones. - RW.Core.Add Pre To Report Commands Used: ${history} Detect Broken Record Resolution [Documentation] Implements repeated DNS checks for multiple FQDNs to detect resolution failures @@ -148,7 +147,6 @@ Detect Broken Record Resolution END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} Test Forward Lookup Zones [Documentation] Tests forward lookup zones and conditional forwarders for proper resolution @@ -219,7 +217,6 @@ Test Forward Lookup Zones END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} External Resolution Validation [Documentation] Tests resolution of multiple public domains through multiple resolvers @@ -314,7 +311,6 @@ External Resolution Validation END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} DNS Latency Check [Documentation] Tests DNS query latency for configured zones @@ -401,7 +397,6 @@ DNS Latency Check END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} *** Keywords *** Suite Initialization diff --git a/codebundles/gcloud-log-inspection/runbook.robot b/codebundles/gcloud-log-inspection/runbook.robot index fa51660a6..ff6760c7d 100644 --- a/codebundles/gcloud-log-inspection/runbook.robot +++ b/codebundles/gcloud-log-inspection/runbook.robot @@ -103,5 +103,4 @@ Inspect GCP Logs For Common Errors in GCP Project `${GCP_PROJECT_ID}` RW.Core.Add Pre To Report \n\n RW.Core.Add Pre To Report Full Logs:\n ${rsp.stdout} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} \ No newline at end of file diff --git a/codebundles/gh-actions-health/runbook.robot b/codebundles/gh-actions-health/runbook.robot index 66de55993..524c02a52 100644 --- a/codebundles/gh-actions-health/runbook.robot +++ b/codebundles/gh-actions-health/runbook.robot @@ -61,7 +61,6 @@ Check Recent Workflow Failures Across Specified Repositories END ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Recent Workflow Failures Analysis:\n${workflow_failures.stdout} - RW.Core.Add Pre To Report Commands Used: ${history} Check Long Running Workflows Across Specified Repositories [Documentation] Identifies workflows that have been running longer than expected thresholds across the specified repositories @@ -106,7 +105,6 @@ Check Long Running Workflows Across Specified Repositories END ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Long Running Workflows Analysis:\n${long_running_analysis.stdout} - RW.Core.Add Pre To Report Commands Used: ${history} Check Repository Health Summary for Specified Repositories [Documentation] Provides a comprehensive health summary across the specified repositories @@ -148,7 +146,6 @@ Check Repository Health Summary for Specified Repositories END ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Repository Health Summary:\n${repo_health.stdout} - RW.Core.Add Pre To Report Commands Used: ${history} Check GitHub Actions Runner Health Across Specified Organizations [Documentation] Monitors the health and availability of GitHub Actions runners across the specified organizations @@ -205,7 +202,6 @@ Check GitHub Actions Runner Health Across Specified Organizations END ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Runner Health Analysis:\n${runner_health.stdout} - RW.Core.Add Pre To Report Commands Used: ${history} Check Security Workflow Status Across Specified Repositories [Documentation] Monitors security-related workflows and dependency scanning results across the specified repositories @@ -261,7 +257,6 @@ Check Security Workflow Status Across Specified Repositories END ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Security Workflow Analysis:\n${security_analysis.stdout} - RW.Core.Add Pre To Report Commands Used: ${history} Check GitHub Actions Billing and Usage Across Specified Organizations [Documentation] Monitors GitHub Actions usage patterns and potential billing concerns across the specified organizations @@ -302,7 +297,6 @@ Check GitHub Actions Billing and Usage Across Specified Organizations END ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Billing and Usage Analysis:\n${billing_analysis.stdout} - RW.Core.Add Pre To Report Commands Used: ${history} Check GitHub API Rate Limits [Documentation] Monitors GitHub API rate limit usage to prevent throttling during health checks @@ -342,7 +336,6 @@ Check GitHub API Rate Limits END ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report GitHub API Rate Limit Status:\n${rate_limit_check.stdout} - RW.Core.Add Pre To Report Commands Used: ${history} *** Keywords *** diff --git a/codebundles/k8s-app-troubleshoot/runbook.robot b/codebundles/k8s-app-troubleshoot/runbook.robot index 6b2a6c643..5adde8216 100644 --- a/codebundles/k8s-app-troubleshoot/runbook.robot +++ b/codebundles/k8s-app-troubleshoot/runbook.robot @@ -28,7 +28,6 @@ Get `${CONTAINER_NAME}` Application Logs from Workload `${WORKLOAD_NAME}` in Nam ... secret_file__kubeconfig=${kubeconfig} RW.Core.Add Pre To Report Workload Logs:\n\n${logs.stdout} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} Scan `${CONTAINER_NAME}` Application For Misconfigured Environment [Documentation] Compares codebase to configured infra environment variables and attempts to report missing environment variables in the app @@ -40,7 +39,6 @@ Scan `${CONTAINER_NAME}` Application For Misconfigured Environment ... secret_file__kubeconfig=${kubeconfig} ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Stdout:\n\n${script_run.stdout} - RW.Core.Add Pre To Report Commands Used: ${history} Tail `${CONTAINER_NAME}` Application Logs For Stacktraces in Workload `${WORKLOAD_NAME}` [Documentation] Performs an inspection on container logs for exceptions/stacktraces, parsing them and attempts to find relevant source code information diff --git a/codebundles/k8s-daemonset-healthcheck/runbook.robot b/codebundles/k8s-daemonset-healthcheck/runbook.robot index 8d31df9be..501235e66 100644 --- a/codebundles/k8s-daemonset-healthcheck/runbook.robot +++ b/codebundles/k8s-daemonset-healthcheck/runbook.robot @@ -530,7 +530,6 @@ Inspect DaemonSet Warning Events for `${DAEMONSET_NAME}` in Namespace `${NAMESPA ... observed_at=${issue_timestamp} ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Failed to retrieve events:\n\n${events.stderr} - RW.Core.Add Pre To Report Commands Used: ${history} ELSE ${k8s_daemonset_details}= RW.CLI.Run Cli ... cmd=${KUBERNETES_DISTRIBUTION_BINARY} get daemonset ${DAEMONSET_NAME} -n ${NAMESPACE} --context ${CONTEXT} -o json @@ -550,7 +549,6 @@ Inspect DaemonSet Warning Events for `${DAEMONSET_NAME}` in Namespace `${NAMESPA ... observed_at=${issue_timestamp} ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Failed to retrieve DaemonSet details:\n\n${k8s_daemonset_details.stderr} - RW.Core.Add Pre To Report Commands Used: ${history} ELSE ${related_resource_recommendations}= RW.K8sHelper.Get Related Resource Recommendations ... k8s_object=${k8s_daemonset_details.stdout} @@ -671,7 +669,6 @@ Inspect DaemonSet Warning Events for `${DAEMONSET_NAME}` in Namespace `${NAMESPA ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report ${events.stdout} - RW.Core.Add Pre To Report Commands Used: ${history} END END @@ -698,11 +695,9 @@ Fetch DaemonSet Workload Details For `${DAEMONSET_NAME}` in Namespace `${NAMESPA ... observed_at=${issue_timestamp} ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Failed to retrieve DaemonSet manifest:\n\n${daemonset.stderr} - RW.Core.Add Pre To Report Commands Used: ${history} ELSE ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Snapshot of DaemonSet state:\n\n${daemonset.stdout} - RW.Core.Add Pre To Report Commands Used: ${history} END Inspect DaemonSet Status for `${DAEMONSET_NAME}` in namespace `${NAMESPACE}` @@ -739,7 +734,6 @@ Inspect DaemonSet Status for `${DAEMONSET_NAME}` in namespace `${NAMESPACE}` ... observed_at=${issue_timestamp} ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Failed to retrieve DaemonSet status:\n\n${daemonset_status.stderr} - RW.Core.Add Pre To Report Commands Used: ${history} ELSE TRY ${ds_status}= Evaluate json.loads(r'''${daemonset_status.stdout}''') if r'''${daemonset_status.stdout}'''.strip() else {} json @@ -804,7 +798,6 @@ Inspect DaemonSet Status for `${DAEMONSET_NAME}` in namespace `${NAMESPACE}` ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report DaemonSet Status: Ready=${number_ready}/${desired_scheduled}, Unavailable=${number_unavailable}, Misscheduled=${number_misscheduled} - RW.Core.Add Pre To Report Commands Used: ${history} END Check Node Affinity and Tolerations for DaemonSet `${DAEMONSET_NAME}` in Namespace `${NAMESPACE}` @@ -838,7 +831,6 @@ Check Node Affinity and Tolerations for DaemonSet `${DAEMONSET_NAME}` in Namespa ... observed_at=${issue_timestamp} ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Failed to retrieve node constraints:\n\n${node_constraints.stderr} - RW.Core.Add Pre To Report Commands Used: ${history} ELSE TRY ${constraints}= Evaluate json.loads(r'''${node_constraints.stdout}''') if r'''${node_constraints.stdout}'''.strip() else {} json @@ -877,7 +869,6 @@ Check Node Affinity and Tolerations for DaemonSet `${DAEMONSET_NAME}` in Namespa ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Node Constraints:\n${node_constraints.stdout} - RW.Core.Add Pre To Report Commands Used: ${history} END diff --git a/codebundles/k8s-deployment-ops/runbook.robot b/codebundles/k8s-deployment-ops/runbook.robot