go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-apps\]\sDeployment\sRollingUpdateDeployment\sshould\sdelete\sold\spods\sand\screate\snew\sones\s\[Conformance\]$'
[FAILED] error waiting for deployment "test-rolling-update-deployment" status to match expectation: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} In [It] at: test/e2e/apps/deployment.go:779 @ 04/16/23 17:37:24.259from junit_01.xml
> Enter [BeforeEach] [sig-apps] Deployment - set up framework | framework.go:191 @ 04/16/23 17:32:17.601 STEP: Creating a kubernetes client - test/e2e/framework/framework.go:211 @ 04/16/23 17:32:17.601 Apr 16 17:32:17.601: INFO: >>> kubeConfig: /workspace/.kube/config STEP: Building a namespace api object, basename deployment - test/e2e/framework/framework.go:250 @ 04/16/23 17:32:17.602 STEP: Waiting for a default service account to be provisioned in namespace - test/e2e/framework/framework.go:259 @ 04/16/23 17:32:17.706 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace - test/e2e/framework/framework.go:262 @ 04/16/23 17:32:17.772 < Exit [BeforeEach] [sig-apps] Deployment - set up framework | framework.go:191 @ 04/16/23 17:32:17.837 (236ms) > Enter [BeforeEach] [sig-apps] Deployment - test/e2e/framework/metrics/init/init.go:33 @ 04/16/23 17:32:17.837 < Exit [BeforeEach] [sig-apps] Deployment - test/e2e/framework/metrics/init/init.go:33 @ 04/16/23 17:32:17.837 (0s) > Enter [BeforeEach] [sig-apps] Deployment - test/e2e/apps/deployment.go:91 @ 04/16/23 17:32:17.837 < Exit [BeforeEach] [sig-apps] Deployment - test/e2e/apps/deployment.go:91 @ 04/16/23 17:32:17.837 (0s) > Enter [It] RollingUpdateDeployment should delete old pods and create new ones [Conformance] - test/e2e/apps/deployment.go:105 @ 04/16/23 17:32:17.837 Apr 16 17:32:17.837: INFO: Creating replica set "test-rolling-update-controller" (going to be adopted) Apr 16 17:32:17.907: INFO: Pod name sample-pod: Found 1 pods out of 1 STEP: ensuring each pod is running - test/e2e/framework/pod/resource.go:125 @ 04/16/23 17:32:17.907 Apr 16 17:32:24.048: INFO: Creating deployment "test-rolling-update-deployment" Apr 16 17:32:24.084: INFO: Ensuring deployment "test-rolling-update-deployment" gets the next revision from the one the adopted replica set "test-rolling-update-controller" has Apr 16 17:32:24.153: INFO: Ensuring status for deployment "test-rolling-update-deployment" is the expected Apr 16 17:32:24.191: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:32:26.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:32:28.226: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:32:30.227: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:32:32.227: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:32:34.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:32:36.231: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:32:38.226: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:32:40.228: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:32:42.226: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:32:44.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:32:46.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:32:48.226: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:32:50.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:32:52.233: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:32:54.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:32:56.226: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:32:58.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:00.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:02.229: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:04.229: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:06.239: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:08.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:10.227: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:12.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:14.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:16.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:18.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:20.249: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:22.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:24.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:26.226: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:28.227: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:30.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:32.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:34.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:36.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:38.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:40.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:42.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:44.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:46.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:48.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:50.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:52.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:54.228: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:56.227: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:33:58.226: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:00.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:02.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:04.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:06.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:08.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:10.249: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:12.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:14.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:16.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:18.226: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:20.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:22.227: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:24.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:26.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:28.231: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:30.370: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:32.349: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:34.275: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:36.361: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:38.398: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:40.278: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:42.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:44.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:46.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:48.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:50.259: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:52.514: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:54.323: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:56.266: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:34:58.388: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:00.311: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:02.335: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:04.226: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:06.239: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:08.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:10.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:12.264: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:14.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:16.226: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:18.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:20.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:22.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:24.226: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:26.227: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:28.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:30.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:32.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:34.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:36.226: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:38.227: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:40.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:42.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:44.226: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:46.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:48.226: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:50.227: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:52.228: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:54.226: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:56.229: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:35:58.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:00.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:02.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:04.227: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:06.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:08.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:10.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:12.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:14.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:16.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:18.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:20.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:22.242: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:24.229: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:26.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:28.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:30.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:32.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:34.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:36.241: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:38.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:40.228: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:42.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:44.234: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:46.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:48.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:50.227: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:52.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:54.227: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:56.226: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:36:58.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:37:00.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:37:02.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:37:04.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:37:06.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:37:08.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:37:10.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:37:12.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:37:14.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:37:16.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Automatically polling progress: [sig-apps] Deployment RollingUpdateDeployment should delete old pods and create new ones [Conformance] (Spec Runtime: 5m0.236s) test/e2e/apps/deployment.go:105 In [It] (Node Runtime: 5m0s) test/e2e/apps/deployment.go:105 At [By Step] ensuring each pod is running (Step Runtime: 4m59.93s) test/e2e/framework/pod/resource.go:125 Spec Goroutine goroutine 2182 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7271598, 0xc00007c0d8}, 0xc00e228750, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7271598, 0xc00007c0d8}, 0x90?, 0x2bc9fa5?, 0x1?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7271598, 0xc00007c0d8}, 0x0?, 0xc00e197ce0?, 0x21c84a7?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediate(0x1?, 0xc00e197d60?, 0x21c80c8?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:157 k8s.io/kubernetes/test/utils.waitForDeploymentCompleteMaybeCheckRolling({0x72adfb0?, 0xc00eb9e000}, 0xc0006a1900, 0x0, 0x6d6b988, 0x1?, 0x1?) test/utils/deployment.go:81 k8s.io/kubernetes/test/utils.WaitForDeploymentComplete(...) test/utils/deployment.go:200 k8s.io/kubernetes/test/e2e/framework/deployment.WaitForDeploymentComplete(...) test/e2e/framework/deployment/wait.go:46 > k8s.io/kubernetes/test/e2e/apps.testRollingUpdateDeployment({0x7f355bfc80f0, 0xc00e1f04e0}, 0x723c300?) test/e2e/apps/deployment.go:778 > k8s.io/kubernetes/test/e2e/apps.glob..func5.4({0x7f355bfc80f0?, 0xc00e1f04e0?}) test/e2e/apps/deployment.go:106 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc00e1f04e0}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Apr 16 17:37:18.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:37:20.225: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:37:22.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:37:24.224: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:37:24.259: INFO: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} Apr 16 17:37:24.259: INFO: Unexpected error: <*errors.errorString | 0xc00affb0e0>: error waiting for deployment "test-rolling-update-deployment" status to match expectation: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} { s: "error waiting for deployment \"test-rolling-update-deployment\" status to match expectation: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:\"Available\", Status:\"True\", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:\"MinimumReplicasAvailable\", Message:\"Deployment has minimum availability.\"}, v1.DeploymentCondition{Type:\"Progressing\", Status:\"True\", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:\"ReplicaSetUpdated\", Message:\"ReplicaSet \\\"test-rolling-update-deployment-656d657cd8\\\" is progressing.\"}}, CollisionCount:(*int32)(nil)}", } [FAILED] error waiting for deployment "test-rolling-update-deployment" status to match expectation: deployment status: v1.DeploymentStatus{ObservedGeneration:1, Replicas:2, UpdatedReplicas:1, ReadyReplicas:1, AvailableReplicas:1, UnavailableReplicas:1, Conditions:[]v1.DeploymentCondition{v1.DeploymentCondition{Type:"Available", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"MinimumReplicasAvailable", Message:"Deployment has minimum availability."}, v1.DeploymentCondition{Type:"Progressing", Status:"True", LastUpdateTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), LastTransitionTime:time.Date(2023, time.April, 16, 17, 32, 24, 0, time.Local), Reason:"ReplicaSetUpdated", Message:"ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing."}}, CollisionCount:(*int32)(nil)} In [It] at: test/e2e/apps/deployment.go:779 @ 04/16/23 17:37:24.259 < Exit [It] RollingUpdateDeployment should delete old pods and create new ones [Conformance] - test/e2e/apps/deployment.go:105 @ 04/16/23 17:37:24.259 (5m6.422s) > Enter [AfterEach] [sig-apps] Deployment - test/e2e/apps/deployment.go:84 @ 04/16/23 17:37:24.259 Apr 16 17:37:24.293: INFO: Deployment "test-rolling-update-deployment": (v1.Deployment) { TypeMeta: (v1.TypeMeta) { Kind: (string) "", APIVersion: (string) "" }, ObjectMeta: (v1.ObjectMeta) { Name: (string) (len=30) "test-rolling-update-deployment", GenerateName: (string) "", Namespace: (string) (len=15) "deployment-4105", SelfLink: (string) "", UID: (types.UID) (len=36) "9e629bfb-9d17-450a-b025-55f980ba5a67", ResourceVersion: (string) (len=6) "820172", Generation: (int64) 1, CreationTimestamp: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263144, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }, DeletionTimestamp: (*v1.Time)(<nil>), DeletionGracePeriodSeconds: (*int64)(<nil>), Labels: (map[string]string) (len=1) { (string) (len=4) "name": (string) (len=10) "sample-pod" }, Annotations: (map[string]string) (len=1) { (string) (len=33) "deployment.kubernetes.io/revision": (string) (len=19) "3546343826724305833" }, OwnerReferences: ([]v1.OwnerReference) <nil>, Finalizers: ([]string) <nil>, ManagedFields: ([]v1.ManagedFieldsEntry) (len=2) { (v1.ManagedFieldsEntry) { Manager: (string) (len=8) "e2e.test", Operation: (v1.ManagedFieldsOperationType) (len=6) "Update", APIVersion: (string) (len=7) "apps/v1", Time: (*v1.Time)({ Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263144, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }), FieldsType: (string) (len=8) "FieldsV1", FieldsV1: (*v1.FieldsV1)({ Raw: ([]uint8) (len=637) { 00000000 7b 22 66 3a 6d 65 74 61 64 61 74 61 22 3a 7b 22 |{"f:metadata":{"| 00000010 66 3a 6c 61 62 65 6c 73 22 3a 7b 22 2e 22 3a 7b |f:labels":{".":{| 00000020 7d 2c 22 66 3a 6e 61 6d 65 22 3a 7b 7d 7d 7d 2c |},"f:name":{}}},| 00000030 22 66 3a 73 70 65 63 22 3a 7b 22 66 3a 70 72 6f |"f:spec":{"f:pro| 00000040 67 72 65 73 73 44 65 61 64 6c 69 6e 65 53 65 63 |gressDeadlineSec| 00000050 6f 6e 64 73 22 3a 7b 7d 2c 22 66 3a 72 65 70 6c |onds":{},"f:repl| 00000060 69 63 61 73 22 3a 7b 7d 2c 22 66 3a 72 65 76 69 |icas":{},"f:revi| 00000070 73 69 6f 6e 48 69 73 74 6f 72 79 4c 69 6d 69 74 |sionHistoryLimit| 00000080 22 3a 7b 7d 2c 22 66 3a 73 65 6c 65 63 74 6f 72 |":{},"f:selector| 00000090 22 3a 7b 7d 2c 22 66 3a 73 74 72 61 74 65 67 79 |":{},"f:strategy| 000000a0 22 3a 7b 22 66 3a 72 6f 6c 6c 69 6e 67 55 70 64 |":{"f:rollingUpd| 000000b0 61 74 65 22 3a 7b 22 2e 22 3a 7b 7d 2c 22 66 3a |ate":{".":{},"f:| 000000c0 6d 61 78 53 75 72 67 65 22 3a 7b 7d 2c 22 66 3a |maxSurge":{},"f:| 000000d0 6d 61 78 55 6e 61 76 61 69 6c 61 62 6c 65 22 3a |maxUnavailable":| 000000e0 7b 7d 7d 2c 22 66 3a 74 79 70 65 22 3a 7b 7d 7d |{}},"f:type":{}}| 000000f0 2c 22 66 3a 74 65 6d 70 6c 61 74 65 22 3a 7b 22 |,"f:template":{"| 00000100 66 3a 6d 65 74 61 64 61 74 61 22 3a 7b 22 66 3a |f:metadata":{"f:| 00000110 6c 61 62 65 6c 73 22 3a 7b 22 2e 22 3a 7b 7d 2c |labels":{".":{},| 00000120 22 66 3a 6e 61 6d 65 22 3a 7b 7d 7d 7d 2c 22 66 |"f:name":{}}},"f| 00000130 3a 73 70 65 63 22 3a 7b 22 66 3a 63 6f 6e 74 61 |:spec":{"f:conta| 00000140 69 6e 65 72 73 22 3a 7b 22 6b 3a 7b 5c 22 6e 61 |iners":{"k:{\"na| 00000150 6d 65 5c 22 3a 5c 22 61 67 6e 68 6f 73 74 5c 22 |me\":\"agnhost\"| 00000160 7d 22 3a 7b 22 2e 22 3a 7b 7d 2c 22 66 3a 69 6d |}":{".":{},"f:im| 00000170 61 67 65 22 3a 7b 7d 2c 22 66 3a 69 6d 61 67 65 |age":{},"f:image| 00000180 50 75 6c 6c 50 6f 6c 69 63 79 22 3a 7b 7d 2c 22 |PullPolicy":{},"| 00000190 66 3a 6e 61 6d 65 22 3a 7b 7d 2c 22 66 3a 72 65 |f:name":{},"f:re| 000001a0 73 6f 75 72 63 65 73 22 3a 7b 7d 2c 22 66 3a 73 |sources":{},"f:s| 000001b0 65 63 75 72 69 74 79 43 6f 6e 74 65 78 74 22 3a |ecurityContext":| 000001c0 7b 7d 2c 22 66 3a 74 65 72 6d 69 6e 61 74 69 6f |{},"f:terminatio| 000001d0 6e 4d 65 73 73 61 67 65 50 61 74 68 22 3a 7b 7d |nMessagePath":{}| 000001e0 2c 22 66 3a 74 65 72 6d 69 6e 61 74 69 6f 6e 4d |,"f:terminationM| 000001f0 65 73 73 61 67 65 50 6f 6c 69 63 79 22 3a 7b 7d |essagePolicy":{}| 00000200 7d 7d 2c 22 66 3a 64 6e 73 50 6f 6c 69 63 79 22 |}},"f:dnsPolicy"| 00000210 3a 7b 7d 2c 22 66 3a 72 65 73 74 61 72 74 50 6f |:{},"f:restartPo| 00000220 6c 69 63 79 22 3a 7b 7d 2c 22 66 3a 73 63 68 65 |licy":{},"f:sche| 00000230 64 75 6c 65 72 4e 61 6d 65 22 3a 7b 7d 2c 22 66 |dulerName":{},"f| 00000240 3a 73 65 63 75 72 69 74 79 43 6f 6e 74 65 78 74 |:securityContext| 00000250 22 3a 7b 7d 2c 22 66 3a 74 65 72 6d 69 6e 61 74 |":{},"f:terminat| 00000260 69 6f 6e 47 72 61 63 65 50 65 72 69 6f 64 53 65 |ionGracePeriodSe| 00000270 63 6f 6e 64 73 22 3a 7b 7d 7d 7d 7d 7d |conds":{}}}}}| } }), Subresource: (string) "" }, (v1.ManagedFieldsEntry) { Manager: (string) (len=23) "kube-controller-manager", Operation: (v1.ManagedFieldsOperationType) (len=6) "Update", APIVersion: (string) (len=7) "apps/v1", Time: (*v1.Time)({ Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263144, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }), FieldsType: (string) (len=8) "FieldsV1", FieldsV1: (*v1.FieldsV1)({ Raw: ([]uint8) (len=541) { 00000000 7b 22 66 3a 6d 65 74 61 64 61 74 61 22 3a 7b 22 |{"f:metadata":{"| 00000010 66 3a 61 6e 6e 6f 74 61 74 69 6f 6e 73 22 3a 7b |f:annotations":{| 00000020 22 2e 22 3a 7b 7d 2c 22 66 3a 64 65 70 6c 6f 79 |".":{},"f:deploy| 00000030 6d 65 6e 74 2e 6b 75 62 65 72 6e 65 74 65 73 2e |ment.kubernetes.| 00000040 69 6f 2f 72 65 76 69 73 69 6f 6e 22 3a 7b 7d 7d |io/revision":{}}| 00000050 7d 2c 22 66 3a 73 74 61 74 75 73 22 3a 7b 22 66 |},"f:status":{"f| 00000060 3a 61 76 61 69 6c 61 62 6c 65 52 65 70 6c 69 63 |:availableReplic| 00000070 61 73 22 3a 7b 7d 2c 22 66 3a 63 6f 6e 64 69 74 |as":{},"f:condit| 00000080 69 6f 6e 73 22 3a 7b 22 2e 22 3a 7b 7d 2c 22 6b |ions":{".":{},"k| 00000090 3a 7b 5c 22 74 79 70 65 5c 22 3a 5c 22 41 76 61 |:{\"type\":\"Ava| 000000a0 69 6c 61 62 6c 65 5c 22 7d 22 3a 7b 22 2e 22 3a |ilable\"}":{".":| 000000b0 7b 7d 2c 22 66 3a 6c 61 73 74 54 72 61 6e 73 69 |{},"f:lastTransi| 000000c0 74 69 6f 6e 54 69 6d 65 22 3a 7b 7d 2c 22 66 3a |tionTime":{},"f:| 000000d0 6c 61 73 74 55 70 64 61 74 65 54 69 6d 65 22 3a |lastUpdateTime":| 000000e0 7b 7d 2c 22 66 3a 6d 65 73 73 61 67 65 22 3a 7b |{},"f:message":{| 000000f0 7d 2c 22 66 3a 72 65 61 73 6f 6e 22 3a 7b 7d 2c |},"f:reason":{},| 00000100 22 66 3a 73 74 61 74 75 73 22 3a 7b 7d 2c 22 66 |"f:status":{},"f| 00000110 3a 74 79 70 65 22 3a 7b 7d 7d 2c 22 6b 3a 7b 5c |:type":{}},"k:{\| 00000120 22 74 79 70 65 5c 22 3a 5c 22 50 72 6f 67 72 65 |"type\":\"Progre| 00000130 73 73 69 6e 67 5c 22 7d 22 3a 7b 22 2e 22 3a 7b |ssing\"}":{".":{| 00000140 7d 2c 22 66 3a 6c 61 73 74 54 72 61 6e 73 69 74 |},"f:lastTransit| 00000150 69 6f 6e 54 69 6d 65 22 3a 7b 7d 2c 22 66 3a 6c |ionTime":{},"f:l| 00000160 61 73 74 55 70 64 61 74 65 54 69 6d 65 22 3a 7b |astUpdateTime":{| 00000170 7d 2c 22 66 3a 6d 65 73 73 61 67 65 22 3a 7b 7d |},"f:message":{}| 00000180 2c 22 66 3a 72 65 61 73 6f 6e 22 3a 7b 7d 2c 22 |,"f:reason":{},"| 00000190 66 3a 73 74 61 74 75 73 22 3a 7b 7d 2c 22 66 3a |f:status":{},"f:| 000001a0 74 79 70 65 22 3a 7b 7d 7d 7d 2c 22 66 3a 6f 62 |type":{}}},"f:ob| 000001b0 73 65 72 76 65 64 47 65 6e 65 72 61 74 69 6f 6e |servedGeneration| 000001c0 22 3a 7b 7d 2c 22 66 3a 72 65 61 64 79 52 65 70 |":{},"f:readyRep| 000001d0 6c 69 63 61 73 22 3a 7b 7d 2c 22 66 3a 72 65 70 |licas":{},"f:rep| 000001e0 6c 69 63 61 73 22 3a 7b 7d 2c 22 66 3a 75 6e 61 |licas":{},"f:una| 000001f0 76 61 69 6c 61 62 6c 65 52 65 70 6c 69 63 61 73 |vailableReplicas| 00000200 22 3a 7b 7d 2c 22 66 3a 75 70 64 61 74 65 64 52 |":{},"f:updatedR| 00000210 65 70 6c 69 63 61 73 22 3a 7b 7d 7d 7d |eplicas":{}}}| } }), Subresource: (string) (len=6) "status" } } }, Spec: (v1.DeploymentSpec) { Replicas: (*int32)(1), Selector: (*v1.LabelSelector)({ MatchLabels: (map[string]string) (len=1) { (string) (len=4) "name": (string) (len=10) "sample-pod" }, MatchExpressions: ([]v1.LabelSelectorRequirement) <nil> }), Template: (v1.PodTemplateSpec) { ObjectMeta: (v1.ObjectMeta) { Name: (string) "", GenerateName: (string) "", Namespace: (string) "", SelfLink: (string) "", UID: (types.UID) "", ResourceVersion: (string) "", Generation: (int64) 0, CreationTimestamp: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 0, loc: (*time.Location)(<nil>) } }, DeletionTimestamp: (*v1.Time)(<nil>), DeletionGracePeriodSeconds: (*int64)(<nil>), Labels: (map[string]string) (len=1) { (string) (len=4) "name": (string) (len=10) "sample-pod" }, Annotations: (map[string]string) <nil>, OwnerReferences: ([]v1.OwnerReference) <nil>, Finalizers: ([]string) <nil>, ManagedFields: ([]v1.ManagedFieldsEntry) <nil> }, Spec: (v1.PodSpec) { Volumes: ([]v1.Volume) <nil>, InitContainers: ([]v1.Container) <nil>, Containers: ([]v1.Container) (len=1) { (v1.Container) { Name: (string) (len=7) "agnhost", Image: (string) (len=44) "registry.k8s.io/e2e-test-images/agnhost:2.43", Command: ([]string) <nil>, Args: ([]string) <nil>, WorkingDir: (string) "", Ports: ([]v1.ContainerPort) <nil>, EnvFrom: ([]v1.EnvFromSource) <nil>, Env: ([]v1.EnvVar) <nil>, Resources: (v1.ResourceRequirements) { Limits: (v1.ResourceList) <nil>, Requests: (v1.ResourceList) <nil>, Claims: ([]v1.ResourceClaim) <nil> }, ResizePolicy: ([]v1.ContainerResizePolicy) <nil>, VolumeMounts: ([]v1.VolumeMount) <nil>, VolumeDevices: ([]v1.VolumeDevice) <nil>, LivenessProbe: (*v1.Probe)(<nil>), ReadinessProbe: (*v1.Probe)(<nil>), StartupProbe: (*v1.Probe)(<nil>), Lifecycle: (*v1.Lifecycle)(<nil>), TerminationMessagePath: (string) (len=20) "/dev/termination-log", TerminationMessagePolicy: (v1.TerminationMessagePolicy) (len=4) "File", ImagePullPolicy: (v1.PullPolicy) (len=12) "IfNotPresent", SecurityContext: (*v1.SecurityContext)({ Capabilities: (*v1.Capabilities)(<nil>), Privileged: (*bool)(<nil>), SELinuxOptions: (*v1.SELinuxOptions)(<nil>), WindowsOptions: (*v1.WindowsSecurityContextOptions)(<nil>), RunAsUser: (*int64)(<nil>), RunAsGroup: (*int64)(<nil>), RunAsNonRoot: (*bool)(<nil>), ReadOnlyRootFilesystem: (*bool)(<nil>), AllowPrivilegeEscalation: (*bool)(<nil>), ProcMount: (*v1.ProcMountType)(<nil>), SeccompProfile: (*v1.SeccompProfile)(<nil>) }), Stdin: (bool) false, StdinOnce: (bool) false, TTY: (bool) false } }, EphemeralContainers: ([]v1.EphemeralContainer) <nil>, RestartPolicy: (v1.RestartPolicy) (len=6) "Always", TerminationGracePeriodSeconds: (*int64)(0), ActiveDeadlineSeconds: (*int64)(<nil>), DNSPolicy: (v1.DNSPolicy) (len=12) "ClusterFirst", NodeSelector: (map[string]string) <nil>, ServiceAccountName: (string) "", DeprecatedServiceAccount: (string) "", AutomountServiceAccountToken: (*bool)(<nil>), NodeName: (string) "", HostNetwork: (bool) false, HostPID: (bool) false, HostIPC: (bool) false, ShareProcessNamespace: (*bool)(<nil>), SecurityContext: (*v1.PodSecurityContext)({ SELinuxOptions: (*v1.SELinuxOptions)(<nil>), WindowsOptions: (*v1.WindowsSecurityContextOptions)(<nil>), RunAsUser: (*int64)(<nil>), RunAsGroup: (*int64)(<nil>), RunAsNonRoot: (*bool)(<nil>), SupplementalGroups: ([]int64) <nil>, FSGroup: (*int64)(<nil>), Sysctls: ([]v1.Sysctl) <nil>, FSGroupChangePolicy: (*v1.PodFSGroupChangePolicy)(<nil>), SeccompProfile: (*v1.SeccompProfile)(<nil>) }), ImagePullSecrets: ([]v1.LocalObjectReference) <nil>, Hostname: (string) "", Subdomain: (string) "", Affinity: (*v1.Affinity)(<nil>), SchedulerName: (string) (len=17) "default-scheduler", Tolerations: ([]v1.Toleration) <nil>, HostAliases: ([]v1.HostAlias) <nil>, PriorityClassName: (string) "", Priority: (*int32)(<nil>), DNSConfig: (*v1.PodDNSConfig)(<nil>), ReadinessGates: ([]v1.PodReadinessGate) <nil>, RuntimeClassName: (*string)(<nil>), EnableServiceLinks: (*bool)(<nil>), PreemptionPolicy: (*v1.PreemptionPolicy)(<nil>), Overhead: (v1.ResourceList) <nil>, TopologySpreadConstraints: ([]v1.TopologySpreadConstraint) <nil>, SetHostnameAsFQDN: (*bool)(<nil>), OS: (*v1.PodOS)(<nil>), HostUsers: (*bool)(<nil>), SchedulingGates: ([]v1.PodSchedulingGate) <nil>, ResourceClaims: ([]v1.PodResourceClaim) <nil> } }, Strategy: (v1.DeploymentStrategy) { Type: (v1.DeploymentStrategyType) (len=13) "RollingUpdate", RollingUpdate: (*v1.RollingUpdateDeployment)({ MaxUnavailable: (*intstr.IntOrString)({ Type: (intstr.Type) 1, IntVal: (int32) 0, StrVal: (string) (len=3) "25%" }), MaxSurge: (*intstr.IntOrString)({ Type: (intstr.Type) 1, IntVal: (int32) 0, StrVal: (string) (len=3) "25%" }) }) }, MinReadySeconds: (int32) 0, RevisionHistoryLimit: (*int32)(10), Paused: (bool) false, ProgressDeadlineSeconds: (*int32)(600) }, Status: (v1.DeploymentStatus) { ObservedGeneration: (int64) 1, Replicas: (int32) 2, UpdatedReplicas: (int32) 1, ReadyReplicas: (int32) 1, AvailableReplicas: (int32) 1, UnavailableReplicas: (int32) 1, Conditions: ([]v1.DeploymentCondition) (len=2) { (v1.DeploymentCondition) { Type: (v1.DeploymentConditionType) (len=9) "Available", Status: (v1.ConditionStatus) (len=4) "True", LastUpdateTime: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263144, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }, LastTransitionTime: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263144, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }, Reason: (string) (len=24) "MinimumReplicasAvailable", Message: (string) (len=36) "Deployment has minimum availability." }, (v1.DeploymentCondition) { Type: (v1.DeploymentConditionType) (len=11) "Progressing", Status: (v1.ConditionStatus) (len=4) "True", LastUpdateTime: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263144, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }, LastTransitionTime: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263144, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }, Reason: (string) (len=17) "ReplicaSetUpdated", Message: (string) (len=70) "ReplicaSet \"test-rolling-update-deployment-656d657cd8\" is progressing." } }, CollisionCount: (*int32)(<nil>) } } Apr 16 17:37:24.326: INFO: New ReplicaSet "test-rolling-update-deployment-656d657cd8" of Deployment "test-rolling-update-deployment": (v1.ReplicaSet) { TypeMeta: (v1.TypeMeta) { Kind: (string) "", APIVersion: (string) "" }, ObjectMeta: (v1.ObjectMeta) { Name: (string) (len=41) "test-rolling-update-deployment-656d657cd8", GenerateName: (string) "", Namespace: (string) (len=15) "deployment-4105", SelfLink: (string) "", UID: (types.UID) (len=36) "56d713f1-1214-4b10-a726-e00bf7ec3cf1", ResourceVersion: (string) (len=6) "820171", Generation: (int64) 1, CreationTimestamp: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263144, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }, DeletionTimestamp: (*v1.Time)(<nil>), DeletionGracePeriodSeconds: (*int64)(<nil>), Labels: (map[string]string) (len=2) { (string) (len=4) "name": (string) (len=10) "sample-pod", (string) (len=17) "pod-template-hash": (string) (len=10) "656d657cd8" }, Annotations: (map[string]string) (len=3) { (string) (len=41) "deployment.kubernetes.io/desired-replicas": (string) (len=1) "1", (string) (len=37) "deployment.kubernetes.io/max-replicas": (string) (len=1) "2", (string) (len=33) "deployment.kubernetes.io/revision": (string) (len=19) "3546343826724305833" }, OwnerReferences: ([]v1.OwnerReference) (len=1) { (v1.OwnerReference) { APIVersion: (string) (len=7) "apps/v1", Kind: (string) (len=10) "Deployment", Name: (string) (len=30) "test-rolling-update-deployment", UID: (types.UID) (len=36) "9e629bfb-9d17-450a-b025-55f980ba5a67", Controller: (*bool)(true), BlockOwnerDeletion: (*bool)(true) } }, Finalizers: ([]string) <nil>, ManagedFields: ([]v1.ManagedFieldsEntry) (len=2) { (v1.ManagedFieldsEntry) { Manager: (string) (len=23) "kube-controller-manager", Operation: (v1.ManagedFieldsOperationType) (len=6) "Update", APIVersion: (string) (len=7) "apps/v1", Time: (*v1.Time)({ Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263144, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }), FieldsType: (string) (len=8) "FieldsV1", FieldsV1: (*v1.FieldsV1)({ Raw: ([]uint8) (len=783) { 00000000 7b 22 66 3a 6d 65 74 61 64 61 74 61 22 3a 7b 22 |{"f:metadata":{"| 00000010 66 3a 61 6e 6e 6f 74 61 74 69 6f 6e 73 22 3a 7b |f:annotations":{| 00000020 22 2e 22 3a 7b 7d 2c 22 66 3a 64 65 70 6c 6f 79 |".":{},"f:deploy| 00000030 6d 65 6e 74 2e 6b 75 62 65 72 6e 65 74 65 73 2e |ment.kubernetes.| 00000040 69 6f 2f 64 65 73 69 72 65 64 2d 72 65 70 6c 69 |io/desired-repli| 00000050 63 61 73 22 3a 7b 7d 2c 22 66 3a 64 65 70 6c 6f |cas":{},"f:deplo| 00000060 79 6d 65 6e 74 2e 6b 75 62 65 72 6e 65 74 65 73 |yment.kubernetes| 00000070 2e 69 6f 2f 6d 61 78 2d 72 65 70 6c 69 63 61 73 |.io/max-replicas| 00000080 22 3a 7b 7d 2c 22 66 3a 64 65 70 6c 6f 79 6d 65 |":{},"f:deployme| 00000090 6e 74 2e 6b 75 62 65 72 6e 65 74 65 73 2e 69 6f |nt.kubernetes.io| 000000a0 2f 72 65 76 69 73 69 6f 6e 22 3a 7b 7d 7d 2c 22 |/revision":{}},"| 000000b0 66 3a 6c 61 62 65 6c 73 22 3a 7b 22 2e 22 3a 7b |f:labels":{".":{| 000000c0 7d 2c 22 66 3a 6e 61 6d 65 22 3a 7b 7d 2c 22 66 |},"f:name":{},"f| 000000d0 3a 70 6f 64 2d 74 65 6d 70 6c 61 74 65 2d 68 61 |:pod-template-ha| 000000e0 73 68 22 3a 7b 7d 7d 2c 22 66 3a 6f 77 6e 65 72 |sh":{}},"f:owner| 000000f0 52 65 66 65 72 65 6e 63 65 73 22 3a 7b 22 2e 22 |References":{"."