This job view page is being replaced by Spyglass soon. Check out the new job view.
ResultFAILURE
Tests 337 failed / 261 succeeded
Started2022-11-24 08:55
Elapsed1h3m
Revision
Builderabcc6b06-6bd5-11ed-a6da-22215f11743a
control_plane_node_os_imagecos-97-16919-103-16
infra-commit0915cbf7b
job-versionv1.27.0-alpha.0.44+45279654db87f4
kubetest-versionv20221116-7c85504268
repogithub.com/containerd/containerd
repo-commitd06318622178a2209338d7f57eb8800b9f2e72fb
repos{u'github.com/containerd/containerd': u'main'}
revisionv1.27.0-alpha.0.44+45279654db87f4
worker_node_os_imagecos-97-16919-103-16

Test Failures


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a mutating webhook should work [Conformance] 48s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\spatching\/updating\sa\smutating\swebhook\sshould\swork\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:826
k8s.io/kubernetes/test/e2e/apimachinery.deployWebhookAndService(0xc00108de00, {0xc0051f80f0, 0x2c}, 0xc004fbc140, 0x20fb, 0x20fc)
	test/e2e/apimachinery/webhook.go:826 +0xed2
k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.1()
	test/e2e/apimachinery/webhook.go:102 +0x226
There were additional failures detected after the initial failure:
[FAILED]
Nov 24 09:07:54.319: failed to list events in namespace "webhook-8908": Get "https://35.233.217.30/api/v1/namespaces/webhook-8908/events": dial tcp 35.233.217.30:443: connect: connection refused
In [DeferCleanup (Each)] at: test/e2e/framework/debug/dump.go:44
----------
[FAILED]
Nov 24 09:07:54.398: Couldn't delete ns: "webhook-8908": Delete "https://35.233.217.30/api/v1/namespaces/webhook-8908": dial tcp 35.233.217.30:443: connect: connection refused (&url.Error{Op:"Delete", URL:"https://35.233.217.30/api/v1/namespaces/webhook-8908", Err:(*net.OpError)(0xc004fbcdc0)}),Couldn't delete ns: "webhook-8908-markers": Delete "https://35.233.217.30/api/v1/namespaces/webhook-8908-markers": dial tcp 35.233.217.30:443: connect: connection refused (&url.Error{Op:"Delete", URL:"https://35.233.217.30/api/v1/namespaces/webhook-8908-markers", Err:(*net.OpError)(0xc003fc78b0)})
In [DeferCleanup (Each)] at: test/e2e/framework/framework.go:370

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny attaching pod [Conformance] 19s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sbe\sable\sto\sdeny\sattaching\spod\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:826
k8s.io/kubernetes/test/e2e/apimachinery.deployWebhookAndService(0xc000f77e00, {0xc003366e40, 0x2c}, 0xc003312c30, 0x20fb, 0x20fc)
	test/e2e/apimachinery/webhook.go:826 +0xed2
k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.1()
	test/e2e/apimachinery/webhook.go:102 +0x226
There were additional failures detected after the initial failure:
[FAILED]
Nov 24 09:04:54.090: failed to list events in namespace "webhook-567": Get "https://35.233.217.30/api/v1/namespaces/webhook-567/events": dial tcp 35.233.217.30:443: connect: connection refused
In [DeferCleanup (Each)] at: test/e2e/framework/debug/dump.go:44
----------
[FAILED]
Nov 24 09:04:54.169: Couldn't delete ns: "webhook-567": Delete "https://35.233.217.30/api/v1/namespaces/webhook-567": dial tcp 35.233.217.30:443: connect: connection refused (&url.Error{Op:"Delete", URL:"https://35.233.217.30/api/v1/namespaces/webhook-567", Err:(*net.OpError)(0xc002e8b400)}),Couldn't delete ns: "webhook-567-markers": Delete "https://35.233.217.30/api/v1/namespaces/webhook-567-markers": dial tcp 35.233.217.30:443: connect: connection refused (&url.Error{Op:"Delete", URL:"https://35.233.217.30/api/v1/namespaces/webhook-567-markers", Err:(*net.OpError)(0xc0035e4ff0)})
In [DeferCleanup (Each)] at: test/e2e/framework/framework.go:370