index 463ba84c9..ab4ce4760 100644 --- a/codebundles/k8s-deployment-ops/runbook.robot +++ b/codebundles/k8s-deployment-ops/runbook.robot @@ -68,7 +68,6 @@ Restart Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMESPACE}` ... observed_at=${timestamp} END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} Force Delete Pods in Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMESPACE}` [Documentation] Force delete all pods related to the deployment @@ -120,7 +119,6 @@ Force Delete Pods in Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMESPACE}` ... observed_at=${timestamp} END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} Rollback Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMESPACE}` to Previous Version [Documentation] Perform a rollback to a known functional version @@ -172,7 +170,6 @@ Rollback Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMESPACE}` to Previous ... observed_at=${timestamp} END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} Scale Down Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMESPACE}` [Documentation] Stops (or nearly stops) all running pods in a deployment to immediately halt a failing or runaway service. @@ -238,7 +235,6 @@ Scale Down Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMESPACE}` END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} Scale Up Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMESPACE}` by ${SCALE_UP_FACTOR}x @@ -300,7 +296,6 @@ Scale Up Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMESPACE}` by ${SCALE_ ... observed_at=${timestamp} END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} Clean Up Stale ReplicaSets for Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMESPACE}` @@ -333,7 +328,6 @@ Clean Up Stale ReplicaSets for Deployment `${DEPLOYMENT_NAME}` in Namespace `${N ... observed_at=${timestamp} END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} Scale Down Stale ReplicaSets for Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMESPACE}` @@ -367,7 +361,6 @@ Scale Down Stale ReplicaSets for Deployment `${DEPLOYMENT_NAME}` in Namespace `$ ... observed_at=${timestamp} END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} Scale Up HPA for Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMESPACE}` by ${HPA_SCALE_FACTOR}x @@ -401,7 +394,6 @@ Scale Up HPA for Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMESPACE}` by ... next_steps=Create an HPA for this deployment first\nOr use deployment scaling tasks instead\nVerify HPA scaleTargetRef matches deployment name exactly\nCheck namespace and context are correct ... observed_at=${timestamp} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} ELSE RW.Core.Add Pre To Report ----------\nFound HPA: ${hpa_name} @@ -466,7 +458,6 @@ Scale Up HPA for Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMESPACE}` by ... next_steps=Update HPA manifest in Git repository\nCommit and push changes to trigger GitOps sync\nMonitor GitOps controller for deployment updates\nIf urgent, consider manual override (will be reverted by GitOps) ... observed_at=${timestamp} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} ELSE # Update HPA ${hpa_update}= RW.CLI.Run Cli @@ -501,7 +492,6 @@ Scale Up HPA for Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMESPACE}` by END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} END @@ -536,7 +526,6 @@ Scale Down HPA for Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMESPACE}` t ... next_steps=Create an HPA for this deployment first\nOr use deployment scaling tasks instead\nVerify HPA scaleTargetRef matches deployment name exactly\nCheck namespace and context are correct ... observed_at=${timestamp} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} ELSE RW.Core.Add Pre To Report ----------\nFound HPA: ${hpa_name} @@ -587,7 +576,6 @@ Scale Down HPA for Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMESPACE}` t ... next_steps=Update HPA manifest in Git repository\nCommit and push changes to trigger GitOps sync\nMonitor GitOps controller for deployment updates\nIf urgent, consider manual override (will be reverted by GitOps) ... observed_at=${timestamp} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} ELSE # Update HPA ${hpa_update}= RW.CLI.Run Cli @@ -622,7 +610,6 @@ Scale Down HPA for Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMESPACE}` t END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} END @@ -657,7 +644,6 @@ Increase CPU Resources for Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMES ... next_steps=Verify kubeconfig credentials are valid\nCheck network connectivity to the cluster\nVerify RBAC permissions to access deployments