| 00000100 3a 7b 7d 2c 22 6b 3a 7b 5c 22 75 69 64 5c 22 3a |:{},"k:{\"uid\":| 00000110 5c 22 39 65 36 32 39 62 66 62 2d 39 64 31 37 2d |\"9e629bfb-9d17-| 00000120 34 35 30 61 2d 62 30 32 35 2d 35 35 66 39 38 30 |450a-b025-55f980| 00000130 62 61 35 61 36 37 5c 22 7d 22 3a 7b 7d 7d 7d 2c |ba5a67\"}":{}}},| 00000140 22 66 3a 73 70 65 63 22 3a 7b 22 66 3a 72 65 70 |"f:spec":{"f:rep| 00000150 6c 69 63 61 73 22 3a 7b 7d 2c 22 66 3a 73 65 6c |licas":{},"f:sel| 00000160 65 63 74 6f 72 22 3a 7b 7d 2c 22 66 3a 74 65 6d |ector":{},"f:tem| 00000170 70 6c 61 74 65 22 3a 7b 22 66 3a 6d 65 74 61 64 |plate":{"f:metad| 00000180 61 74 61 22 3a 7b 22 66 3a 6c 61 62 65 6c 73 22 |ata":{"f:labels"| 00000190 3a 7b 22 2e 22 3a 7b 7d 2c 22 66 3a 6e 61 6d 65 |:{".":{},"f:name| 000001a0 22 3a 7b 7d 2c 22 66 3a 70 6f 64 2d 74 65 6d 70 |":{},"f:pod-temp| 000001b0 6c 61 74 65 2d 68 61 73 68 22 3a 7b 7d 7d 7d 2c |late-hash":{}}},| 000001c0 22 66 3a 73 70 65 63 22 3a 7b 22 66 3a 63 6f 6e |"f:spec":{"f:con| 000001d0 74 61 69 6e 65 72 73 22 3a 7b 22 6b 3a 7b 5c 22 |tainers":{"k:{\"| 000001e0 6e 61 6d 65 5c 22 3a 5c 22 61 67 6e 68 6f 73 74 |name\":\"agnhost| 000001f0 5c 22 7d 22 3a 7b 22 2e 22 3a 7b 7d 2c 22 66 3a |\"}":{".":{},"f:| 00000200 69 6d 61 67 65 22 3a 7b 7d 2c 22 66 3a 69 6d 61 |image":{},"f:ima| 00000210 67 65 50 75 6c 6c 50 6f 6c 69 63 79 22 3a 7b 7d |gePullPolicy":{}| 00000220 2c 22 66 3a 6e 61 6d 65 22 3a 7b 7d 2c 22 66 3a |,"f:name":{},"f:| 00000230 72 65 73 6f 75 72 63 65 73 22 3a 7b 7d 2c 22 66 |resources":{},"f| 00000240 3a 73 65 63 75 72 69 74 79 43 6f 6e 74 65 78 74 |:securityContext| 00000250 22 3a 7b 7d 2c 22 66 3a 74 65 72 6d 69 6e 61 74 |":{},"f:terminat| 00000260 69 6f 6e 4d 65 73 73 61 67 65 50 61 74 68 22 3a |ionMessagePath":| 00000270 7b 7d 2c 22 66 3a 74 65 72 6d 69 6e 61 74 69 6f |{},"f:terminatio| 00000280 6e 4d 65 73 73 61 67 65 50 6f 6c 69 63 79 22 3a |nMessagePolicy":| 00000290 7b 7d 7d 7d 2c 22 66 3a 64 6e 73 50 6f 6c 69 63 |{}}},"f:dnsPolic| 000002a0 79 22 3a 7b 7d 2c 22 66 3a 72 65 73 74 61 72 74 |y":{},"f:restart| 000002b0 50 6f 6c 69 63 79 22 3a 7b 7d 2c 22 66 3a 73 63 |Policy":{},"f:sc| 000002c0 68 65 64 75 6c 65 72 4e 61 6d 65 22 3a 7b 7d 2c |hedulerName":{},| 000002d0 22 66 3a 73 65 63 75 72 69 74 79 43 6f 6e 74 65 |"f:securityConte| 000002e0 78 74 22 3a 7b 7d 2c 22 66 3a 74 65 72 6d 69 6e |xt":{},"f:termin| 000002f0 61 74 69 6f 6e 47 72 61 63 65 50 65 72 69 6f 64 |ationGracePeriod| 00000300 53 65 63 6f 6e 64 73 22 3a 7b 7d 7d 7d 7d 7d |Seconds":{}}}}}| } }), Subresource: (string) "" }, (v1.ManagedFieldsEntry) { Manager: (string) (len=23) "kube-controller-manager", Operation: (v1.ManagedFieldsOperationType) (len=6) "Update", APIVersion: (string) (len=7) "apps/v1", Time: (*v1.Time)({ Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263144, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }), FieldsType: (string) (len=8) "FieldsV1", FieldsV1: (*v1.FieldsV1)({ Raw: ([]uint8) (len=84) { 00000000 7b 22 66 3a 73 74 61 74 75 73 22 3a 7b 22 66 3a |{"f:status":{"f:| 00000010 66 75 6c 6c 79 4c 61 62 65 6c 65 64 52 65 70 6c |fullyLabeledRepl| 00000020 69 63 61 73 22 3a 7b 7d 2c 22 66 3a 6f 62 73 65 |icas":{},"f:obse| 00000030 72 76 65 64 47 65 6e 65 72 61 74 69 6f 6e 22 3a |rvedGeneration":| 00000040 7b 7d 2c 22 66 3a 72 65 70 6c 69 63 61 73 22 3a |{},"f:replicas":| 00000050 7b 7d 7d 7d |{}}}| } }), Subresource: (string) (len=6) "status" } } }, Spec: (v1.ReplicaSetSpec) { Replicas: (*int32)(1), MinReadySeconds: (int32) 0, Selector: (*v1.LabelSelector)({ MatchLabels: (map[string]string) (len=2) { (string) (len=4) "name": (string) (len=10) "sample-pod", (string) (len=17) "pod-template-hash": (string) (len=10) "656d657cd8" }, MatchExpressions: ([]v1.LabelSelectorRequirement) <nil> }), Template: (v1.PodTemplateSpec) { ObjectMeta: (v1.ObjectMeta) { Name: (string) "", GenerateName: (string) "", Namespace: (string) "", SelfLink: (string) "", UID: (types.UID) "", ResourceVersion: (string) "", Generation: (int64) 0, CreationTimestamp: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 0, loc: (*time.Location)(<nil>) } }, DeletionTimestamp: (*v1.Time)(<nil>), DeletionGracePeriodSeconds: (*int64)(<nil>), Labels: (map[string]string) (len=2) { (string) (len=4) "name": (string) (len=10) "sample-pod", (string) (len=17) "pod-template-hash": (string) (len=10) "656d657cd8" }, Annotations: (map[string]string) <nil>, OwnerReferences: ([]v1.OwnerReference) <nil>, Finalizers: ([]string) <nil>, ManagedFields: ([]v1.ManagedFieldsEntry) <nil> }, Spec: (v1.PodSpec) { Volumes: ([]v1.Volume) <nil>, InitContainers: ([]v1.Container) <nil>, Containers: ([]v1.Container) (len=1) { (v1.Container) { Name: (string) (len=7) "agnhost", Image: (string) (len=44) "registry.k8s.io/e2e-test-images/agnhost:2.43", Command: ([]string) <nil>, Args: ([]string) <nil>, WorkingDir: (string) "", Ports: ([]v1.ContainerPort) <nil>, EnvFrom: ([]v1.EnvFromSource) <nil>, Env: ([]v1.EnvVar) <nil>, Resources: (v1.ResourceRequirements) { Limits: (v1.ResourceList) <nil>, Requests: (v1.ResourceList) <nil>, Claims: ([]v1.ResourceClaim) <nil> }, ResizePolicy: ([]v1.ContainerResizePolicy) <nil>, VolumeMounts: ([]v1.VolumeMount) <nil>, VolumeDevices: ([]v1.VolumeDevice) <nil>, LivenessProbe: (*v1.Probe)(<nil>), ReadinessProbe: (*v1.Probe)(<nil>), StartupProbe: (*v1.Probe)(<nil>), Lifecycle: (*v1.Lifecycle)(<nil>), TerminationMessagePath: (string) (len=20) "/dev/termination-log", TerminationMessagePolicy: (v1.TerminationMessagePolicy) (len=4) "File", ImagePullPolicy: (v1.PullPolicy) (len=12) "IfNotPresent", SecurityContext: (*v1.SecurityContext)({ Capabilities: (*v1.Capabilities)(<nil>), Privileged: (*bool)(<nil>), SELinuxOptions: (*v1.SELinuxOptions)(<nil>), WindowsOptions: (*v1.WindowsSecurityContextOptions)(<nil>), RunAsUser: (*int64)(<nil>), RunAsGroup: (*int64)(<nil>), RunAsNonRoot: (*bool)(<nil>), ReadOnlyRootFilesystem: (*bool)(<nil>), AllowPrivilegeEscalation: (*bool)(<nil>), ProcMount: (*v1.ProcMountType)(<nil>), SeccompProfile: (*v1.SeccompProfile)(<nil>) }), Stdin: (bool) false, StdinOnce: (bool) false, TTY: (bool) false } }, EphemeralContainers: ([]v1.EphemeralContainer) <nil>, RestartPolicy: (v1.RestartPolicy) (len=6) "Always", TerminationGracePeriodSeconds: (*int64)(0), ActiveDeadlineSeconds: (*int64)(<nil>), DNSPolicy: (v1.DNSPolicy) (len=12) "ClusterFirst", NodeSelector: (map[string]string) <nil>, ServiceAccountName: (string) "", DeprecatedServiceAccount: (string) "", AutomountServiceAccountToken: (*bool)(<nil>), NodeName: (string) "", HostNetwork: (bool) false, HostPID: (bool) false, HostIPC: (bool) false, ShareProcessNamespace: (*bool)(<nil>), SecurityContext: (*v1.PodSecurityContext)({ SELinuxOptions: (*v1.SELinuxOptions)(<nil>), WindowsOptions: (*v1.WindowsSecurityContextOptions)(<nil>), RunAsUser: (*int64)(<nil>), RunAsGroup: (*int64)(<nil>), RunAsNonRoot: (*bool)(<nil>), SupplementalGroups: ([]int64) <nil>, FSGroup: (*int64)(<nil>), Sysctls: ([]v1.Sysctl) <nil>, FSGroupChangePolicy: (*v1.PodFSGroupChangePolicy)(<nil>), SeccompProfile: (*v1.SeccompProfile)(<nil>) }), ImagePullSecrets: ([]v1.LocalObjectReference) <nil>, Hostname: (string) "", Subdomain: (string) "", Affinity: (*v1.Affinity)(<nil>), SchedulerName: (string) (len=17) "default-scheduler", Tolerations: ([]v1.Toleration) <nil>, HostAliases: ([]v1.HostAlias) <nil>, PriorityClassName: (string) "", Priority: (*int32)(<nil>), DNSConfig: (*v1.PodDNSConfig)(<nil>), ReadinessGates: ([]v1.PodReadinessGate) <nil>, RuntimeClassName: (*string)(<nil>), EnableServiceLinks: (*bool)(<nil>), PreemptionPolicy: (*v1.PreemptionPolicy)(<nil>), Overhead: (v1.ResourceList) <nil>, TopologySpreadConstraints: ([]v1.TopologySpreadConstraint) <nil>, SetHostnameAsFQDN: (*bool)(<nil>), OS: (*v1.PodOS)(<nil>), HostUsers: (*bool)(<nil>), SchedulingGates: ([]v1.PodSchedulingGate) <nil>, ResourceClaims: ([]v1.PodResourceClaim) <nil> } } }, Status: (v1.ReplicaSetStatus) { Replicas: (int32) 1, FullyLabeledReplicas: (int32) 1, ReadyReplicas: (int32) 0, AvailableReplicas: (int32) 0, ObservedGeneration: (int64) 1, Conditions: ([]v1.ReplicaSetCondition) <nil> } } Apr 16 17:37:24.326: INFO: All old ReplicaSets of Deployment "test-rolling-update-deployment": Apr 16 17:37:24.326: INFO: (v1.ReplicaSet) { TypeMeta: (v1.TypeMeta) { Kind: (string) "", APIVersion: (string) "" }, ObjectMeta: (v1.ObjectMeta) { Name: (string) (len=30) "test-rolling-update-controller", GenerateName: (string) "", Namespace: (string) (len=15) "deployment-4105", SelfLink: (string) "", UID: (types.UID) (len=36) "5d932d0c-328a-48d5-8616-c64c2500719d", ResourceVersion: (string) (len=6) "820148", Generation: (int64) 1, CreationTimestamp: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263137, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }, DeletionTimestamp: (*v1.Time)(<nil>), DeletionGracePeriodSeconds: (*int64)(<nil>), Labels: (map[string]string) (len=2) { (string) (len=4) "name": (string) (len=10) "sample-pod", (string) (len=3) "pod": (string) (len=5) "httpd" }, Annotations: (map[string]string) (len=1) { (string) (len=33) "deployment.kubernetes.io/revision": (string) (len=19) "3546343826724305832" }, OwnerReferences: ([]v1.OwnerReference) (len=1) { (v1.OwnerReference) { APIVersion: (string) (len=7) "apps/v1", Kind: (string) (len=10) "Deployment", Name: (string) (len=30) "test-rolling-update-deployment", UID: (types.UID) (len=36) "9e629bfb-9d17-450a-b025-55f980ba5a67", Controller: (*bool)(true), BlockOwnerDeletion: (*bool)(true) } }, Finalizers: ([]string) <nil>, ManagedFields: ([]v1.ManagedFieldsEntry) (len=3) { (v1.ManagedFieldsEntry) { Manager: (string) (len=8) "e2e.test", Operation: (v1.ManagedFieldsOperationType) (len=6) "Update", APIVersion: (string) (len=7) "apps/v1", Time: (*v1.Time)({ Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263137, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }), FieldsType: (string) (len=8) "FieldsV1", FieldsV1: (*v1.FieldsV1)({ Raw: ([]uint8) (len=549) { 00000000 7b 22 66 3a 6d 65 74 61 64 61 74 61 22 3a 7b 22 |{"f:metadata":{"| 00000010 66 3a 61 6e 6e 6f 74 61 74 69 6f 6e 73 22 3a 7b |f:annotations":{| 00000020 22 2e 22 3a 7b 7d 2c 22 66 3a 64 65 70 6c 6f 79 |".":{},"f:deploy| 00000030 6d 65 6e 74 2e 6b 75 62 65 72 6e 65 74 65 73 2e |ment.kubernetes.| 00000040 69 6f 2f 72 65 76 69 73 69 6f 6e 22 3a 7b 7d 7d |io/revision":{}}| 00000050 2c 22 66 3a 6c 61 62 65 6c 73 22 3a 7b 22 2e 22 |,"f:labels":{"."| 00000060 3a 7b 7d 2c 22 66 3a 6e 61 6d 65 22 3a 7b 7d 2c |:{},"f:name":{},| 00000070 22 66 3a 70 6f 64 22 3a 7b 7d 7d 7d 2c 22 66 3a |"f:pod":{}}},"f:| 00000080 73 70 65 63 22 3a 7b 22 66 3a 72 65 70 6c 69 63 |spec":{"f:replic| 00000090 61 73 22 3a 7b 7d 2c 22 66 3a 73 65 6c 65 63 74 |as":{},"f:select| 000000a0 6f 72 22 3a 7b 7d 2c 22 66 3a 74 65 6d 70 6c 61 |or":{},"f:templa| 000000b0 74 65 22 3a 7b 22 66 3a 6d 65 74 61 64 61 74 61 |te":{"f:metadata| 000000c0 22 3a 7b 22 66 3a 6c 61 62 65 6c 73 22 3a 7b 22 |":{"f:labels":{"| 000000d0 2e 22 3a 7b 7d 2c 22 66 3a 6e 61 6d 65 22 3a 7b |.":{},"f:name":{| 000000e0 7d 2c 22 66 3a 70 6f 64 22 3a 7b 7d 7d 7d 2c 22 |},"f:pod":{}}},"| 000000f0 66 3a 73 70 65 63 22 3a 7b 22 66 3a 63 6f 6e 74 |f:spec":{"f:cont| 00000100 61 69 6e 65 72 73 22 3a 7b 22 6b 3a 7b 5c 22 6e |ainers":{"k:{\"n| 00000110 61 6d 65 5c 22 3a 5c 22 68 74 74 70 64 5c 22 7d |ame\":\"httpd\"}| 00000120 22 3a 7b 22 2e 22 3a 7b 7d 2c 22 66 3a 69 6d 61 |":{".":{},"f:ima| 00000130 67 65 22 3a 7b 7d 2c 22 66 3a 69 6d 61 67 65 50 |ge":{},"f:imageP| 00000140 75 6c 6c 50 6f 6c 69 63 79 22 3a 7b 7d 2c 22 66 |ullPolicy":{},"f| 00000150 3a 6e 61 6d 65 22 3a 7b 7d 2c 22 66 3a 72 65 73 |:name":{},"f:res| 00000160 6f 75 72 63 65 73 22 3a 7b 7d 2c 22 66 3a 74 65 |ources":{},"f:te| 00000170 72 6d 69 6e 61 74 69 6f 6e 4d 65 73 73 61 67 65 |rminationMessage| 00000180 50 61 74 68 22 3a 7b 7d 2c 22 66 3a 74 65 72 6d |Path":{},"f:term| 00000190 69 6e 61 74 69 6f 6e 4d 65 73 73 61 67 65 50 6f |inationMessagePo| 000001a0 6c 69 63 79 22 3a 7b 7d 7d 7d 2c 22 66 3a 64 6e |licy":{}}},"f:dn| 000001b0 73 50 6f 6c 69 63 79 22 3a 7b 7d 2c 22 66 3a 72 |sPolicy":{},"f:r| 000001c0 65 73 74 61 72 74 50 6f 6c 69 63 79 22 3a 7b 7d |estartPolicy":{}| 000001d0 2c 22 66 3a 73 63 68 65 64 75 6c 65 72 4e 61 6d |,"f:schedulerNam| 000001e0 65 22 3a 7b 7d 2c 22 66 3a 73 65 63 75 72 69 74 |e":{},"f:securit| 000001f0 79 43 6f 6e 74 65 78 74 22 3a 7b 7d 2c 22 66 3a |yContext":{},"f:| 00000200 74 65 72 6d 69 6e 61 74 69 6f 6e 47 72 61 63 65 |terminationGrace| 00000210 50 65 72 69 6f 64 53 65 63 6f 6e 64 73 22 3a 7b |PeriodSeconds":{| 00000220 7d 7d 7d 7d 7d |}}}}}| } }), Subresource: (string) "" }, (v1.ManagedFieldsEntry) { Manager: (string) (len=23) "kube-controller-manager", Operation: (v1.ManagedFieldsOperationType) (len=6) "Update", APIVersion: (string) (len=7) "apps/v1", Time: (*v1.Time)({ Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263143, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }), FieldsType: (string) (len=8) "FieldsV1", FieldsV1: (*v1.FieldsV1)({ Raw: ([]uint8) (len=130) { 00000000 7b 22 66 3a 73 74 61 74 75 73 22 3a 7b 22 66 3a |{"f:status":{"f:| 00000010 61 76 61 69 6c 61 62 6c 65 52 65 70 6c 69 63 61 |availableReplica| 00000020 73 22 3a 7b 7d 2c 22 66 3a 66 75 6c 6c 79 4c 61 |s":{},"f:fullyLa| 00000030 62 65 6c 65 64 52 65 70 6c 69 63 61 73 22 3a 7b |beledReplicas":{| 00000040 7d 2c 22 66 3a 6f 62 73 65 72 76 65 64 47 65 6e |},"f:observedGen| 00000050 65 72 61 74 69 6f 6e 22 3a 7b 7d 2c 22 66 3a 72 |eration":{},"f:r| 00000060 65 61 64 79 52 65 70 6c 69 63 61 73 22 3a 7b 7d |eadyReplicas":{}| 00000070 2c 22 66 3a 72 65 70 6c 69 63 61 73 22 3a 7b 7d |,"f:replicas":{}| 00000080 7d 7d |}}| } }), Subresource: (string) (len=6) "status" }, (v1.ManagedFieldsEntry) { Manager: (string) (len=23) "kube-controller-manager", Operation: (v1.ManagedFieldsOperationType) (len=6) "Update", APIVersion: (string) (len=7) "apps/v1", Time: (*v1.Time)({ Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263144, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }), FieldsType: (string) (len=8) "FieldsV1", FieldsV1: (*v1.FieldsV1)({ Raw: ([]uint8) (len=103) { 00000000 7b 22 66 3a 6d 65 74 61 64 61 74 61 22 3a 7b 22 |{"f:metadata":{"| 00000010 66 3a 6f 77 6e 65 72 52 65 66 65 72 65 6e 63 65 |f:ownerReference| 00000020 73 22 3a 7b 22 2e 22 3a 7b 7d 2c 22 6b 3a 7b 5c |s":{".":{},"k:{\| 00000030 22 75 69 64 5c 22 3a 5c 22 39 65 36 32 39 62 66 |"uid\":\"9e629bf| 00000040 62 2d 39 64 31 37 2d 34 35 30 61 2d 62 30 32 35 |b-9d17-450a-b025| 00000050 2d 35 35 66 39 38 30 62 61 35 61 36 37 5c 22 7d |-55f980ba5a67\"}| 00000060 22 3a 7b 7d 7d 7d 7d |":{}}}}| } }), Subresource: (string) "" } } }, Spec: (v1.ReplicaSetSpec) { Replicas: (*int32)(1), MinReadySeconds: (int32) 0, Selector: (*v1.LabelSelector)({ MatchLabels: (map[string]string) (len=2) { (string) (len=4) "name": (string) (len=10) "sample-pod", (string) (len=3) "pod": (string) (len=5) "httpd" }, MatchExpressions: ([]v1.LabelSelectorRequirement) <nil> }), Template: (v1.PodTemplateSpec) { ObjectMeta: (v1.ObjectMeta) { Name: (string) "", GenerateName: (string) "", Namespace: (string) "", SelfLink: (string) "", UID: (types.UID) "", ResourceVersion: (string) "", Generation: (int64) 0, CreationTimestamp: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 0, loc: (*time.Location)(<nil>) } }, DeletionTimestamp: (*v1.Time)(<nil>), DeletionGracePeriodSeconds: (*int64)(<nil>), Labels: (map[string]string) (len=2) { (string) (len=4) "name": (string) (len=10) "sample-pod", (string) (len=3) "pod": (string) (len=5) "httpd" }, Annotations: (map[string]string) <nil>, OwnerReferences: ([]v1.OwnerReference) <nil>, Finalizers: ([]string) <nil>, ManagedFields: ([]v1.ManagedFieldsEntry) <nil> }, Spec: (v1.PodSpec) { Volumes: ([]v1.Volume) <nil>, InitContainers: ([]v1.Container) <nil>, Containers: ([]v1.Container) (len=1) { (v1.Container) { Name: (string) (len=5) "httpd", Image: (string) (len=46) "registry.k8s.io/e2e-test-images/httpd:2.4.38-4", Command: ([]string) <nil>, Args: ([]string) <nil>, WorkingDir: (string) "", Ports: ([]v1.ContainerPort) <nil>, EnvFrom: ([]v1.EnvFromSource) <nil>, Env: ([]v1.EnvVar) <nil>, Resources: (v1.ResourceRequirements) { Limits: (v1.ResourceList) <nil>, Requests: (v1.ResourceList) <nil>, Claims: ([]v1.ResourceClaim) <nil> }, ResizePolicy: ([]v1.ContainerResizePolicy) <nil>, VolumeMounts: ([]v1.VolumeMount) <nil>, VolumeDevices: ([]v1.VolumeDevice) <nil>, LivenessProbe: (*v1.Probe)(<nil>), ReadinessProbe: (*v1.Probe)(<nil>), StartupProbe: (*v1.Probe)(<nil>), Lifecycle: (*v1.Lifecycle)(<nil>), TerminationMessagePath: (string) (len=20) "/dev/termination-log", TerminationMessagePolicy: (v1.TerminationMessagePolicy) (len=4) "File", ImagePullPolicy: (v1.PullPolicy) (len=12) "IfNotPresent", SecurityContext: (*v1.SecurityContext)(<nil>), Stdin: (bool) false, StdinOnce: (bool) false, TTY: (bool) false } }, EphemeralContainers: ([]v1.EphemeralContainer) <nil>, RestartPolicy: (v1.RestartPolicy) (len=6) "Always", TerminationGracePeriodSeconds: (*int64)(0), ActiveDeadlineSeconds: (*int64)(<nil>), DNSPolicy: (v1.DNSPolicy) (len=12) "ClusterFirst", NodeSelector: (map[string]string) <nil>, ServiceAccountName: (string) "", DeprecatedServiceAccount: (string) "", AutomountServiceAccountToken: (*bool)(<nil>), NodeName: (string) "", HostNetwork: (bool) false, HostPID: (bool) false, HostIPC: (bool) false, ShareProcessNamespace: (*bool)(<nil>), SecurityContext: (*v1.PodSecurityContext)({ SELinuxOptions: (*v1.SELinuxOptions)(<nil>), WindowsOptions: (*v1.WindowsSecurityContextOptions)(<nil>), RunAsUser: (*int64)(<nil>), RunAsGroup: (*int64)(<nil>), RunAsNonRoot: (*bool)(<nil>), SupplementalGroups: ([]int64) <nil>, FSGroup: (*int64)(<nil>), Sysctls: ([]v1.Sysctl) <nil>, FSGroupChangePolicy: (*v1.PodFSGroupChangePolicy)(<nil>), SeccompProfile: (*v1.SeccompProfile)(<nil>) }), ImagePullSecrets: ([]v1.LocalObjectReference) <nil>, Hostname: (string) "", Subdomain: (string) "", Affinity: (*v1.Affinity)(<nil>), SchedulerName: (string) (len=17) "default-scheduler", Tolerations: ([]v1.Toleration) <nil>, HostAliases: ([]v1.HostAlias) <nil>, PriorityClassName: (string) "", Priority: (*int32)(<nil>), DNSConfig: (*v1.PodDNSConfig)(<nil>), ReadinessGates: ([]v1.PodReadinessGate) <nil>, RuntimeClassName: (*string)(<nil>), EnableServiceLinks: (*bool)(<nil>), PreemptionPolicy: (*v1.PreemptionPolicy)(<nil>), Overhead: (v1.ResourceList) <nil>, TopologySpreadConstraints: ([]v1.TopologySpreadConstraint) <nil>, SetHostnameAsFQDN: (*bool)(<nil>), OS: (*v1.PodOS)(<nil>), HostUsers: (*bool)(<nil>), SchedulingGates: ([]v1.PodSchedulingGate) <nil>, ResourceClaims: ([]v1.PodResourceClaim) <nil> } } }, Status: (v1.ReplicaSetStatus) { Replicas: (int32) 1, FullyLabeledReplicas: (int32) 1, ReadyReplicas: (int32) 1, AvailableReplicas: (int32) 1, ObservedGeneration: (int64) 1, Conditions: ([]v1.ReplicaSetCondition) <nil> } } Apr 16 17:37:24.364: INFO: Pod "test-rolling-update-controller-5ncp7" is available: (v1.Pod) { TypeMeta: (v1.TypeMeta) { Kind: (string) "", APIVersion: (string) "" }, ObjectMeta: (v1.ObjectMeta) { Name: (string) (len=36) "test-rolling-update-controller-5ncp7", GenerateName: (string) (len=31) "test-rolling-update-controller-", Namespace: (string) (len=15) "deployment-4105", SelfLink: (string) "", UID: (types.UID) (len=36) "acba915b-43c3-4c83-8dfc-67012377785f", ResourceVersion: (string) (len=6) "819990", Generation: (int64) 0, CreationTimestamp: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263137, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }, DeletionTimestamp: (*v1.Time)(<nil>), DeletionGracePeriodSeconds: (*int64)(<nil>), Labels: (map[string]string) (len=2) { (string) (len=4) "name": (string) (len=10) "sample-pod", (string) (len=3) "pod": (string) (len=5) "httpd" }, Annotations: (map[string]string) <nil>, OwnerReferences: ([]v1.OwnerReference) (len=1) { (v1.OwnerReference) { APIVersion: (string) (len=7) "apps/v1", Kind: (string) (len=10) "ReplicaSet", Name: (string) (len=30) "test-rolling-update-controller", UID: (types.UID) (len=36) "5d932d0c-328a-48d5-8616-c64c2500719d", Controller: (*bool)(true), BlockOwnerDeletion: (*bool)(true) } }, Finalizers: ([]string) <nil>, ManagedFields: ([]v1.ManagedFieldsEntry) (len=2) { (v1.ManagedFieldsEntry) { Manager: (string) (len=23) "kube-controller-manager", Operation: (v1.ManagedFieldsOperationType) (len=6) "Update", APIVersion: (string) (len=2) "v1", Time: (*v1.Time)({ Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263137, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }), FieldsType: (string) (len=8) "FieldsV1", FieldsV1: (*v1.FieldsV1)({ Raw: ([]uint8) (len=500) { 00000000 7b 22 66 3a 6d 65 74 61 64 61 74 61 22 3a 7b 22 |{"f:metadata":{"| 00000010 66 3a 67 65 6e 65 72 61 74 65 4e 61 6d 65 22 3a |f:generateName":| 00000020 7b 7d 2c 22 66 3a 6c 61 62 65 6c 73 22 3a 7b 22 |{},"f:labels":{"| 00000030 2e 22 3a 7b 7d 2c 22 66 3a 6e 61 6d 65 22 3a 7b |.":{},"f:name":{| 00000040 7d 2c 22 66 3a 70 6f 64 22 3a 7b 7d 7d 2c 22 66 |},"f:pod":{}},"f| 00000050 3a 6f 77 6e 65 72 52 65 66 65 72 65 6e 63 65 73 |:ownerReferences| 00000060 22 3a 7b 22 2e 22 3a 7b 7d 2c 22 6b 3a 7b 5c 22 |":{".":{},"k:{\"| 00000070 75 69 64 5c 22 3a 5c 22 35 64 39 33 32 64 30 63 |uid\":\"5d932d0c| 00000080 2d 33 32 38 61 2d 34 38 64 35 2d 38 36 31 36 2d |-328a-48d5-8616-| 00000090 63 36 34 63 32 35 30 30 37 31 39 64 5c 22 7d 22 |c64c2500719d\"}"| 000000a0 3a 7b 7d 7d 7d 2c 22 66 3a 73 70 65 63 22 3a 7b |:{}}},"f:spec":{| 000000b0 22 66 3a 63 6f 6e 74 61 69 6e 65 72 73 22 3a 7b |"f:containers":{| 000000c0 22 6b 3a 7b 5c 22 6e 61 6d 65 5c 22 3a 5c 22 68 |"k:{\"name\":\"h| 000000d0 74 74 70 64 5c 22 7d 22 3a 7b 22 2e 22 3a 7b 7d |ttpd\"}":{".":{}| 000000e0 2c 22 66 3a 69 6d 61 67 65 22 3a 7b 7d 2c 22 66 |,"f:image":{},"f| 000000f0 3a 69 6d 61 67 65 50 75 6c 6c 50 6f 6c 69 63 79 |:imagePullPolicy| 00000100 22 3a 7b 7d 2c 22 66 3a 6e 61 6d 65 22 3a 7b 7d |":{},"f:name":{}| 00000110 2c 22 66 3a 72 65 73 6f 75 72 63 65 73 22 3a 7b |,"f:resources":{| 00000120 7d 2c 22 66 3a 74 65 72 6d 69 6e 61 74 69 6f 6e |},"f:termination| 00000130 4d 65 73 73 61 67 65 50 61 74 68 22 3a 7b 7d 2c |MessagePath":{},| 00000140 22 66 3a 74 65 72 6d 69 6e 61 74 69 6f 6e 4d 65 |"f:terminationMe| 00000150 73 73 61 67 65 50 6f 6c 69 63 79 22 3a 7b 7d 7d |ssagePolicy":{}}| 00000160 7d 2c 22 66 3a 64 6e 73 50 6f 6c 69 63 79 22 3a |},"f:dnsPolicy":| 00000170 7b 7d 2c 22 66 3a 65 6e 61 62 6c 65 53 65 72 76 |{},"f:enableServ| 00000180 69 63 65 4c 69 6e 6b 73 22 3a 7b 7d 2c 22 66 3a |iceLinks":{},"f:| 00000190 72 65 73 74 61 72 74 50 6f 6c 69 63 79 22 3a 7b |restartPolicy":{| 000001a0 7d 2c 22 66 3a 73 63 68 65 64 75 6c 65 72 4e 61 |},"f:schedulerNa| 000001b0 6d 65 22 3a 7b 7d 2c 22 66 3a 73 65 63 75 72 69 |me":{},"f:securi| 000001c0 74 79 43 6f 6e 74 65 78 74 22 3a 7b 7d 2c 22 66 |tyContext":{},"f| 000001d0 3a 74 65 72 6d 69 6e 61 74 69 6f 6e 47 72 61 63 |:terminationGrac| 000001e0 65 50 65 72 69 6f 64 53 65 63 6f 6e 64 73 22 3a |ePeriodSeconds":| 000001f0 7b 7d 7d 7d |{}}}| } }), Subresource: (string) "" }, (v1.ManagedFieldsEntry) { Manager: (string) (len=7) "kubelet", Operation: (v1.ManagedFieldsOperationType) (len=6) "Update", APIVersion: (string) (len=2) "v1", Time: (*v1.Time)({ Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263143, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }), FieldsType: (string) (len=8) "FieldsV1", FieldsV1: (*v1.FieldsV1)({ Raw: ([]uint8) (len=518) { 00000000 7b 22 66 3a 73 74 61 74 75 73 22 3a 7b 22 66 3a |{"f:status":{"f:| 00000010 63 6f 6e 64 69 74 69 6f 6e 73 22 3a 7b 22 6b 3a |conditions":{"k:| 00000020 7b 5c 22 74 79 70 65 5c 22 3a 5c 22 43 6f 6e 74 |{\"type\":\"Cont| 00000030 61 69 6e 65 72 73 52 65 61 64 79 5c 22 7d 22 3a |ainersReady\"}":| 00000040 7b 22 2e 22 3a 7b 7d 2c 22 66 3a 6c 61 73 74 50 |{".":{},"f:lastP| 00000050 72 6f 62 65 54 69 6d 65 22 3a 7b 7d 2c 22 66 3a |robeTime":{},"f:| 00000060 6c 61 73 74 54 72 61 6e 73 69 74 69 6f 6e 54 69 |lastTransitionTi| 00000070 6d 65 22 3a 7b 7d 2c 22 66 3a 73 74 61 74 75 73 |me":{},"f:status| 00000080 22 3a 7b 7d 2c 22 66 3a 74 79 70 65 22 3a 7b 7d |":{},"f:type":{}| 00000090 7d 2c 22 6b 3a 7b 5c 22 74 79 70 65 5c 22 3a 5c |},"k:{\"type\":\| 000000a0 22 49 6e 69 74 69 61 6c 69 7a 65 64 5c 22 7d 22 |"Initialized\"}"| 000000b0 3a 7b 22 2e 22 3a 7b 7d 2c 22 66 3a 6c 61 73 74 |:{".":{},"f:last| 000000c0 50 72 6f 62 65 54 69 6d 65 22 3a 7b 7d 2c 22 66 |ProbeTime":{},"f| 000000d0 3a 6c 61 73 74 54 72 61 6e 73 69 74 69 6f 6e 54 |:lastTransitionT| 000000e0 69 6d 65 22 3a 7b 7d 2c 22 66 3a 73 74 61 74 75 |ime":{},"f:statu| 000000f0 73 22 3a 7b 7d 2c 22 66 3a 74 79 70 65 22 3a 7b |s":{},"f:type":{| 00000100 7d 7d 2c 22 6b 3a 7b 5c 22 74 79 70 65 5c 22 3a |}},"k:{\"type\":| 00000110 5c 22 52 65 61 64 79 5c 22 7d 22 3a 7b 22 2e 22 |\"Ready\"}":{"."| 00000120 3a 7b 7d 2c 22 66 3a 6c 61 73 74 50 72 6f 62 65 |:{},"f:lastProbe| 00000130 54 69 6d 65 22 3a 7b 7d 2c 22 66 3a 6c 61 73 74 |Time":{},"f:last| 00000140 54 72 61 6e 73 69 74 69 6f 6e 54 69 6d 65 22 3a |TransitionTime":| 00000150 7b 7d 2c 22 66 3a 73 74 61 74 75 73 22 3a 7b 7d |{},"f:status":{}| 00000160 2c 22 66 3a 74 79 70 65 22 3a 7b 7d 7d 7d 2c 22 |,"f:type":{}}},"| 00000170 66 3a 63 6f 6e 74 61 69 6e 65 72 53 74 61 74 75 |f:containerStatu| 00000180 73 65 73 22 3a 7b 7d 2c 22 66 3a 68 6f 73 74 49 |ses":{},"f:hostI| 00000190 50 22 3a 7b 7d 2c 22 66 3a 70 68 61 73 65 22 3a |P":{},"f:phase":| 000001a0 7b 7d 2c 22 66 3a 70 6f 64 49 50 22 3a 7b 7d 2c |{},"f:podIP":{},| 000001b0 22 66 3a 70 6f 64 49 50 73 22 3a 7b 22 2e 22 3a |"f:podIPs":{".":| 000001c0 7b 7d 2c 22 6b 3a 7b 5c 22 69 70 5c 22 3a 5c 22 |{},"k:{\"ip\":\"| 000001d0 31 30 2e 36 35 2e 32 34 38 2e 33 5c 22 7d 22 3a |10.65.248.3\"}":| 000001e0 7b 22 2e 22 3a 7b 7d 2c 22 66 3a 69 70 22 3a 7b |{".":{},"f:ip":{| 000001f0 7d 7d 7d 2c 22 66 3a 73 74 61 72 74 54 69 6d 65 |}}},"f:startTime| 00000200 22 3a 7b 7d 7d 7d |":{}}}| } }), Subresource: (string) (len=6) "status" } } }, Spec: (v1.PodSpec) { Volumes: ([]v1.Volume) (len=1) { (v1.Volume) { Name: (string) (len=21) "kube-api-access-gdzqb", VolumeSource: (v1.VolumeSource) { HostPath: (*v1.HostPathVolumeSource)(<nil>), EmptyDir: (*v1.EmptyDirVolumeSource)(<nil>), GCEPersistentDisk: (*v1.GCEPersistentDiskVolumeSource)(<nil>), AWSElasticBlockStore: (*v1.AWSElasticBlockStoreVolumeSource)(<nil>), GitRepo: (*v1.GitRepoVolumeSource)(<nil>), Secret: (*v1.SecretVolumeSource)(<nil>), NFS: (*v1.NFSVolumeSource)(<nil>), ISCSI: (*v1.ISCSIVolumeSource)(<nil>), Glusterfs: (*v1.GlusterfsVolumeSource)(<nil>), PersistentVolumeClaim: (*v1.PersistentVolumeClaimVolumeSource)(<nil>), RBD: (*v1.RBDVolumeSource)(<nil>), FlexVolume: (*v1.FlexVolumeSource)(<nil>), Cinder: (*v1.CinderVolumeSource)(<nil>), CephFS: (*v1.CephFSVolumeSource)(<nil>), Flocker: (*v1.FlockerVolumeSource)(<nil>), DownwardAPI: (*v1.DownwardAPIVolumeSource)(<nil>), FC: (*v1.FCVolumeSource)(<nil>), AzureFile: (*v1.AzureFileVolumeSource)(<nil>), ConfigMap: (*v1.ConfigMapVolumeSource)(<nil>), VsphereVolume: (*v1.VsphereVirtualDiskVolumeSource)(<nil>), Quobyte: (*v1.QuobyteVolumeSource)(<nil>), AzureDisk: (*v1.AzureDiskVolumeSource)(<nil>), PhotonPersistentDisk: (*v1.PhotonPersistentDiskVolumeSource)(<nil>), Projected: (*v1.ProjectedVolumeSource)({ Sources: ([]v1.VolumeProjection) (len=3) { (v1.VolumeProjection) { Secret: (*v1.SecretProjection)(<nil>), DownwardAPI: (*v1.DownwardAPIProjection)(<nil>), ConfigMap: (*v1.ConfigMapProjection)(<nil>), ServiceAccountToken: (*v1.ServiceAccountTokenProjection)({ Audience: (string) "", ExpirationSeconds: (*int64)(3607), Path: (string) (len=5) "token" }) }, (v1.VolumeProjection) { Secret: (*v1.SecretProjection)(<nil>), DownwardAPI: (*v1.DownwardAPIProjection)(<nil>), ConfigMap: (*v1.ConfigMapProjection)({ LocalObjectReference: (v1.LocalObjectReference) { Name: (string) (len=16) "kube-root-ca.crt" }, Items: ([]v1.KeyToPath) (len=1) { (v1.KeyToPath) { Key: (string) (len=6) "ca.crt", Path: (string) (len=6) "ca.crt", Mode: (*int32)(<nil>) } }, Optional: (*bool)(<nil>) }), ServiceAccountToken: (*v1.ServiceAccountTokenProjection)(<nil>) }, (v1.VolumeProjection) { Secret: (*v1.SecretProjection)(<nil>), DownwardAPI: (*v1.DownwardAPIProjection)({ Items: ([]v1.DownwardAPIVolumeFile) (len=1) { (v1.DownwardAPIVolumeFile) { Path: (string) (len=9) "namespace", FieldRef: (*v1.ObjectFieldSelector)({ APIVersion: (string) (len=2) "v1", FieldPath: (string) (len=18) "metadata.namespace" }), ResourceFieldRef: (*v1.ResourceFieldSelector)(<nil>), Mode: (*int32)(<nil>) } } }), ConfigMap: (*v1.ConfigMapProjection)(<nil>), ServiceAccountToken: (*v1.ServiceAccountTokenProjection)(<nil>) } }, DefaultMode: (*int32)(420) }), PortworxVolume: (*v1.PortworxVolumeSource)(<nil>), ScaleIO: (*v1.ScaleIOVolumeSource)(<nil>), StorageOS: (*v1.StorageOSVolumeSource)(<nil>), CSI: (*v1.CSIVolumeSource)(<nil>), Ephemeral: (*v1.EphemeralVolumeSource)(<nil>) } } }, InitContainers: ([]v1.Container) <nil>, Containers: ([]v1.Container) (len=1) { (v1.Container) { Name: (string) (len=5) "httpd", Image: (string) (len=46) "registry.k8s.io/e2e-test-images/httpd:2.4.38-4", Command: ([]string) <nil>, Args: ([]string) <nil>, WorkingDir: (string) "", Ports: ([]v1.ContainerPort) <nil>, EnvFrom: ([]v1.EnvFromSource) <nil>, Env: ([]v1.EnvVar) <nil>, Resources: (v1.ResourceRequirements) { Limits: (v1.ResourceList) <nil>, Requests: (v1.ResourceList) <nil>, Claims: ([]v1.ResourceClaim) <nil> }, ResizePolicy: ([]v1.ContainerResizePolicy) <nil>, VolumeMounts: ([]v1.VolumeMount) (len=1) { (v1.VolumeMount) { Name: (string) (len=21) "kube-api-access-gdzqb", ReadOnly: (bool) true, MountPath: (string) (len=45) "/var/run/secrets/kubernetes.io/serviceaccount", SubPath: (string) "", MountPropagation: (*v1.MountPropagationMode)(<nil>), SubPathExpr: (string) "" } }, VolumeDevices: ([]v1.VolumeDevice) <nil>, LivenessProbe: (*v1.Probe)(<nil>), ReadinessProbe: (*v1.Probe)(<nil>), StartupProbe: (*v1.Probe)(<nil>), Lifecycle: (*v1.Lifecycle)(<nil>), TerminationMessagePath: (string) (len=20) "/dev/termination-log", TerminationMessagePolicy: (v1.TerminationMessagePolicy) (len=4) "File", ImagePullPolicy: (v1.PullPolicy) (len=12) "IfNotPresent", SecurityContext: (*v1.SecurityContext)(<nil>), Stdin: (bool) false, StdinOnce: (bool) false, TTY: (bool) false } }, EphemeralContainers: ([]v1.EphemeralContainer) <nil>, RestartPolicy: (v1.RestartPolicy) (len=6) "Always", TerminationGracePeriodSeconds: (*int64)(0), ActiveDeadlineSeconds: (*int64)(<nil>), DNSPolicy: (v1.DNSPolicy) (len=12) "ClusterFirst", NodeSelector: (map[string]string) <nil>, ServiceAccountName: (string) (len=7) "default", DeprecatedServiceAccount: (string) (len=7) "default", AutomountServiceAccountToken: (*bool)(<nil>), NodeName: (string) (len=35) "gce-scale-cluster-minion-group-zv62", HostNetwork: (bool) false, HostPID: (bool) false, HostIPC: (bool) false, ShareProcessNamespace: (*bool)(<nil>), SecurityContext: (*v1.PodSecurityContext)({ SELinuxOptions: (*v1.SELinuxOptions)(<nil>), WindowsOptions: (*v1.WindowsSecurityContextOptions)(<nil>), RunAsUser: (*int64)(<nil>), RunAsGroup: (*int64)(<nil>), RunAsNonRoot: (*bool)(<nil>), SupplementalGroups: ([]int64) <nil>, FSGroup: (*int64)(<nil>), Sysctls: ([]v1.Sysctl) <nil>, FSGroupChangePolicy: (*v1.PodFSGroupChangePolicy)(<nil>), SeccompProfile: (*v1.SeccompProfile)(<nil>) }), ImagePullSecrets: ([]v1.LocalObjectReference) <nil>, Hostname: (string) "", Subdomain: (string) "", Affinity: (*v1.Affinity)(<nil>), SchedulerName: (string) (len=17) "default-scheduler", Tolerations: ([]v1.Toleration) (len=2) { (v1.Toleration) { Key: (string) (len=28) "node.kubernetes.io/not-ready", Operator: (v1.TolerationOperator) (len=6) "Exists", Value: (string) "", Effect: (v1.TaintEffect) (len=9) "NoExecute", TolerationSeconds: (*int64)(300) }, (v1.Toleration) { Key: (string) (len=30) "node.kubernetes.io/unreachable", Operator: (v1.TolerationOperator) (len=6) "Exists", Value: (string) "", Effect: (v1.TaintEffect) (len=9) "NoExecute", TolerationSeconds: (*int64)(300) } }, HostAliases: ([]v1.HostAlias) <nil>, PriorityClassName: (string) "", Priority: (*int32)(0), DNSConfig: (*v1.PodDNSConfig)(<nil>), ReadinessGates: ([]v1.PodReadinessGate) <nil>, RuntimeClassName: (*string)(<nil>), EnableServiceLinks: (*bool)(true), PreemptionPolicy: (*v1.PreemptionPolicy)((len=20) "PreemptLowerPriority"), Overhead: (v1.ResourceList) <nil>, TopologySpreadConstraints: ([]v1.TopologySpreadConstraint) <nil>, SetHostnameAsFQDN: (*bool)(<nil>), OS: (*v1.PodOS)(<nil>), HostUsers: (*bool)(<nil>), SchedulingGates: ([]v1.PodSchedulingGate) <nil>, ResourceClaims: ([]v1.PodResourceClaim) <nil> }, Status: (v1.PodStatus) { Phase: (v1.PodPhase) (len=7) "Running", Conditions: ([]v1.PodCondition) (len=4) { (v1.PodCondition) { Type: (v1.PodConditionType) (len=11) "Initialized", Status: (v1.ConditionStatus) (len=4) "True", LastProbeTime: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 0, loc: (*time.Location)(<nil>) } }, LastTransitionTime: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263137, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }, Reason: (string) "", Message: (string) "" }, (v1.PodCondition) { Type: (v1.PodConditionType) (len=5) "Ready", Status: (v1.ConditionStatus) (len=4) "True", LastProbeTime: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 0, loc: (*time.Location)(<nil>) } }, LastTransitionTime: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263143, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }, Reason: (string) "", Message: (string) "" }, (v1.PodCondition) { Type: (v1.PodConditionType) (len=15) "ContainersReady", Status: (v1.ConditionStatus) (len=4) "True", LastProbeTime: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 0, loc: (*time.Location)(<nil>) } }, LastTransitionTime: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263143, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }, Reason: (string) "", Message: (string) "" }, (v1.PodCondition) { Type: (v1.PodConditionType) (len=12) "PodScheduled", Status: (v1.ConditionStatus) (len=4) "True", LastProbeTime: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 0, loc: (*time.Location)(<nil>) } }, LastTransitionTime: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263137, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }, Reason: (string) "", Message: (string) "" } }, Message: (string) "", Reason: (string) "", NominatedNodeName: (string) "", HostIP: (string) (len=11) "10.40.1.121", PodIP: (string) (len=11) "10.65.248.3", PodIPs: ([]v1.PodIP) (len=1) { (v1.PodIP) { IP: (string) (len=11) "10.65.248.3" } }, StartTime: (*v1.Time)({ Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263137, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }), InitContainerStatuses: ([]v1.ContainerStatus) <nil>, ContainerStatuses: ([]v1.ContainerStatus) (len=1) { (v1.ContainerStatus) { Name: (string) (len=5) "httpd", State: (v1.ContainerState) { Waiting: (*v1.ContainerStateWaiting)(<nil>), Running: (*v1.ContainerStateRunning)({ StartedAt: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263142, loc: (*time.Location)(<already shown>) } } }), Terminated: (*v1.ContainerStateTerminated)(<nil>) }, LastTerminationState: (v1.ContainerState) { Waiting: (*v1.ContainerStateWaiting)(<nil>), Running: (*v1.ContainerStateRunning)(<nil>), Terminated: (*v1.ContainerStateTerminated)(<nil>) }, Ready: (bool) true, RestartCount: (int32) 0, Image: (string) (len=46) "registry.k8s.io/e2e-test-images/httpd:2.4.38-4", ImageID: (string) (len=109) "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", ContainerID: (string) (len=77) "containerd://590e48c0dca88e0f86cc0deb39e2f3e734b2e5062f6156eec2ac4d014ab76abc", Started: (*bool)(true), AllocatedResources: (v1.ResourceList) <nil>, Resources: (*v1.ResourceRequirements)(<nil>) } }, QOSClass: (v1.PodQOSClass) (len=10) "BestEffort", EphemeralContainerStatuses: ([]v1.ContainerStatus) <nil>, Resize: (v1.PodResizeStatus) "" } } Apr 16 17:37:24.364: INFO: Pod "test-rolling-update-deployment-656d657cd8-whfjq" is not available: (v1.Pod) { TypeMeta: (v1.TypeMeta) { Kind: (string) "", APIVersion: (string) "" }, ObjectMeta: (v1.ObjectMeta) { Name: (string) (len=47) "test-rolling-update-deployment-656d657cd8-whfjq", GenerateName: (string) (len=42) "test-rolling-update-deployment-656d657cd8-", Namespace: (string) (len=15) "deployment-4105", SelfLink: (string) "", UID: (types.UID) (len=36) "6b969c1d-0239-4187-a81b-9cc11060c62d", ResourceVersion: (string) (len=6) "982893", Generation: (int64) 0, CreationTimestamp: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263144, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }, DeletionTimestamp: (*v1.Time)(<nil>), DeletionGracePeriodSeconds: (*int64)(<nil>), Labels: (map[string]string) (len=2) { (string) (len=4) "name": (string) (len=10) "sample-pod", (string) (len=17) "pod-template-hash": (string) (len=10) "656d657cd8" }, Annotations: (map[string]string) <nil>, OwnerReferences: ([]v1.OwnerReference) (len=1) { (v1.OwnerReference) { APIVersion: (string) (len=7) "apps/v1", Kind: (string) (len=10) "ReplicaSet", Name: (string) (len=41) "test-rolling-update-deployment-656d657cd8", UID: (types.UID) (len=36) "56d713f1-1214-4b10-a726-e00bf7ec3cf1", Controller: (*bool)(true), BlockOwnerDeletion: (*bool)(true) } }, Finalizers: ([]string) <nil>, ManagedFields: ([]v1.ManagedFieldsEntry) (len=2) { (v1.ManagedFieldsEntry) { Manager: (string) (len=23) "kube-controller-manager", Operation: (v1.ManagedFieldsOperationType) (len=6) "Update", APIVersion: (string) (len=2) "v1", Time: (*v1.Time)({ Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263144, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }), FieldsType: (string) (len=8) "FieldsV1", FieldsV1: (*v1.FieldsV1)({ Raw: ([]uint8) (len=539) { 00000000 7b 22 66 3a 6d 65 74 61 64 61 74 61 22 3a 7b 22 |{"f:metadata":{"| 00000010 66 3a 67 65 6e 65 72 61 74 65 4e 61 6d 65 22 3a |f:generateName":| 00000020 7b 7d 2c 22 66 3a 6c 61 62 65 6c 73 22 3a 7b 22 |{},"f:labels":{"| 00000030 2e 22 3a 7b 7d 2c 22 66 3a 6e 61 6d 65 22 3a 7b |.":{},"f:name":{| 00000040 7d 2c 22 66 3a 70 6f 64 2d 74 65 6d 70 6c 61 74 |},"f:pod-templat| 00000050 65 2d 68 61 73 68 22 3a 7b 7d 7d 2c 22 66 3a 6f |e-hash":{}},"f:o| 00000060 77 6e 65 72 52 65 66 65 72 65 6e 63 65 73 22 3a |wnerReferences":| 00000070 7b 22 2e 22 3a 7b 7d 2c 22 6b 3a 7b 5c 22 75 69 |{".":{},"k:{\"ui| 00000080 64 5c 22 3a 5c 22 35 36 64 37 31 33 66 31 2d 31 |d\":\"56d713f1-1| 00000090 32 31 34 2d 34 62 31 30 2d 61 37 32 36 2d 65 30 |214-4b10-a726-e0| 000000a0 30 62 66 37 65 63 33 63 66 31 5c 22 7d 22 3a 7b |0bf7ec3cf1\"}":{| 000000b0 7d 7d 7d 2c 22 66 3a 73 70 65 63 22 3a 7b 22 66 |}}},"f:spec":{"f| 000000c0 3a 63 6f 6e 74 61 69 6e 65 72 73 22 3a 7b 22 6b |:containers":{"k| 000000d0 3a 7b 5c 22 6e 61 6d 65 5c 22 3a 5c 22 61 67 6e |:{\"name\":\"agn| 000000e0 68 6f 73 74 5c 22 7d 22 3a 7b 22 2e 22 3a 7b 7d |host\"}":{".":{}| 000000f0 2c 22 66 3a 69 6d 61 67 65 22 3a 7b 7d 2c 22 66 |,"f:image":{},"f| 00000100 3a 69 6d 61 67 65 50 75 6c 6c 50 6f 6c 69 63 79 |:imagePullPolicy| 00000110 22 3a 7b 7d 2c 22 66 3a 6e 61 6d 65 22 3a 7b 7d |":{},"f:name":{}| 00000120 2c 22 66 3a 72 65 73 6f 75 72 63 65 73 22 3a 7b |,"f:resources":{| 00000130 7d 2c 22 66 3a 73 65 63 75 72 69 74 79 43 6f 6e |},"f:securityCon| 00000140 74 65 78 74 22 3a 7b 7d 2c 22 66 3a 74 65 72 6d |text":{},"f:term| 00000150 69 6e 61 74 69 6f 6e 4d 65 73 73 61 67 65 50 61 |inationMessagePa| 00000160 74 68 22 3a 7b 7d 2c 22 66 3a 74 65 72 6d 69 6e |th":{},"f:termin| 00000170 61 74 69 6f 6e 4d 65 73 73 61 67 65 50 6f 6c 69 |ationMessagePoli| 00000180 63 79 22 3a 7b 7d 7d 7d 2c 22 66 3a 64 6e 73 50 |cy":{}}},"f:dnsP| 00000190 6f 6c 69 63 79 22 3a 7b 7d 2c 22 66 3a 65 6e 61 |olicy":{},"f:ena| 000001a0 62 6c 65 53 65 72 76 69 63 65 4c 69 6e 6b 73 22 |bleServiceLinks"| 000001b0 3a 7b 7d 2c 22 66 3a 72 65 73 74 61 72 74 50 6f |:{},"f:restartPo| 000001c0 6c 69 63 79 22 3a 7b 7d 2c 22 66 3a 73 63 68 65 |licy":{},"f:sche| 000001d0 64 75 6c 65 72 4e 61 6d 65 22 3a 7b 7d 2c 22 66 |dulerName":{},"f| 000001e0 3a 73 65 63 75 72 69 74 79 43 6f 6e 74 65 78 74 |:securityContext| 000001f0 22 3a 7b 7d 2c 22 66 3a 74 65 72 6d 69 6e 61 74 |":{},"f:terminat| 00000200 69 6f 6e 47 72 61 63 65 50 65 72 69 6f 64 53 65 |ionGracePeriodSe| 00000210 63 6f 6e 64 73 22 3a 7b 7d 7d 7d |conds":{}}}| } }), Subresource: (string) "" }, (v1.ManagedFieldsEntry) { Manager: (string) (len=7) "kubelet", Operation: (v1.ManagedFieldsOperationType) (len=6) "Update", APIVersion: (string) (len=2) "v1", Time: (*v1.Time)({ Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263427, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }), FieldsType: (string) (len=8) "FieldsV1", FieldsV1: (*v1.FieldsV1)({ Raw: ([]uint8) (len=576) { 00000000 7b 22 66 3a 73 74 61 74 75 73 22 3a 7b 22 66 3a |{"f:status":{"f:| 00000010 63 6f 6e 64 69 74 69 6f 6e 73 22 3a 7b 22 6b 3a |conditions":{"k:| 00000020 7b 5c 22 74 79 70 65 5c 22 3a 5c 22 43 6f 6e 74 |{\"type\":\"Cont| 00000030 61 69 6e 65 72 73 52 65 61 64 79 5c 22 7d 22 3a |ainersReady\"}":| 00000040 7b 22 2e 22 3a 7b 7d 2c 22 66 3a 6c 61 73 74 50 |{".":{},"f:lastP| 00000050 72 6f 62 65 54 69 6d 65 22 3a 7b 7d 2c 22 66 3a |robeTime":{},"f:| 00000060 6c 61 73 74 54 72 61 6e 73 69 74 69 6f 6e 54 69 |lastTransitionTi| 00000070 6d 65 22 3a 7b 7d 2c 22 66 3a 6d 65 73 73 61 67 |me":{},"f:messag| 00000080 65 22 3a 7b 7d 2c 22 66 3a 72 65 61 73 6f 6e 22 |e":{},"f:reason"| 00000090 3a 7b 7d 2c 22 66 3a 73 74 61 74 75 73 22 3a 7b |:{},"f:status":{| 000000a0 7d 2c 22 66 3a 74 79 70 65 22 3a 7b 7d 7d 2c 22 |},"f:type":{}},"| 000000b0 6b 3a 7b 5c 22 74 79 70 65 5c 22 3a 5c 22 49 6e |k:{\"type\":\"In| 000000c0 69 74 69 61 6c 69 7a 65 64 5c 22 7d 22 3a 7b 22 |itialized\"}":{"| 000000d0 2e 22 3a 7b 7d 2c 22 66 3a 6c 61 73 74 50 72 6f |.":{},"f:lastPro| 000000e0 62 65 54 69 6d 65 22 3a 7b 7d 2c 22 66 3a 6c 61 |beTime":{},"f:la| 000000f0 73 74 54 72 61 6e 73 69 74 69 6f 6e 54 69 6d 65 |stTransitionTime| 00000100 22 3a 7b 7d 2c 22 66 3a 73 74 61 74 75 73 22 3a |":{},"f:status":| 00000110 7b 7d 2c 22 66 3a 74 79 70 65 22 3a 7b 7d 7d 2c |{},"f:type":{}},| 00000120 22 6b 3a 7b 5c 22 74 79 70 65 5c 22 3a 5c 22 52 |"k:{\"type\":\"R| 00000130 65 61 64 79 5c 22 7d 22 3a 7b 22 2e 22 3a 7b 7d |eady\"}":{".":{}| 00000140 2c 22 66 3a 6c 61 73 74 50 72 6f 62 65 54 69 6d |,"f:lastProbeTim| 00000150 65 22 3a 7b 7d 2c 22 66 3a 6c 61 73 74 54 72 61 |e":{},"f:lastTra| 00000160 6e 73 69 74 69 6f 6e 54 69 6d 65 22 3a 7b 7d 2c |nsitionTime":{},| 00000170 22 66 3a 6d 65 73 73 61 67 65 22 3a 7b 7d 2c 22 |"f:message":{},"| 00000180 66 3a 72 65 61 73 6f 6e 22 3a 7b 7d 2c 22 66 3a |f:reason":{},"f:| 00000190 73 74 61 74 75 73 22 3a 7b 7d 2c 22 66 3a 74 79 |status":{},"f:ty| 000001a0 70 65 22 3a 7b 7d 7d 7d 2c 22 66 3a 63 6f 6e 74 |pe":{}}},"f:cont| 000001b0 61 69 6e 65 72 53 74 61 74 75 73 65 73 22 3a 7b |ainerStatuses":{| 000001c0 7d 2c 22 66 3a 68 6f 73 74 49 50 22 3a 7b 7d 2c |},"f:hostIP":{},| 000001d0 22 66 3a 70 68 61 73 65 22 3a 7b 7d 2c 22 66 3a |"f:phase":{},"f:| 000001e0 70 6f 64 49 50 22 3a 7b 7d 2c 22 66 3a 70 6f 64 |podIP":{},"f:pod| 000001f0 49 50 73 22 3a 7b 22 2e 22 3a 7b 7d 2c 22 6b 3a |IPs":{".":{},"k:| 00000200 7b 5c 22 69 70 5c 22 3a 5c 22 31 30 2e 36 36 2e |{\"ip\":\"10.66.| 00000210 32 36 2e 35 37 5c 22 7d 22 3a 7b 22 2e 22 3a 7b |26.57\"}":{".":{| 00000220 7d 2c 22 66 3a 69 70 22 3a 7b 7d 7d 7d 2c 22 66 |},"f:ip":{}}},"f| 00000230 3a 73 74 61 72 74 54 69 6d 65 22 3a 7b 7d 7d 7d |:startTime":{}}}| } }), Subresource: (string) (len=6) "status" } } }, Spec: (v1.PodSpec) { Volumes: ([]v1.Volume) (len=1) { (v1.Volume) { Name: (string) (len=21) "kube-api-access-7n2l6", VolumeSource: (v1.VolumeSource) { HostPath: (*v1.HostPathVolumeSource)(<nil>), EmptyDir: (*v1.EmptyDirVolumeSource)(<nil>), GCEPersistentDisk: (*v1.GCEPersistentDiskVolumeSource)(<nil>), AWSElasticBlockStore: (*v1.AWSElasticBlockStoreVolumeSource)(<nil>), GitRepo: (*v1.GitRepoVolumeSource)(<nil>), Secret: (*v1.SecretVolumeSource)(<nil>), NFS: (*v1.NFSVolumeSource)(<nil>), ISCSI: (*v1.ISCSIVolumeSource)(<nil>), Glusterfs: (*v1.GlusterfsVolumeSource)(<nil>), PersistentVolumeClaim: (*v1.PersistentVolumeClaimVolumeSource)(<nil>), RBD: (*v1.RBDVolumeSource)(<nil>), FlexVolume: (*v1.FlexVolumeSource)(<nil>), Cinder: (*v1.CinderVolumeSource)(<nil>), CephFS: (*v1.CephFSVolumeSource)(<nil>), Flocker: (*v1.FlockerVolumeSource)(<nil>), DownwardAPI: (*v1.DownwardAPIVolumeSource)(<nil>), FC: (*v1.FCVolumeSource)(<nil>), AzureFile: (*v1.AzureFileVolumeSource)(<nil>), ConfigMap: (*v1.ConfigMapVolumeSource)(<nil>), VsphereVolume: (*v1.VsphereVirtualDiskVolumeSource)(<nil>), Quobyte: (*v1.QuobyteVolumeSource)(<nil>), AzureDisk: (*v1.AzureDiskVolumeSource)(<nil>), PhotonPersistentDisk: (*v1.PhotonPersistentDiskVolumeSource)(<nil>), Projected: (*v1.ProjectedVolumeSource)({ Sources: ([]v1.VolumeProjection) (len=3) { (v1.VolumeProjection) { Secret: (*v1.SecretProjection)(<nil>), DownwardAPI: (*v1.DownwardAPIProjection)(<nil>), ConfigMap: (*v1.ConfigMapProjection)(<nil>), ServiceAccountToken: (*v1.ServiceAccountTokenProjection)({ Audience: (string) "", ExpirationSeconds: (*int64)(3607), Path: (string) (len=5) "token" }) }, (v1.VolumeProjection) { Secret: (*v1.SecretProjection)(<nil>), DownwardAPI: (*v1.DownwardAPIProjection)(<nil>), ConfigMap: (*v1.ConfigMapProjection)({ LocalObjectReference: (v1.LocalObjectReference) { Name: (string) (len=16) "kube-root-ca.crt" }, Items: ([]v1.KeyToPath) (len=1) { (v1.KeyToPath) { Key: (string) (len=6) "ca.crt", Path: (string) (len=6) "ca.crt", Mode: (*int32)(<nil>) } }, Optional: (*bool)(<nil>) }), ServiceAccountToken: (*v1.ServiceAccountTokenProjection)(<nil>) }, (v1.VolumeProjection) { Secret: (*v1.SecretProjection)(<nil>), DownwardAPI: (*v1.DownwardAPIProjection)({ Items: ([]v1.DownwardAPIVolumeFile) (len=1) { (v1.DownwardAPIVolumeFile) { Path: (string) (len=9) "namespace", FieldRef: (*v1.ObjectFieldSelector)({ APIVersion: (string) (len=2) "v1", FieldPath: (string) (len=18) "metadata.namespace" }), ResourceFieldRef: (*v1.ResourceFieldSelector)(<nil>), Mode: (*int32)(<nil>) } } }), ConfigMap: (*v1.ConfigMapProjection)(<nil>), ServiceAccountToken: (*v1.ServiceAccountTokenProjection)(<nil>) } }, DefaultMode: (*int32)(420) }), PortworxVolume: (*v1.PortworxVolumeSource)(<nil>), ScaleIO: (*v1.ScaleIOVolumeSource)(<nil>), StorageOS: (*v1.StorageOSVolumeSource)(<nil>), CSI: (*v1.CSIVolumeSource)(<nil>), Ephemeral: (*v1.EphemeralVolumeSource)(<nil>) } } }, InitContainers: ([]v1.Container) <nil>, Containers: ([]v1.Container) (len=1) { (v1.Container) { Name: (string) (len=7) "agnhost", Image: (string) (len=44) "registry.k8s.io/e2e-test-images/agnhost:2.43", Command: ([]string) <nil>, Args: ([]string) <nil>, WorkingDir: (string) "", Ports: ([]v1.ContainerPort) <nil>, EnvFrom: ([]v1.EnvFromSource) <nil>, Env: ([]v1.EnvVar) <nil>, Resources: (v1.ResourceRequirements) { Limits: (v1.ResourceList) <nil>, Requests: (v1.ResourceList) <nil>, Claims: ([]v1.ResourceClaim) <nil> }, ResizePolicy: ([]v1.ContainerResizePolicy) <nil>, VolumeMounts: ([]v1.VolumeMount) (len=1) { (v1.VolumeMount) { Name: (string) (len=21) "kube-api-access-7n2l6", ReadOnly: (bool) true, MountPath: (string) (len=45) "/var/run/secrets/kubernetes.io/serviceaccount", SubPath: (string) "", MountPropagation: (*v1.MountPropagationMode)(<nil>), SubPathExpr: (string) "" } }, VolumeDevices: ([]v1.VolumeDevice) <nil>, LivenessProbe: (*v1.Probe)(<nil>), ReadinessProbe: (*v1.Probe)(<nil>), StartupProbe: (*v1.Probe)(<nil>), Lifecycle: (*v1.Lifecycle)(<nil>), TerminationMessagePath: (string) (len=20) "/dev/termination-log", TerminationMessagePolicy: (v1.TerminationMessagePolicy) (len=4) "File", ImagePullPolicy: (v1.PullPolicy) (len=12) "IfNotPresent", SecurityContext: (*v1.SecurityContext)({ Capabilities: (*v1.Capabilities)(<nil>), Privileged: (*bool)(<nil>), SELinuxOptions: (*v1.SELinuxOptions)(<nil>), WindowsOptions: (*v1.WindowsSecurityContextOptions)(<nil>), RunAsUser: (*int64)(<nil>), RunAsGroup: (*int64)(<nil>), RunAsNonRoot: (*bool)(<nil>), ReadOnlyRootFilesystem: (*bool)(<nil>), AllowPrivilegeEscalation: (*bool)(<nil>), ProcMount: (*v1.ProcMountType)(<nil>), SeccompProfile: (*v1.SeccompProfile)(<nil>) }), Stdin: (bool) false, StdinOnce: (bool) false, TTY: (bool) false } }, EphemeralContainers: ([]v1.EphemeralContainer) <nil>, RestartPolicy: (v1.RestartPolicy) (len=6) "Always", TerminationGracePeriodSeconds: (*int64)(0), ActiveDeadlineSeconds: (*int64)(<nil>), DNSPolicy: (v1.DNSPolicy) (len=12) "ClusterFirst", NodeSelector: (map[string]string) <nil>, ServiceAccountName: (string) (len=7) "default", DeprecatedServiceAccount: (string) (len=7) "default", AutomountServiceAccountToken: (*bool)(<nil>), NodeName: (string) (len=37) "gce-scale-cluster-minion-group-4-nlws", HostNetwork: (bool) false, HostPID: (bool) false, HostIPC: (bool) false, ShareProcessNamespace: (*bool)(<nil>), SecurityContext: (*v1.PodSecurityContext)({ SELinuxOptions: (*v1.SELinuxOptions)(<nil>), WindowsOptions: (*v1.WindowsSecurityContextOptions)(<nil>), RunAsUser: (*int64)(<nil>), RunAsGroup: (*int64)(<nil>), RunAsNonRoot: (*bool)(<nil>), SupplementalGroups: ([]int64) <nil>, FSGroup: (*int64)(<nil>), Sysctls: ([]v1.Sysctl) <nil>, FSGroupChangePolicy: (*v1.PodFSGroupChangePolicy)(<nil>), SeccompProfile: (*v1.SeccompProfile)(<nil>) }), ImagePullSecrets: ([]v1.LocalObjectReference) <nil>, Hostname: (string) "", Subdomain: (string) "", Affinity: (*v1.Affinity)(<nil>), SchedulerName: (string) (len=17) "default-scheduler", Tolerations: ([]v1.Toleration) (len=2) { (v1.Toleration) { Key: (string) (len=28) "node.kubernetes.io/not-ready", Operator: (v1.TolerationOperator) (len=6) "Exists", Value: (string) "", Effect: (v1.TaintEffect) (len=9) "NoExecute", TolerationSeconds: (*int64)(300) }, (v1.Toleration) { Key: (string) (len=30) "node.kubernetes.io/unreachable", Operator: (v1.TolerationOperator) (len=6) "Exists", Value: (string) "", Effect: (v1.TaintEffect) (len=9) "NoExecute", TolerationSeconds: (*int64)(300) } }, HostAliases: ([]v1.HostAlias) <nil>, PriorityClassName: (string) "", Priority: (*int32)(0), DNSConfig: (*v1.PodDNSConfig)(<nil>), ReadinessGates: ([]v1.PodReadinessGate) <nil>, RuntimeClassName: (*string)(<nil>), EnableServiceLinks: (*bool)(true), PreemptionPolicy: (*v1.PreemptionPolicy)((len=20) "PreemptLowerPriority"), Overhead: (v1.ResourceList) <nil>, TopologySpreadConstraints: ([]v1.TopologySpreadConstraint) <nil>, SetHostnameAsFQDN: (*bool)(<nil>), OS: (*v1.PodOS)(<nil>), HostUsers: (*bool)(<nil>), SchedulingGates: ([]v1.PodSchedulingGate) <nil>, ResourceClaims: ([]v1.PodResourceClaim) <nil> }, Status: (v1.PodStatus) { Phase: (v1.PodPhase) (len=7) "Running", Conditions: ([]v1.PodCondition) (len=4) { (v1.PodCondition) { Type: (v1.PodConditionType) (len=11) "Initialized", Status: (v1.ConditionStatus) (len=4) "True", LastProbeTime: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 0, loc: (*time.Location)(<nil>) } }, LastTransitionTime: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263144, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }, Reason: (string) "", Message: (string) "" }, (v1.PodCondition) { Type: (v1.PodConditionType) (len=5) "Ready", Status: (v1.ConditionStatus) (len=5) "False", LastProbeTime: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 0, loc: (*time.Location)(<nil>) } }, LastTransitionTime: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263144, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }, Reason: (string) (len=18) "ContainersNotReady", Message: (string) (len=41) "containers with unready status: [agnhost]" }, (v1.PodCondition) { Type: (v1.PodConditionType) (len=15) "ContainersReady", Status: (v1.ConditionStatus) (len=5) "False", LastProbeTime: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 0, loc: (*time.Location)(<nil>) } }, LastTransitionTime: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263144, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }, Reason: (string) (len=18) "ContainersNotReady", Message: (string) (len=41) "containers with unready status: [agnhost]" }, (v1.PodCondition) { Type: (v1.PodConditionType) (len=12) "PodScheduled", Status: (v1.ConditionStatus) (len=4) "True", LastProbeTime: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 