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny custom resource creation, update and deletion [Conformance] 52s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sbe\sable\sto\sdeny\scustom\sresource\screation\,\supdate\sand\sdeletion\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:853
k8s.io/kubernetes/test/e2e/apimachinery.deployWebhookAndService(0xc0009fbe00, {0xc0049ffec0, 0x2c}, 0xc003c9e320, 0x20fb, 0x20fc)
	test/e2e/apimachinery/webhook.go:853 +0x13da
k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.1()
	test/e2e/apimachinery/webhook.go:102 +0x226
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should deny crd creation [Conformance] 2m0s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sdeny\scrd\screation\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000ef3e00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource with different stored version [Conformance] 1m56s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\smutate\scustom\sresource\swith\sdifferent\sstored\sversion\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0009a5e00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource with pruning [Conformance] 56s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\smutate\scustom\sresource\swith\spruning\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:853
k8s.io/kubernetes/test/e2e/apimachinery.deployWebhookAndService(0xc000d9d4a0, {0xc00329c6c0, 0x2c}, 0xc00369bbd0, 0x20fb, 0x20fc)
	test/e2e/apimachinery/webhook.go:853 +0x13da
k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.1()
	test/e2e/apimachinery/webhook.go:102 +0x226
There were additional failures detected after the initial failure:
[FAILED]
Nov 24 09:04:53.072: failed to list events in namespace "webhook-7113": Get "https://35.233.217.30/api/v1/namespaces/webhook-7113/events": dial tcp 35.233.217.30:443: connect: connection refused
In [DeferCleanup (Each)] at: test/e2e/framework/debug/dump.go:44
----------
[FAILED]
Nov 24 09:04:53.152: Couldn't delete ns: "webhook-7113": Delete "https://35.233.217.30/api/v1/namespaces/webhook-7113": dial tcp 35.233.217.30:443: connect: connection refused (&url.Error{Op:"Delete", URL:"https://35.233.217.30/api/v1/namespaces/webhook-7113", Err:(*net.OpError)(0xc0010dfa40)}),Couldn't delete ns: "webhook-7113-markers": Delete "https://35.233.217.30/api/v1/namespaces/webhook-7113-markers": dial tcp 35.233.217.30:443: connect: connection refused (&url.Error{Op:"Delete", URL:"https://35.233.217.30/api/v1/namespaces/webhook-7113-markers", Err:(*net.OpError)(0xc0010dfc70)})
In [DeferCleanup (Each)] at: test/e2e/framework/framework.go:370

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should not be able to mutate or prevent deletion of webhook configuration objects [Conformance] 3m11s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\snot\sbe\sable\sto\smutate\sor\sprevent\sdeletion\sof\swebhook\sconfiguration\sobjects\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc001175e00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Aggregator Should be able to support the 1.17 Sample API Server using the current Aggregator [Conformance] 1m56s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAggregator\sShould\sbe\sable\sto\ssupport\sthe\s1\.17\sSample\sAPI\sServer\susing\sthe\scurrent\sAggregator\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000a324b0)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanTest({0x0, 0x0}, 0x0?, {0x0, 0x0})
  	test/e2e/apimachinery/aggregator.go:108 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func1.1()
  	test/e2e/apimachinery/aggregator.go:69 +0x36