in namespace `${NAMESPACE}`\nConfirm deployment name and namespace are correct ... observed_at=${timestamp} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} END # Check if deployment is managed by GitOps (Flux or ArgoCD) @@ -829,7 +815,6 @@ Increase CPU Resources for Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMES END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} Increase Memory Resources for Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMESPACE}` @@ -863,7 +848,6 @@ Increase Memory Resources for Deployment `${DEPLOYMENT_NAME}` in Namespace `${NA ... next_steps=Verify kubeconfig credentials are valid\nCheck network connectivity to the cluster\nVerify RBAC permissions to access deployments in namespace `${NAMESPACE}`\nConfirm deployment name and namespace are correct ... observed_at=${timestamp} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} END # Check if deployment is managed by GitOps (Flux or ArgoCD) @@ -1035,7 +1019,6 @@ Increase Memory Resources for Deployment `${DEPLOYMENT_NAME}` in Namespace `${NA END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} Decrease CPU Resources for Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMESPACE}` @@ -1068,7 +1051,6 @@ Decrease CPU Resources for Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMES ... next_steps=Verify kubeconfig credentials are valid\nCheck network connectivity to the cluster\nVerify RBAC permissions to access deployments in namespace `${NAMESPACE}`\nConfirm deployment name and namespace are correct ... observed_at=${timestamp} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} END # Check if deployment is managed by GitOps (Flux or ArgoCD) @@ -1177,7 +1159,6 @@ Decrease CPU Resources for Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMES ... details=Deployment ${DEPLOYMENT_NAME} in Namespace ${NAMESPACE} does not have CPU resource requests configured. ... next_steps=Cannot decrease resources - no current CPU requests found\nManually configure CPU resource requests for the deployment first ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} END IF not $suggestion_only and $new_cpu_value != "" @@ -1226,7 +1207,6 @@ Decrease CPU Resources for Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMES END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} Decrease Memory Resources for Deployment `${DEPLOYMENT_NAME}` in Namespace `${NAMESPACE}` @@ -1259,7 +1239,6 @@ Decrease Memory Resources for Deployment `${DEPLOYMENT_NAME}` in Namespace `${NA ... next_steps=Verify kubeconfig credentials are valid\nCheck network connectivity to the cluster\nVerify RBAC permissions to access deployments in namespace `${NAMESPACE}`\nConfirm deployment name and namespace are correct ... observed_at=${timestamp} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} END # Check if deployment is managed by GitOps (Flux or ArgoCD) @@ -1368,7 +1347,6 @@ Decrease Memory Resources for Deployment `${DEPLOYMENT_NAME}` in Namespace `${NA ... details=Deployment ${DEPLOYMENT_NAME} in Namespace ${NAMESPACE} does not have memory resource requests configured. ... next_steps=Cannot decrease resources - no current memory requests found\nManually configure memory resource requests for the deployment first ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} END IF not $suggestion_only and $new_memory_value != "" @@ -1417,7 +1395,6 @@ Decrease Memory Resources for Deployment `${DEPLOYMENT_NAME}` in Namespace `${NA END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} diff --git a/codebundles/k8s-image-check/runbook.robot b/codebundles/k8s-image-check/runbook.robot index 2680bf0a3..22c4d9381 100644 --- a/codebundles/k8s-image-check/runbook.robot +++ b/codebundles/k8s-image-check/runbook.robot @@ -42,7 +42,6 @@ Check Image Rollover Times for Namespace `${NAMESPACE}` ... secret_file__kubeconfig=${kubeconfig} RW.Core.Add Pre To Report Image Info:\n${rsp.stdout} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} List Images and Tags for Every Container in Running Pods for Namespace `${NAMESPACE}` [Documentation] Display the status, image name, image tag, and container name for running pods in the namespace. @@ -55,7 +54,6 @@ List Images and Tags for Every Container in Running Pods for Namespace `${NAMESP ... secret_file__kubeconfig=${kubeconfig} RW.Core.Add Pre To Report Image details for pods in ${NAMESPACE}:\n${image_details.stdout} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} List Images and Tags for Every Container in Failed Pods for Namespace `${NAMESPACE}` [Documentation] Display the status, image name, image tag, and container name for failed pods in the namespace. @@ -68,7 +66,6 @@ List