0, loc: (*time.Location)(<nil>) } }, LastTransitionTime: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263144, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }, Reason: (string) "", Message: (string) "" } }, Message: (string) "", Reason: (string) "", NominatedNodeName: (string) "", HostIP: (string) (len=11) "10.40.1.160", PodIP: (string) (len=11) "10.66.26.57", PodIPs: ([]v1.PodIP) (len=1) { (v1.PodIP) { IP: (string) (len=11) "10.66.26.57" } }, StartTime: (*v1.Time)({ Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263144, loc: (*time.Location)({ name: (string) (len=5) "Local", zone: ([]time.zone) (len=1) { (time.zone) { name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false } }, tx: ([]time.zoneTrans) (len=1) { (time.zoneTrans) { when: (int64) -9223372036854775808, index: (uint8) 0, isstd: (bool) false, isutc: (bool) false } }, extend: (string) (len=4) "UTC0", cacheStart: (int64) -9223372036854775808, cacheEnd: (int64) 9223372036854775807, cacheZone: (*time.zone)({ name: (string) (len=3) "UTC", offset: (int) 0, isDST: (bool) false }) }) } }), InitContainerStatuses: ([]v1.ContainerStatus) <nil>, ContainerStatuses: ([]v1.ContainerStatus) (len=1) { (v1.ContainerStatus) { Name: (string) (len=7) "agnhost", State: (v1.ContainerState) { Waiting: (*v1.ContainerStateWaiting)({ Reason: (string) (len=16) "CrashLoopBackOff", Message: (string) (len=156) "back-off 2m40s restarting failed container=agnhost pod=test-rolling-update-deployment-656d657cd8-whfjq_deployment-4105(6b969c1d-0239-4187-a81b-9cc11060c62d)" }), Running: (*v1.ContainerStateRunning)(<nil>), Terminated: (*v1.ContainerStateTerminated)(<nil>) }, LastTerminationState: (v1.ContainerState) { Waiting: (*v1.ContainerStateWaiting)(<nil>), Running: (*v1.ContainerStateRunning)(<nil>), Terminated: (*v1.ContainerStateTerminated)({ ExitCode: (int32) 128, Signal: (int32) 0, Reason: (string) (len=10) "StartError", Message: (string) (len=223) "failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to create new parent process: namespace path: lstat /proc/160509/ns/ipc: no such file or directory: unknown", StartedAt: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 62135596800, loc: (*time.Location)(<already shown>) } }, FinishedAt: (v1.Time) { Time: (time.Time) { wall: (uint64) 0, ext: (int64) 63817263295, loc: (*time.Location)(<already shown>) } }, ContainerID: (string) (len=77) "containerd://56dcd31a1df1603801825d5cc84926130affb523f462fbe33346a9a0c625bf5f" }) }, Ready: (bool) false, RestartCount: (int32) 4, Image: (string) (len=44) "registry.k8s.io/e2e-test-images/agnhost:2.43", ImageID: (string) (len=111) "registry.k8s.io/e2e-test-images/agnhost@sha256:16bbf38c463a4223d8cfe4da12bc61010b082a79b4bb003e2d3ba3ece5dd5f9e", ContainerID: (string) (len=77) "containerd://56dcd31a1df1603801825d5cc84926130affb523f462fbe33346a9a0c625bf5f", Started: (*bool)(false), AllocatedResources: (v1.ResourceList) <nil>, Resources: (*v1.ResourceRequirements)(<nil>) } }, QOSClass: (v1.PodQOSClass) (len=10) "BestEffort", EphemeralContainerStatuses: ([]v1.ContainerStatus) <nil>, Resize: (v1.PodResizeStatus) "" } } < Exit [AfterEach] [sig-apps] Deployment - test/e2e/apps/deployment.go:84 @ 04/16/23 17:37:24.364 (105ms) > Enter [AfterEach] [sig-apps] Deployment - test/e2e/framework/node/init/init.go:33 @ 04/16/23 17:37:24.364 Apr 16 17:37:24.364: INFO: Waiting up to 3m0s for all (but 50) nodes to be ready Apr 16 17:37:25.246: INFO: Condition Ready of node gce-scale-cluster-master is false, but Node is tainted by NodeController with [{node-role.kubernetes.io/master NoSchedule <nil>} {node.kubernetes.io/unschedulable NoSchedule <nil>} {node.kubernetes.io/not-ready NoSchedule <nil>} {node.kubernetes.io/network-unavailable NoSchedule 2023-04-16 17:08:26 +0000 UTC} {node.kubernetes.io/not-ready NoExecute 2023-04-16 17:13:03 +0000 UTC}]. Failure < Exit [AfterEach] [sig-apps] Deployment - test/e2e/framework/node/init/init.go:33 @ 04/16/23 17:37:25.247 (883ms) > Enter [DeferCleanup (Each)] [sig-apps] Deployment - test/e2e/framework/metrics/init/init.go:35 @ 04/16/23 17:37:25.247 < Exit [DeferCleanup (Each)] [sig-apps] Deployment - test/e2e/framework/metrics/init/init.go:35 @ 04/16/23 17:37:25.247 (0s) > Enter [DeferCleanup (Each)] [sig-apps] Deployment - dump namespaces | framework.go:209 @ 04/16/23 17:37:25.247 STEP: dump namespace information after failure - test/e2e/framework/framework.go:288 @ 04/16/23 17:37:25.248 STEP: Collecting events from namespace "deployment-4105". - test/e2e/framework/debug/dump.go:42 @ 04/16/23 17:37:25.248 STEP: Found 19 events. - test/e2e/framework/debug/dump.go:46 @ 04/16/23 17:37:25.281 Apr 16 17:37:25.281: INFO: At 2023-04-16 17:32:17 +0000 UTC - event for test-rolling-update-controller: {replicaset-controller } SuccessfulCreate: Created pod: test-rolling-update-controller-5ncp7 Apr 16 17:37:25.281: INFO: At 2023-04-16 17:32:17 +0000 UTC - event for test-rolling-update-controller-5ncp7: {default-scheduler } Scheduled: Successfully assigned deployment-4105/test-rolling-update-controller-5ncp7 to gce-scale-cluster-minion-group-zv62 Apr 16 17:37:25.281: INFO: At 2023-04-16 17:32:18 +0000 UTC - event for test-rolling-update-controller-5ncp7: {kubelet gce-scale-cluster-minion-group-zv62} Pulling: Pulling image "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" Apr 16 17:37:25.281: INFO: At 2023-04-16 17:32:22 +0000 UTC - event for test-rolling-update-controller-5ncp7: {kubelet gce-scale-cluster-minion-group-zv62} Pulled: Successfully pulled image "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" in 3.770609227s (3.770667508s including waiting) Apr 16 17:37:25.281: INFO: At 2023-04-16 17:32:22 +0000 UTC - event for test-rolling-update-controller-5ncp7: {kubelet gce-scale-cluster-minion-group-zv62} Created: Created container httpd Apr 16 17:37:25.281: INFO: At 2023-04-16 17:32:22 +0000 UTC - event for test-rolling-update-controller-5ncp7: {kubelet gce-scale-cluster-minion-group-zv62} Started: Started container httpd Apr 16 17:37:25.282: INFO: At 2023-04-16 17:32:24 +0000 UTC - event for test-rolling-update-deployment: {deployment-controller } ScalingReplicaSet: Scaled up replica set test-rolling-update-deployment-656d657cd8 to 1 Apr 16 17:37:25.282: INFO: At 2023-04-16 17:32:24 +0000 UTC - event for test-rolling-update-deployment-656d657cd8: {replicaset-controller } SuccessfulCreate: Created pod: test-rolling-update-deployment-656d657cd8-whfjq Apr 16 17:37:25.282: INFO: At 2023-04-16 17:32:24 +0000 UTC - event for test-rolling-update-deployment-656d657cd8-whfjq: {default-scheduler } Scheduled: Successfully assigned deployment-4105/test-rolling-update-deployment-656d657cd8-whfjq to gce-scale-cluster-minion-group-4-nlws Apr 16 17:37:25.282: INFO: At 2023-04-16 17:32:31 +0000 UTC - event for test-rolling-update-deployment-656d657cd8-whfjq: {kubelet gce-scale-cluster-minion-group-4-nlws} Pulling: Pulling image "registry.k8s.io/e2e-test-images/agnhost:2.43" Apr 16 17:37:25.282: INFO: At 2023-04-16 17:33:07 +0000 UTC - event for test-rolling-update-deployment-656d657cd8-whfjq: {kubelet gce-scale-cluster-minion-group-4-nlws} Pulled: Successfully pulled image "registry.k8s.io/e2e-test-images/agnhost:2.43" in 36.489757949s (36.489811391s including waiting) Apr 16 17:37:25.282: INFO: At 2023-04-16 17:33:07 +0000 UTC - event for test-rolling-update-deployment-656d657cd8-whfjq: {kubelet gce-scale-cluster-minion-group-4-nlws} Failed: Error: failed to get sandbox container task: no running task found: task dabbacf01cb2654c5c558aeb5d78e11660c610445018139b1a45c84f4d63c914 not found: not found Apr 16 17:37:25.282: INFO: At 2023-04-16 17:33:09 +0000 UTC - event for test-rolling-update-deployment-656d657cd8-whfjq: {kubelet gce-scale-cluster-minion-group-4-nlws} SandboxChanged: Pod sandbox changed, it will be killed and re-created. Apr 16 17:37:25.282: INFO: At 2023-04-16 17:33:17 +0000 UTC - event for test-rolling-update-deployment-656d657cd8-whfjq: {kubelet gce-scale-cluster-minion-group-4-nlws} Pulled: Container image "registry.k8s.io/e2e-test-images/agnhost:2.43" already present on machine Apr 16 17:37:25.282: INFO: At 2023-04-16 17:33:17 +0000 UTC - event for test-rolling-update-deployment-656d657cd8-whfjq: {kubelet gce-scale-cluster-minion-group-4-nlws} Created: Created container agnhost Apr 16 17:37:25.282: INFO: At 2023-04-16 17:33:18 +0000 UTC - event for test-rolling-update-deployment-656d657cd8-whfjq: {kubelet gce-scale-cluster-minion-group-4-nlws} Failed: Error: failed to create containerd task: failed to create shim task: ttrpc: closed: unknown Apr 16 17:37:25.282: INFO: At 2023-04-16 17:33:23 +0000 UTC - event for test-rolling-update-deployment-656d657cd8-whfjq: {kubelet gce-scale-cluster-minion-group-4-nlws} Failed: Error: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to create new parent process: namespace path: lstat /proc/150723/ns/ipc: no such file or directory: unknown Apr 16 17:37:25.282: INFO: At 2023-04-16 17:33:32 +0000 UTC - event for test-rolling-update-deployment-656d657cd8-whfjq: {kubelet gce-scale-cluster-minion-group-4-nlws} BackOff: Back-off restarting failed container agnhost in pod test-rolling-update-deployment-656d657cd8-whfjq_deployment-4105(6b969c1d-0239-4187-a81b-9cc11060c62d) Apr 16 17:37:25.282: INFO: At 2023-04-16 17:33:40 +0000 UTC - event for test-rolling-update-deployment-656d657cd8-whfjq: {kubelet gce-scale-cluster-minion-group-4-nlws} Failed: Error: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to create new parent process: namespace path: lstat /proc/152353/ns/ipc: no such file or directory: unknown Apr 16 17:37:25.316: INFO: POD NODE PHASE GRACE CONDITIONS Apr 16 17:37:25.316: INFO: test-rolling-update-controller-5ncp7 gce-scale-cluster-minion-group-zv62 Running [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2023-04-16 17:32:17 +0000 UTC } {Ready True 0001-01-01 00:00:00 +0000 UTC 2023-04-16 17:32:23 +0000 UTC } {ContainersReady True 0001-01-01 00:00:00 +0000 UTC 2023-04-16 17:32:23 +0000 UTC } {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2023-04-16 17:32:17 +0000 UTC }] Apr 16 17:37:25.316: INFO: test-rolling-update-deployment-656d657cd8-whfjq gce-scale-cluster-minion-group-4-nlws Running [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2023-04-16 17:32:24 +0000 UTC } {Ready False 0001-01-01 00:00:00 +0000 UTC 2023-04-16 17:32:24 +0000 UTC ContainersNotReady containers with unready status: [agnhost]} {ContainersReady False 0001-01-01 00:00:00 +0000 UTC 2023-04-16 17:32:24 +0000 UTC ContainersNotReady containers with unready status: [agnhost]} {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2023-04-16 17:32:24 +0000 UTC }] Apr 16 17:37:25.316: INFO: Apr 16 17:37:25.316: INFO: test-rolling-update-deployment-656d657cd8-whfjq[deployment-4105].container[agnhost]=failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to create new parent process: namespace path: lstat /proc/160509/ns/ipc: no such file or directory: unknown Apr 16 17:37:26.768: INFO: skipping dumping cluster info - cluster too large END STEP: dump namespace information after failure - test/e2e/framework/framework.go:288 @ 04/16/23 17:37:26.768 (1.521s) < Exit [DeferCleanup (Each)] [sig-apps] Deployment - dump namespaces | framework.go:209 @ 04/16/23 17:37:26.768 (1.521s) > Enter [DeferCleanup (Each)] [sig-apps] Deployment - tear down framework | framework.go:206 @ 04/16/23 17:37:26.768 STEP: Destroying namespace "deployment-4105" for this suite. - test/e2e/framework/framework.go:351 @ 04/16/23 17:37:26.768 < Exit [DeferCleanup (Each)] [sig-apps] Deployment - tear down framework | framework.go:206 @ 04/16/23 17:37:26.803 (35ms) > Enter [ReportAfterEach] TOP-LEVEL - test/e2e/e2e_test.go:144 @ 04/16/23 17:37:26.803 < Exit [ReportAfterEach] TOP-LEVEL - test/e2e/e2e_test.go:144 @ 04/16/23 17:37:26.803 (0s)
Filter through log files | View test history on testgrid
go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-network\]\sServices\sGCE\s\[Slow\]\sshould\sbe\sable\sto\screate\sand\stear\sdown\sa\sstandard\-tier\sload\sbalancer\s\[Slow\]$'
[FAILED] timed out waiting for service "net-tiers-svc" to have a new ingress IP: timed out waiting for the condition In [It] at: test/e2e/network/network_tiers.go:150 @ 04/16/23 18:35:34.545from junit_01.xml
> Enter [BeforeEach] [sig-network] Services GCE [Slow] - set up framework | framework.go:191 @ 04/16/23 17:35:40.754 STEP: Creating a kubernetes client - test/e2e/framework/framework.go:211 @ 04/16/23 17:35:40.754 Apr 16 17:35:40.754: INFO: >>> kubeConfig: /workspace/.kube/config STEP: Building a namespace api object, basename services - test/e2e/framework/framework.go:250 @ 04/16/23 17:35:40.755 STEP: Waiting for a default service account to be provisioned in namespace - test/e2e/framework/framework.go:259 @ 04/16/23 17:35:40.86 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace - test/e2e/framework/framework.go:262 @ 04/16/23 17:35:40.926 < Exit [BeforeEach] [sig-network] Services GCE [Slow] - set up framework | framework.go:191 @ 04/16/23 17:35:40.99 (235ms) > Enter [BeforeEach] [sig-network] Services GCE [Slow] - test/e2e/framework/metrics/init/init.go:33 @ 04/16/23 17:35:40.99 < Exit [BeforeEach] [sig-network] Services GCE [Slow] - test/e2e/framework/metrics/init/init.go:33 @ 04/16/23 17:35:40.99 (0s) > Enter [BeforeEach] [sig-network] Services GCE [Slow] - test/e2e/network/network_tiers.go:50 @ 04/16/23 17:35:40.99 < Exit [BeforeEach] [sig-network] Services GCE [Slow] - test/e2e/network/network_tiers.go:50 @ 04/16/23 17:35:40.99 (0s) > Enter [It] should be able to create and tear down a standard-tier load balancer [Slow] - test/e2e/network/network_tiers.go:67 @ 04/16/23 17:35:40.99 STEP: creating a pod to be part of the service net-tiers-svc - test/e2e/network/network_tiers.go:75 @ 04/16/23 17:35:41.81 Apr 16 17:35:41.845: INFO: Waiting up to 2m0s for 1 pods to be created Apr 16 17:35:41.879: INFO: Found all 1 pods Apr 16 17:35:41.879: INFO: Waiting up to 2m0s for 1 pods to be running and ready: [net-tiers-svc-8hj2v] Apr 16 17:35:48.014: INFO: Wanted all 1 pods to be running and ready. Result: true. Pods: [net-tiers-svc-8hj2v] STEP: creating a Service of type LoadBalancer using the standard network tier - test/e2e/network/network_tiers.go:80 @ 04/16/23 17:35:48.014 Apr 16 17:35:48.059: INFO: Waiting up to 45m0s for service "net-tiers-svc" to get a new ingress IP Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 5m0.236s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 5m0.001s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 4m52.977s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 5m20.238s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 5m20.003s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 5m12.979s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 5m40.24s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 5m40.005s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 5m32.981s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 6m0.243s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 6m0.007s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 5m52.983s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 6m20.246s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 6m20.01s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 6m12.987s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 6m40.248s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 6m40.013s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 6m32.989s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 7m0.25s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 7m0.015s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 6m52.991s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 7m20.252s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 7m20.017s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 7m12.993s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 7m40.254s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 7m40.019s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 7m32.995s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 8m0.256s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 8m0.02s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 7m52.996s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 8m20.257s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 8m20.022s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 8m12.998s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 8m40.259s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 8m40.024s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 8m33s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 9m0.261s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 9m0.026s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 