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceConversionWebhook [Privileged:ClusterAdmin] should be able to convert a non homogeneous list of CRs [Conformance] 5m34s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceConversionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sbe\sable\sto\sconvert\sa\snon\shomogeneous\slist\sof\sCRs\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc00064e870)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanCRDWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/crd_conversion_webhook.go:214 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func5.2()
  	test/e2e/apimachinery/crd_conversion_webhook.go:140 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] should include custom resource definition resources in discovery documents [Conformance] 1m56s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceDefinition\sresources\s\[Privileged\:ClusterAdmin\]\sshould\sinclude\scustom\sresource\sdefinition\sresources\sin\sdiscovery\sdocuments\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0011a0d20)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] removes definition from spec when one version gets changed to not be served [Conformance] 2m20s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourcePublishOpenAPI\s\[Privileged\:ClusterAdmin\]\sremoves\sdefinition\sfrom\sspec\swhen\sone\sversion\sgets\schanged\sto\snot\sbe\sserved\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0009fa960)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD preserving unknown fields in an embedded object [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourcePublishOpenAPI\s\[Privileged\:ClusterAdmin\]\sworks\sfor\sCRD\spreserving\sunknown\sfields\sin\san\sembedded\sobject\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc001165950)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of different groups [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourcePublishOpenAPI\s\[Privileged\:ClusterAdmin\]\sworks\sfor\smultiple\sCRDs\sof\sdifferent\sgroups\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000152960)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST NOT fail validation for create of a custom resource that satisfies the x-kubernetes-validations rules 1m56s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceValidationRules\s\[Privileged\:ClusterAdmin\]\sMUST\sNOT\sfail\svalidation\sfor\screate\sof\sa\scustom\sresource\sthat\ssatisfies\sthe\sx\-kubernetes\-validations\srules$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000a32a50)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST fail create of a custom resource definition that contains a x-kubernetes-validations rule that refers to a property that do not exist 2m16s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceValidationRules\s\[Privileged\:ClusterAdmin\]\sMUST\sfail\screate\sof\sa\scustom\sresource\sdefinition\sthat\scontains\sa\sx\-kubernetes\-validations\srule\sthat\srefers\sto\sa\sproperty\sthat\sdo\snot\sexist$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000df6a50)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Discovery should accurately determine present and missing resources 2m2s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sDiscovery\sshould\saccurately\sdetermine\spresent\sand\smissing\sresources$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000d9c3c0)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Discovery should validate PreferredVersion for each APIGroup [Conformance] 1m56s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sDiscovery\sshould\svalidate\sPreferredVersion\sfor\seach\sAPIGroup\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000370780)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should delete jobs and pods created by cronjob 3m29s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sGarbage\scollector\sshould\sdelete\sjobs\sand\spods\screated\sby\scronjob$'
test/e2e/apimachinery/garbage_collector.go:1174
k8s.io/kubernetes/test/e2e/apimachinery.glob..func13.11()
	test/e2e/apimachinery/garbage_collector.go:1174 +0x477
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should not be blocked by dependency circle [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sGarbage\scollector\sshould\snot\sbe\sblocked\sby\sdependency\scircle\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000152ff0)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should not delete dependents that have both valid owner and owner that's waiting for dependents to be deleted [Conformance] 2m21s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sGarbage\scollector\sshould\snot\sdelete\sdependents\sthat\shave\sboth\svalid\sowner\sand\sowner\sthat\'s\swaiting\sfor\sdependents\sto\sbe\sdeleted\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000d9c690)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should orphan RS created by deployment when deleteOptions.PropagationPolicy is Orphan [Conformance] 1m56s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sGarbage\scollector\sshould\sorphan\sRS\screated\sby\sdeployment\swhen\sdeleteOptions\.PropagationPolicy\sis\sOrphan\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc00064eff0)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should orphan pods created by rc if deleteOptions.OrphanDependents is nil 2m21s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sGarbage\scollector\sshould\sorphan\spods\screated\sby\src\sif\sdeleteOptions\.OrphanDependents\sis\snil$'
test/e2e/apimachinery/garbage_collector.go:475
k8s.io/kubernetes/test/e2e/apimachinery.glob..func13.3()
	test/e2e/apimachinery/garbage_collector.go:475 +0x4d1
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should support orphan deletion of custom resources 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sGarbage\scollector\sshould\ssupport\sorphan\sdeletion\sof\scustom\sresources$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc001174ff0)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Generated clientset should create pods, set the deletionTimestamp and deletionGracePeriodSeconds of the pod 2m1s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sGenerated\sclientset\sshould\screate\spods\,\sset\sthe\sdeletionTimestamp\sand\sdeletionGracePeriodSeconds\sof\sthe\spod$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000ef30e0)
	test/e2e/framework/framework.go:241 +0x96f