Images and Tags for Every Container in Failed Pods for Namespace `${NAMESPA ... secret_file__kubeconfig=${kubeconfig} RW.Core.Add Pre To Report Image details for pods in ${NAMESPACE}:\n${image_details.stdout} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} List ImagePullBackOff Events and Test Path and Tags for Namespace `${NAMESPACE}` [Documentation] Search events in the last 5 minutes for BackOff events related to image pull issues. Run Skopeo to test if the image path exists and what tags are available. @@ -81,7 +78,6 @@ List ImagePullBackOff Events and Test Path and Tags for Namespace `${NAMESPACE}` ... secret_file__kubeconfig=${kubeconfig} RW.Core.Add Pre To Report Image details for pods in ${NAMESPACE}:\n${image_path_and_tag_details.stdout} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} *** Keywords *** diff --git a/codebundles/k8s-ingress-gce-healthcheck/runbook.robot b/codebundles/k8s-ingress-gce-healthcheck/runbook.robot index 50f6fa834..14c1875fe 100644 --- a/codebundles/k8s-ingress-gce-healthcheck/runbook.robot +++ b/codebundles/k8s-ingress-gce-healthcheck/runbook.robot @@ -39,7 +39,6 @@ Search For GCE Ingress Warnings in GKE Context `${CONTEXT}` END ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report GCE Ingress warnings for ${NAMESPACE}:\n\n${event_warnings.stdout} - RW.Core.Add Pre To Report Commands Used: ${history} Identify Unhealthy GCE HTTP Ingress Backends in GKE Namespace `${NAMESPACE}` [Documentation] Checks the backend annotations on the ingress object to determine if they are not regstered as healthy @@ -66,7 +65,6 @@ Identify Unhealthy GCE HTTP Ingress Backends in GKE Namespace `${NAMESPACE}` ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report ... GCE unhealthy backends in `${NAMESPACE}` for ingress `${INGRESS}`:\n\n${unhealthy_backends.stdout} - RW.Core.Add Pre To Report Commands Used: ${history} Validate GCP HTTP Load Balancer Configurations in GCP Project `${GCP_PROJECT_ID}` [Documentation] Extract GCP HTTP Load Balancer components from ingress annotations and check health of each object @@ -126,7 +124,6 @@ Fetch Network Error Logs from GCP Operations Manager for Ingress Backends in GCP END ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Network error logs possibly related to Ingress ${INGRESS}:\n\n${network_error_logs.stdout} - RW.Core.Add Pre To Report Commands Used: ${history} Review GCP Operations Logging Dashboard in GCP project `${GCP_PROJECT_ID}` [Documentation] Create urls that will help users obtain logs from the GCP Dashboard @@ -147,7 +144,6 @@ Review GCP Operations Logging Dashboard in GCP project `${GCP_PROJECT_ID}` ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report GCP Ops Logs for HTTP Load Balancer ${INGRESS}:\n\n${loadbalancer_log_url.stdout} RW.Core.Add Pre To Report GCP Ops Logs for ${INGRESS} backends:\n\n${backend_log_url.stdout} - RW.Core.Add Pre To Report Commands Used: ${history} diff --git a/codebundles/k8s-ingress-healthcheck/runbook.robot b/codebundles/k8s-ingress-healthcheck/runbook.robot index 316e29c96..3bebd2eb8 100644 --- a/codebundles/k8s-ingress-healthcheck/runbook.robot +++ b/codebundles/k8s-ingress-healthcheck/runbook.robot @@ -65,7 +65,6 @@ Fetch Ingress Object Health in Namespace `${NAMESPACE}` END ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Ingress object summary for ${NAMESPACE}:\n\n${ingress_object_summary.stdout} - RW.Core.Add Pre To Report Commands Used: ${history} Check for Ingress and Service Conflicts in Namespace `${NAMESPACE}` [Documentation] Look for conflicting configuration between service and ingress objects. @@ -109,7 +108,6 @@ Check for Ingress and Service Conflicts in Namespace `${NAMESPACE}` END ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Ingress and service conflict summary for `${NAMESPACE}`:\n\n`${ingress_object_conflict.stdout}` - RW.Core.Add Pre To Report Commands Used: ${history} *** Keywords *** Suite Initialization diff --git a/codebundles/k8s-jenkins-healthcheck/runbook.robot b/codebundles/k8s-jenkins-healthcheck/runbook.robot index a7ace0cb1..f937a6b12 100644 --- a/codebundles/k8s-jenkins-healthcheck/runbook.robot +++ b/codebundles/k8s-jenkins-healthcheck/runbook.robot @@ -106,7 +106,6 @@ Query The Jenkins Kubernetes Workload HTTP Endpoint in Kubernetes StatefulSet `$ ... render_in_commandlist=true RW.Core.Add Pre To Report Remote API Info:\n${rsp.stdout} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} Query For Stuck Jenkins Jobs in Kubernetes Statefulset Workload `${STATEFULSET_NAME}` @@ -133,5 +132,4 @@ Query For Stuck Jenkins Jobs in Kubernetes Statefulset Workload `${STATEFULSET_N ... next_steps=Review Jenkins console, check