8m53.002s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 9m20.264s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 9m20.029s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 9m13.005s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 9m40.273s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 9m40.037s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 9m33.013s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 10m0.275s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 10m0.039s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 9m53.016s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 10m20.277s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 10m20.042s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 10m13.018s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 10m40.279s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 10m40.044s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 10m33.02s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 11m0.28s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 11m0.045s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 10m53.021s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 11m20.282s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 11m20.046s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 11m13.023s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 11m40.284s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 11m40.048s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 11m33.024s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 12m0.285s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 12m0.05s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 11m53.026s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 12m20.287s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 12m20.052s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 12m13.028s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 12m40.289s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 12m40.054s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 12m33.03s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 13m0.291s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 13m0.056s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 12m53.032s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 13m20.293s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 13m20.057s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 13m13.033s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 13m40.295s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 13m40.059s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 13m33.036s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 14m0.297s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 14m0.062s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 13m53.038s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 14m20.299s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 14m20.063s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 14m13.039s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 14m40.3s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 14m40.065s) test/e2e/network/network_tiers.go:67 At [By Step] creating a Service of type LoadBalancer using the standard network tier (Step Runtime: 14m33.041s) test/e2e/network/network_tiers.go:80 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bd84b0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032bfe4e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc032bce650?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0x0, 0x0}, 0x7ff85b05ff18?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0x0?, 0x5e08ee0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:94 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 STEP: running sanity and reachability checks - test/e2e/network/network_tiers.go:156 @ 04/16/23 17:50:34.159 Apr 16 17:50:34.159: INFO: Poking "http://35.211.139.103:80/echo?msg=hello" Apr 16 17:50:34.225: INFO: Poke("http://35.211.139.103:80/echo?msg=hello"): success STEP: updating the Service to use the premium (default) tier - test/e2e/network/network_tiers.go:97 @ 04/16/23 17:50:34.365 Apr 16 17:50:34.438: INFO: Waiting up to 45m0s for service "net-tiers-svc" to get a new ingress IP Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 15m0.302s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 15m0.067s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 6.691s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 15m20.304s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 15m20.068s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 26.693s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 15m40.306s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 15m40.07s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 46.695s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 16m0.307s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 16m0.072s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 1m6.697s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 16m20.309s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 16m20.074s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 1m26.698s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 16m40.311s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 16m40.076s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 1m46.701s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 17m0.313s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 17m0.078s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 2m6.702s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 17m20.315s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 17m20.08s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 2m26.704s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 17m40.317s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 17m40.082s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 2m46.706s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 18m0.319s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 18m0.084s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 3m6.708s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 18m20.32s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 18m20.085s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 3m26.71s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 18m40.323s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 18m40.087s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 3m46.712s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 19m0.324s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 19m0.089s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 4m6.714s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 19m20.326s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 19m20.091s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 4m26.715s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 19m40.328s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 19m40.092s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 4m46.717s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 20m0.329s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 20m0.094s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 5m6.719s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 20m20.331s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 20m20.095s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 5m26.72s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 20m40.333s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 20m40.098s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 5m46.722s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 21m0.335s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 21m0.1s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 6m6.724s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 21m20.337s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 21m20.102s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 6m26.727s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 21m40.338s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 21m40.103s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 6m46.728s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 22m0.34s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 22m0.105s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 7m6.73s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 22m20.342s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 22m20.106s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 7m26.731s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 22m40.344s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 22m40.109s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 7m46.733s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 23m0.346s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 23m0.111s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 8m6.735s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 23m20.348s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 23m20.112s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 8m26.737s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 23m40.349s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 23m40.114s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 8m46.739s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 24m0.351s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 24m0.115s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 9m6.74s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 24m20.352s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 24m20.117s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 9m26.741s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 24m40.354s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 24m40.118s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 9m46.743s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 25m0.356s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 25m0.121s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 10m6.745s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 25m20.358s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 25m20.123s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 10m26.747s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 25m40.36s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 25m40.125s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 10m46.749s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 26m0.362s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 26m0.127s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 11m6.751s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 26m20.364s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 26m20.129s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 11m26.753s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 26m40.365s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 26m40.13s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 11m46.754s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 27m0.367s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 27m0.132s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 12m6.756s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 27m20.369s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 27m20.133s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 12m26.758s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 27m40.37s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 27m40.135s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 12m46.759s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 28m0.372s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 28m0.137s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 13m6.761s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 28m20.374s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 28m20.139s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 13m26.763s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 28m40.376s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 28m40.14s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 13m46.765s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 29m0.378s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 29m0.142s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 14m6.767s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 29m20.379s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 29m20.144s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 14m26.768s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 29m40.38s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 29m40.145s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 14m46.769s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 30m0.382s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 30m0.146s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 15m6.771s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 30m20.383s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 30m20.148s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 15m26.772s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 30m40.385s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 30m40.149s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 15m46.774s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 31m0.386s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 31m0.151s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 16m6.775s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 31m20.388s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 31m20.153s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 16m26.777s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 31m40.39s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 31m40.154s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 16m46.779s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 32m0.392s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 32m0.156s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 17m6.781s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 32m20.393s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 32m20.158s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 17m26.782s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 32m40.395s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 32m40.16s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 17m46.784s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 33m0.397s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 33m0.162s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 18m6.786s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 33m20.399s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 33m20.164s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 18m26.788s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 33m40.401s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 33m40.166s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 18m46.79s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 34m0.403s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 34m0.168s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 19m6.792s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 34m20.405s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 34m20.169s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 19m26.794s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 34m40.406s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 34m40.171s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 19m46.795s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 35m0.407s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 35m0.172s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 20m6.796s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 35m20.409s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 35m20.174s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 20m26.798s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 35m40.411s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 35m40.176s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 20m46.8s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 36m0.413s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 36m0.178s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 21m6.802s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 36m20.414s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 36m20.179s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 21m26.803s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 36m40.416s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 36m40.181s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 