This job view page is being replaced by Spyglass soon. Check out the new job view.
ResultFAILURE
Tests 240 failed / 302 succeeded
Started2022-11-25 04:57
Elapsed1h4m
Revision
Builder972c2cca-6c7d-11ed-a6da-22215f11743a
control_plane_node_os_imagecos-97-16919-103-16
infra-commitfe6d234c6
job-versionv1.27.0-alpha.0.46+8f2371bcceff79
kubetest-versionv20221116-7c85504268
repogithub.com/containerd/containerd
repo-commitd06318622178a2209338d7f57eb8800b9f2e72fb
repos{u'github.com/containerd/containerd': u'main'}
revisionv1.27.0-alpha.0.46+8f2371bcceff79
worker_node_os_imagecos-97-16919-103-16

Test Failures


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] listing validating webhooks should work [Conformance] 58s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\slisting\svalidating\swebhooks\sshould\swork\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:609
k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.18()
	test/e2e/apimachinery/webhook.go:609 +0x687
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a mutating webhook should work [Conformance] 58s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\spatching\/updating\sa\smutating\swebhook\sshould\swork\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:530
k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.17()
	test/e2e/apimachinery/webhook.go:530 +0x390
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny custom resource creation, update and deletion [Conformance] 49s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sbe\sable\sto\sdeny\scustom\sresource\screation\,\supdate\sand\sdeletion\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:1731
k8s.io/kubernetes/test/e2e/apimachinery.registerWebhookForCustomResource(0xc00119ce10, {0xc0050abfe0, 0xc}, 0xc002b5a7d0, 0xc0016322e0, 0x3e54d80?)
	test/e2e/apimachinery/webhook.go:1731 +0x871
k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.6()
	test/e2e/apimachinery/webhook.go:227 +0xad
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny pod and configmap creation [Conformance] 3m39s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sbe\sable\sto\sdeny\spod\sand\sconfigmap\screation\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:826
k8s.io/kubernetes/test/e2e/apimachinery.deployWebhookAndService(0xc000da9e00, {0xc003109290, 0x2c}, 0xc002e803c0, 0x20fb, 0x20fc)
	test/e2e/apimachinery/webhook.go:826 +0xed2
k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.1()
	test/e2e/apimachinery/webhook.go:102 +0x226
There were additional failures detected after the initial failure:
[FAILED]
Nov 25 05:35:38.604: failed to list events in namespace "webhook-3044": Get "https://35.199.155.0/api/v1/namespaces/webhook-3044/events": dial tcp 35.199.155.0:443: connect: connection refused
In [DeferCleanup (Each)] at: test/e2e/framework/debug/dump.go:44
----------
[FAILED]
Nov 25 05:35:38.684: Couldn't delete ns: "webhook-3044": Delete "https://35.199.155.0/api/v1/namespaces/webhook-3044": dial tcp 35.199.155.0:443: connect: connection refused (&url.Error{Op:"Delete", URL:"https://35.199.155.0/api/v1/namespaces/webhook-3044", Err:(*net.OpError)(0xc002e801e0)}),Couldn't delete ns: "webhook-3044-markers": Delete "https://35.199.155.0/api/v1/namespaces/webhook-3044-markers": dial tcp 35.199.155.0:443: connect: connection refused (&url.Error{Op:"Delete", URL:"https://35.199.155.0/api/v1/namespaces/webhook-3044-markers", Err:(*net.OpError)(0xc0056959a0)})
In [DeferCleanup (Each)] at: test/e2e/framework/framework.go:370

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should honor timeout [Conformance] 3m43s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\shonor\stimeout\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:2170
k8s.io/kubernetes/test/e2e/apimachinery.registerSlowWebhook(0xc0011e0f00, {0xc0031f8100, 0xc}, 0xc002a6da40, 0xc000cd2800, 0xc0029236a8, 0x1ff690?)
	test/e2e/apimachinery/webhook.go:2170 +0x7f1
k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.15()
	test/e2e/apimachinery/webhook.go:386 +0xd2
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource [Conformance] 2m25s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\smutate\scustom\sresource\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:1808
k8s.io/kubernetes/test/e2e/apimachinery.registerMutatingWebhookForCustomResource(0xc000edbe00, {0xc001115210, 0xc}, 0xc0027a0aa0, 0xc001226240, 0x2f34f00?)
	test/e2e/apimachinery/webhook.go:1808 +0xd51
k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.11()
	test/e2e/apimachinery/webhook.go:297 +0xad
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Aggregator Should be able to support the 1.17 Sample API Server using the current Aggregator [Conformance] 4m29s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAggregator\sShould\sbe\sable\sto\ssupport\sthe\s1\.17\sSample\sAPI\sServer\susing\sthe\scurrent\sAggregator\s\[Conformance\]$'
test/e2e/apimachinery/aggregator.go:397
k8s.io/kubernetes/test/e2e/apimachinery.TestSampleAPIServer(0xc001244690, 0xc0047da1e0, {0xc0033cafc0, 0x37})
	test/e2e/apimachinery/aggregator.go:397 +0x31dd
k8s.io/kubernetes/test/e2e/apimachinery.glob..func1.3()
	test/e2e/apimachinery/aggregator.go:102 +0x125
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceConversionWebhook [Privileged:ClusterAdmin] should be able to convert from CR v1 to CR v2 [Conformance] 1m44s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceConversionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sbe\sable\sto\sconvert\sfrom\sCR\sv1\sto\sCR\sv2\s\[Conformance\]$'
test/e2e/apimachinery/crd_conversion_webhook.go:478
k8s.io/kubernetes/test/e2e/apimachinery.waitWebhookConversionReady(0xc000da8870?, 0xc004887180?, 0xc0042baa20?, {0x75b567e?, 0x2?})
	test/e2e/apimachinery/crd_conversion_webhook.go:478 +0xf3
k8s.io/kubernetes/test/e2e/apimachinery.glob..func5.3()
	test/e2e/apimachinery/crd_conversion_webhook.go:173 +0x113
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition getting/updating/patching custom resource definition status sub-resource works [Conformance] 2m23s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceDefinition\sresources\s\[Privileged\:ClusterAdmin\]\sSimple\sCustomResourceDefinition\sgetting\/updating\/patching\scustom\sresource\sdefinition\sstatus\ssub\-resource\sworks\s\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc001170c30)
	test/e2e/framework/framework.go:241 +0x96f