for resource constraints, and manually unstick jobs if needed END RW.Core.Add Pre To Report Queue Information:\n${rsp.stdout} - ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} \ No newline at end of file + ${history}= RW.CLI.Pop Shell History \ No newline at end of file diff --git a/codebundles/k8s-loki-healthcheck/runbook.robot b/codebundles/k8s-loki-healthcheck/runbook.robot index 954f4afbe..9ac63e485 100644 --- a/codebundles/k8s-loki-healthcheck/runbook.robot +++ b/codebundles/k8s-loki-healthcheck/runbook.robot @@ -39,7 +39,6 @@ Check Loki Ring API for Unhealthy Shards in Kubernetes Cluster `$${NAMESPACE}` ... next_steps=Investigate the following ring members:\n${rsp.stdout}\nif their status does not return to ACTIVE shortly or they are not fully removed from the ring. END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} Check Loki API Ready in Kubernetes Cluster `${NAMESPACE}` [Documentation] Pings the internal Loki API to check it's ready. @@ -68,7 +67,6 @@ Check Loki API Ready in Kubernetes Cluster `${NAMESPACE}` END RW.Core.Add Pre To Report Loki API Response:\n${rsp.stdout} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} *** Keywords *** diff --git a/codebundles/k8s-prometheus-healthcheck/runbook.robot b/codebundles/k8s-prometheus-healthcheck/runbook.robot index 8924039ca..5f6e38ae9 100644 --- a/codebundles/k8s-prometheus-healthcheck/runbook.robot +++ b/codebundles/k8s-prometheus-healthcheck/runbook.robot @@ -42,7 +42,6 @@ Check Prometheus Service Monitors in namespace `${NAMESPACE}` ... next_steps=${nextsteps.stdout} END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} Check For Successful Rule Setup in Kubernetes Namespace `${NAMESPACE}` [Documentation] Inspects operator instance logs for failed rules setup @@ -72,7 +71,6 @@ Check For Successful Rule Setup in Kubernetes Namespace `${NAMESPACE}` END ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Logs Found:\n ${rsp.stdout} - RW.Core.Add Pre To Report Commands Used: ${history} Verify Prometheus RBAC Can Access ServiceMonitors in Namespace `${PROM_NAMESPACE}` [Documentation] Fetch operator rbac and verify it has ServiceMonitors in rbac. @@ -98,7 +96,6 @@ Verify Prometheus RBAC Can Access ServiceMonitors in Namespace `${PROM_NAMESPACE ... next_steps=Inspect the deployment method for your Prometheus Operator and check for version-control drift, or if the role was manually changed. END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} Inspect Prometheus Operator Logs for Scraping Errors in Namespace `${NAMESPACE}` [Documentation] Inspect the prometheus operator logs for scraping errors and raise issues if any found @@ -127,7 +124,6 @@ Inspect Prometheus Operator Logs for Scraping Errors in Namespace `${NAMESPACE}` END ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Logs Found:\n ${rsp.stdout} - RW.Core.Add Pre To Report Commands Used: ${history} Check Prometheus API Healthy in Namespace `${PROM_NAMESPACE}` [Documentation] Ping Prometheus healthy API endpoint for a 200 response code. @@ -152,7 +148,6 @@ Check Prometheus API Healthy in Namespace `${PROM_NAMESPACE}` END RW.Core.Add Pre To Report API Response:\n${rsp.stdout} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} *** Keywords *** diff --git a/codebundles/k8s-redis-healthcheck/runbook.robot b/codebundles/k8s-redis-healthcheck/runbook.robot index a95391b9b..c964cda42 100644 --- a/codebundles/k8s-redis-healthcheck/runbook.robot +++ b/codebundles/k8s-redis-healthcheck/runbook.robot @@ -40,7 +40,6 @@ Ping `${DEPLOYMENT_NAME}` Redis Workload END RW.Core.Add Pre To Report Redis Response:\n${rsp.stdout} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} Verify `${DEPLOYMENT_NAME}` Redis Read Write Operation in Kubernetes [Documentation] Attempts to perform a write and read operation on the redis workload, checking that a key can be set, incremented, and read from. @@ -77,7 +76,6 @@ Verify `${DEPLOYMENT_NAME}` Redis Read Write Operation in Kubernetes END RW.Core.Add Pre To Report Redis Response For Key ${REDIS_HEALTHCHECK_KEY}:${get_op.stdout} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} *** Keywords *** diff --git a/codebundles/k8s-restart-resource/runbook.robot b/codebundles/k8s-restart-resource/runbook.robot index 1aa01bec2..ee7572014 100644 --- a/codebundles/k8s-restart-resource/runbook.robot +++ b/codebundles/k8s-restart-resource/runbook.robot @@ -28,7 +28,6 @@ Get Current Resource State with Labels `${LABELS}` ... secret_file__kubeconfig=${kubeconfig} RW.Core.Add Pre To Report Current Resource State:\n\n${resource.stdout} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} Get Resource Logs with Labels `${LABELS}` [Documentation] Collects the last approximately 200 lines of logs from the resource before restarting it. @@ -41,7 +40,6 @@ Get Resource Logs with Labels `${LABELS}` ... secret_file__kubeconfig=${kubeconfig} RW.Core.Add Pre To Report Resource Logs:\n\n${logs.stdout} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} Restart Resource with Labels `${LABELS}` in `${CONTEXT}` [Documentation] Restarts the labeled resource in an attempt to get it out of a bad state. @@ -60,7 +58,6 @@ Restart Resource with Labels `${LABELS}` in `${CONTEXT}` ... secret_file__kubeconfig=${kubeconfig} RW.Core.Add Pre To Report Restarted the following workload: ${resource_name.stdout} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} *** Keywords *** diff --git a/codebundles/k8s-serviceaccount-check/runbook.robot b/codebundles/k8s-serviceaccount-check/runbook.robot index 931cac0b6..78d73dab6 100644 --- a/codebundles/k8s-serviceaccount-check/runbook.robot +++ b/codebundles/k8s-serviceaccount-check/runbook.robot @@ -89,5 +89,4 @@ Test Service Account Access to Kubernetes API Server in Namespace `${NAMESPACE}` END RW.Core.Add Pre To Report Test Output:\n${sa_access.stdout} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} diff --git a/codebundles/k8s-statefulset-healthcheck/runbook.robot b/codebundles/k8s-statefulset-healthcheck/runbook.robot index 171249c5a..5cd67f063 100644 --- a/codebundles/k8s-statefulset-healthcheck/runbook.robot +++ b/codebundles/k8s-statefulset-healthcheck/runbook.robot @@ -309,7 +309,6 @@ Inspect StatefulSet Warning Events for `${STATEFULSET_NAME}` in Namespace `${NAM ... observed_at=${issue_timestamp} ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Failed to retrieve events:\n\n${events.stderr} - RW.Core.Add Pre To Report Commands Used: ${history} ELSE ${k8s_statefulset_details}= RW.CLI.Run Cli ... cmd=${KUBERNETES_DISTRIBUTION_BINARY} get statefulset ${STATEFULSET_NAME} -n ${NAMESPACE} --context ${CONTEXT} -o json @@ -330,7 +329,6 @@ Inspect StatefulSet Warning Events for `${STATEFULSET_NAME}` in Namespace `${NAM ... observed_at=${issue_timestamp} ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Failed to retrieve StatefulSet details:\n\n${k8s_statefulset_details.stderr} - RW.Core.Add Pre To Report Commands Used: ${history} ELSE ${related_resource_recommendations}= RW.K8sHelper.Get Related Resource Recommendations ... k8s_object=${k8s_statefulset_details.stdout} @@ -479,7 +477,6 @@ Inspect StatefulSet Warning Events for `${STATEFULSET_NAME}` in Namespace `${NAM ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report ${events.stdout} - RW.Core.Add Pre To Report Commands Used: ${history} END END @@ -507,11 +504,9 @@ Fetch StatefulSet Workload Details For `${STATEFULSET_NAME}` in Namespace `${NAM ... observed_at=${issue_timestamp} ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Failed to retrieve StatefulSet manifest:\n\n${statefulset.stderr} - RW.Core.Add Pre To Report Commands Used: ${history} ELSE ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Snapshot of StatefulSet state:\n\n${statefulset.stdout} - RW.Core.Add Pre To Report Commands Used: ${history} END Inspect StatefulSet Replicas for `${STATEFULSET_NAME}` in namespace `${NAMESPACE}` @@ -552,7 +547,6 @@ Inspect StatefulSet Replicas for `${STATEFULSET_NAME}` in namespace `${NAMESPACE ... observed_at=${issue_timestamp} ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Failed to retrieve StatefulSet replica status:\n\n${statefulset_replicas.stderr} - RW.Core.Add Pre To Report Commands Used: ${history} ELSE TRY ${statefulset_status}= Evaluate json.loads(r'''${statefulset_replicas.stdout}''') if r'''${statefulset_replicas.stdout}'''.strip() else {} json @@ -640,7 +634,6 @@ Check StatefulSet PersistentVolumeClaims for `${STATEFULSET_NAME}` in Namespace ... observed_at=${issue_timestamp} ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report Failed to retrieve PVC status:\n\n${pvcs.stderr} - RW.Core.Add Pre To Report Commands Used: ${history} ELSE TRY ${pvc_list}= Evaluate json.loads(r'''[${pvcs.stdout}]''') if r'''${pvcs.stdout}'''.strip() else [] json @@ -688,7 +681,6 @@ Check StatefulSet PersistentVolumeClaims for `${STATEFULSET_NAME}` in Namespace RW.Core.Add Pre To Report StatefulSet PVC Status: ${bound_pvcs}/${total_pvcs} bound RW.Core.Add Pre To Report PVC Details:\n${pvcs.stdout} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} END Identify Recent Configuration Changes for StatefulSet `${STATEFULSET_NAME}` in Namespace `${NAMESPACE}` diff --git a/codebundles/k8s-tail-logs-dynamic/runbook.robot b/codebundles/k8s-tail-logs-dynamic/runbook.robot index f4eb9e94f..1da6ac24a 100755 --- a/codebundles/k8s-tail-logs-dynamic/runbook.robot +++ b/codebundles/k8s-tail-logs-dynamic/runbook.robot @@ -26,7 +26,6 @@ Get `${CONTAINER_NAME}` Application Logs in Namespace `${NAMESPACE}` ... secret_file__kubeconfig=${kubeconfig} RW.Core.Add Pre To Report Workload Logs:\n\n${logs.stdout} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} Tail `${CONTAINER_NAME}` Application Logs For Stacktraces [Documentation] Performs an inspection on container logs for exceptions/stacktraces, parsing them and attempts to find relevant source code information @@ -103,7 +102,6 @@ Tail `${CONTAINER_NAME}` Application Logs For Stacktraces ... observed_at=${last_timestamp} END RW.Core.Add Pre To Report ${report} - RW.Core.Add Pre To Report Commands Used: ${history} #TODO: replicaset check #TODO: rollout workload #TODO: check if a service has a selector for this deployment diff --git a/codebundles/k8s-vault-healthcheck/runbook.robot b/codebundles/k8s-vault-healthcheck/runbook.robot index a5fac0934..d50419a3c 100644 --- a/codebundles/k8s-vault-healthcheck/runbook.robot +++ b/codebundles/k8s-vault-healthcheck/runbook.robot @@ -30,7 +30,6 @@ Fetch Vault CSI Driver Logs in Namespace `${NAMESPACE}` END ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report ${found_logs} - RW.Core.Add Pre To Report Commands Used: ${history} Get Vault CSI Driver Warning Events in `${NAMESPACE}` [Documentation] Fetches warning-type events related to the vault CSI driver. @@ -47,7 +46,6 @@ Get Vault CSI Driver Warning Events in `${NAMESPACE}` END ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report ${found_events} - RW.Core.Add Pre To Report Commands Used: ${history} Check Vault CSI Driver Replicas [Documentation] Performs an inspection on the replicas of the vault CSI driver daemonset. @@ -206,7 +204,6 @@ Check Vault CSI Driver Replicas END RW.Core.Add Pre To Report Deployment State:\n${daemonset_describe.stdout} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} Fetch Vault Pod Workload Logs in Namespace `${NAMESPACE}` with Labels `${LABELS}` [Documentation] Fetches the last 100 lines of logs for all vault pod workloads in the vault namespace. @@ -223,7 +220,6 @@ Fetch Vault Pod Workload Logs in Namespace `${NAMESPACE}` with Labels `${LABELS} END ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report ${found_logs} - RW.Core.Add Pre To Report Commands Used: ${history} Get Related Vault Events in Namespace `${NAMESPACE}` [Documentation] Fetches all warning-type events related to vault in the vault namespace. @@ -240,7 +236,6 @@ Get Related Vault Events in Namespace `${NAMESPACE}` END ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report ${found_events} - RW.Core.Add Pre To Report Commands Used: ${history} Fetch Vault StatefulSet Manifest Details in `${NAMESPACE}` [Documentation] Fetches the current state of the vault statefulset manifest for inspection. @@ -253,7 +248,6 @@ Fetch Vault StatefulSet Manifest Details in `${NAMESPACE}` ... render_in_commandlist=true ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report ${statefulset.stdout} - RW.Core.Add Pre To Report Commands Used: ${history} Fetch Vault DaemonSet Manifest Details in Kubernetes Cluster `${NAMESPACE}` [Documentation] Fetches the current state of the vault daemonset manifest for inspection. @@ -266,7 +260,6 @@ Fetch Vault DaemonSet Manifest Details in Kubernetes Cluster `${NAMESPACE}` ... render_in_commandlist=true ${history}= RW.CLI.Pop Shell History RW.Core.Add Pre To Report ${statefulset.stdout} - RW.Core.Add Pre To Report Commands Used: ${history} Verify Vault Availability in Namespace `${NAMESPACE}` and Context `${CONTEXT}` [Documentation] Curls the vault endpoint and checks the HTTP response code. @@ -367,7 +360,6 @@ Check Vault StatefulSet Replicas in `NAMESPACE` # Note: desired_replicas and available_replicas were already converted to numbers earlier RW.Core.Add Pre To Report StatefulSet State:\n${statefulset.stdout} ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} *** Keywords *** diff --git a/codebundles/terraform-cloud-workspace-lock-check/runbook.robot b/codebundles/terraform-cloud-workspace-lock-check/runbook.robot index ccd861295..55c5c3422 100644 --- a/codebundles/terraform-cloud-workspace-lock-check/runbook.robot +++ b/codebundles/terraform-cloud-workspace-lock-check/runbook.robot @@ -40,7 +40,6 @@ Checking whether the Terraform Cloud Workspace '${TERRAFORM_WORKSPACE_NAME}' is ... next_steps=Review workspace lock status in Terraform Cloud console and unlock if safe to proceed END ${history}= RW.CLI.Pop Shell History - RW.Core.Add Pre To Report Commands Used: ${history} RW.Core.Add Pre To Report Locked: ${locked.stdout}