21m46.805s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 37m0.418s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 37m0.183s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 22m6.807s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 37m20.42s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 37m20.184s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 22m26.809s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 37m40.422s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 37m40.186s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 22m46.811s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 38m0.423s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 38m0.188s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 23m6.813s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 38m20.425s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 38m20.19s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 23m26.814s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 38m40.426s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 38m40.191s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 23m46.816s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 39m0.428s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 39m0.193s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 24m6.818s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 39m20.43s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 39m20.195s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 24m26.819s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 39m40.432s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 39m40.197s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 24m46.821s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 40m0.434s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 40m0.199s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 25m6.823s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 40m20.436s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 40m20.201s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 25m26.825s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 40m40.438s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 40m40.202s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 25m46.827s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 41m0.439s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 41m0.204s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 26m6.828s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 41m20.44s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 41m20.205s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 26m26.83s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 41m40.443s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 41m40.207s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 26m46.832s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 42m0.444s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 42m0.209s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 27m6.833s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 42m20.446s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 42m20.211s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 27m26.835s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 42m40.448s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 42m40.213s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 27m46.838s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 43m0.45s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 43m0.215s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 28m6.84s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 43m20.452s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 43m20.217s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 28m26.841s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 43m40.454s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 43m40.219s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 28m46.843s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 44m0.455s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 44m0.22s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 29m6.845s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 44m20.457s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 44m20.222s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 29m26.846s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 44m40.459s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 44m40.224s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 29m46.848s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 45m0.46s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 45m0.225s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 30m6.85s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 45m20.462s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 45m20.227s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 30m26.851s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 45m40.464s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 45m40.229s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 30m46.853s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 46m0.466s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 46m0.231s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 31m6.855s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 46m20.468s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 46m20.233s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 31m26.857s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 46m40.47s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 46m40.235s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 31m46.86s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 47m0.472s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 47m0.236s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 32m6.861s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 47m20.474s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 47m20.239s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 32m26.863s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 47m40.475s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 47m40.24s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 32m46.865s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 48m0.477s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 48m0.242s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 33m6.866s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 48m20.479s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 48m20.244s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 33m26.868s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 48m40.481s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 48m40.246s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 33m46.87s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 49m0.483s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 49m0.248s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 34m6.873s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 49m20.486s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 49m20.25s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 34m26.875s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 49m40.487s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 49m40.251s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 34m46.876s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 50m0.489s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 50m0.254s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 35m6.878s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 50m20.491s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 50m20.255s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 35m26.88s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 50m40.492s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 50m40.257s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 35m46.882s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 51m0.494s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 51m0.259s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 36m6.883s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 51m20.496s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 51m20.261s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 36m26.885s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 51m40.498s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 51m40.263s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 36m46.887s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 52m0.5s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 52m0.265s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 37m6.889s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 52m20.502s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 52m20.267s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 37m26.891s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 52m40.503s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 52m40.268s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 37m46.893s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 53m0.506s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 53m0.27s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 38m6.895s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 53m20.507s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 53m20.272s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 38m26.897s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 53m40.509s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 53m40.274s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 38m46.899s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 54m0.511s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 54m0.276s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 39m6.9s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 54m20.513s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 54m20.278s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 39m26.902s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 54m40.514s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 54m40.279s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 39m46.904s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 55m0.516s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 55m0.281s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 40m6.905s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 55m20.518s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 55m20.282s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 40m26.907s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 55m40.519s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 55m40.284s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 40m46.909s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 56m0.521s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 56m0.286s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 41m6.911s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 56m20.523s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 56m20.288s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 41m26.912s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 56m40.525s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 56m40.29s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 41m46.914s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 57m0.527s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 57m0.291s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 42m6.916s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 57m20.528s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 57m20.293s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 42m26.918s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 57m40.53s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 57m40.294s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 42m46.919s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 58m0.531s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 58m0.296s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 43m6.92s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 58m20.533s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 58m20.297s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 43m26.922s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 58m40.534s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 58m40.299s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 43m46.923s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 59m0.536s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 59m0.301s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 44m6.925s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 59m20.538s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 59m20.303s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 44m26.927s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 59m40.54s) test/e2e/network/network_tiers.go:67 In [It] (Node Runtime: 59m40.305s) test/e2e/network/network_tiers.go:67 At [By Step] updating the Service to use the premium (default) tier (Step Runtime: 44m46.929s) test/e2e/network/network_tiers.go:97 Spec Goroutine goroutine 5946 [select] k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc032d71b30}, 0xc0214445d0, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:205 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc032d71b30}, 0xe0?, 0xc032d756e0?, 0x53?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollImmediateWithContext({0x7ff830060510, 0xc032d71b30}, 0xc017c29eb0?, 0x10?, 0x723f120?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:175 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).waitForCondition(0xc032b5c0a0, {0x7ff830060510?, 0xc032d71b30?}, 0x37?, {0x6ae1abc, 0x15}, 0x2?) test/e2e/framework/service/jig.go:630 k8s.io/kubernetes/test/e2e/framework/service.(*TestJig).WaitForNewIngressIP(0xc032b5c0a0, {0x7ff830060510, 0xc032d71b30}, {0xc032d52a60, 0xe}, 0x725cf00?) test/e2e/framework/service/jig.go:541 > k8s.io/kubernetes/test/e2e/network.waitAndVerifyLBWithTier({0x7ff830060510, 0xc032d71b30}, 0x600c0e0?, {0xc032d52a60?, 0x0?}, 0x0?, 0x0?) test/e2e/network/network_tiers.go:149 > k8s.io/kubernetes/test/e2e/network.glob..func21.3({0x7ff830060510, 0xc032d71b30}) test/e2e/network/network_tiers.go:109 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc032d71b30}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Apr 16 18:35:34.545: INFO: Unexpected error: <*fmt.wrapError | 0xc0200d0360>: timed out waiting for service "net-tiers-svc" to have a new ingress IP: timed out waiting for the condition { msg: "timed out waiting for service \"net-tiers-svc\" to have a new ingress IP: timed out waiting for the condition", err: <wait.errInterrupted>{ cause: <*errors.errorString | 0xc00023dbb0>{ s: "timed out waiting for the condition", }, }, } [FAILED] timed out waiting for service "net-tiers-svc" to have a new ingress IP: timed out waiting for the condition In [It] at: test/e2e/network/network_tiers.go:150 @ 04/16/23 18:35:34.545 < Exit [It] should be able to create and tear down a standard-tier load balancer [Slow] - test/e2e/network/network_tiers.go:67 @ 04/16/23 18:35:34.545 (59m53.556s) > Enter [AfterEach] [sig-network] Services GCE [Slow] - test/e2e/framework/node/init/init.go:33 @ 04/16/23 18:35:34.545 Apr 16 18:35:34.545: INFO: Waiting up to 3m0s for all (but 50) nodes to be ready Apr 16 18:35:35.387: INFO: Condition Ready of node gce-scale-cluster-master is false, but Node is tainted by NodeController with [{node-role.kubernetes.io/master NoSchedule <nil>} {node.kubernetes.io/unschedulable NoSchedule <nil>} {node.kubernetes.io/not-ready NoSchedule <nil>} {node.kubernetes.io/network-unavailable NoSchedule 2023-04-16 17:08:26 +0000 UTC} {node.kubernetes.io/not-ready NoExecute 2023-04-16 17:13:03 +0000 UTC}]. Failure < Exit [AfterEach] [sig-network] Services GCE [Slow] - test/e2e/framework/node/init/init.go:33 @ 04/16/23 18:35:35.389 (843ms) > Enter [AfterEach] [sig-network] Services GCE [Slow] - test/e2e/network/network_tiers.go:56 @ 04/16/23 18:35:35.389 Apr 16 18:35:35.389: INFO: Output of kubectl describe svc: Apr 16 18:35:35.389: INFO: Running '/workspace/kubernetes/platforms/linux/amd64/kubectl --server=https://34.23.19.83 --kubeconfig=/workspace/.kube/config --namespace=services-3740 describe svc --namespace=services-3740' Apr 16 18:35:35.657: INFO: stderr: "" Apr 16 18:35:35.657: INFO: stdout: "Name: net-tiers-svc\nNamespace: services-3740\nLabels: testid=net-tiers-svc-7f2698dd-f6cf-4779-95b2-981e98daa829\nAnnotations: cloud.google.com/network-tier: Premium\nSelector: testid=net-tiers-svc-7f2698dd-f6cf-4779-95b2-981e98daa829\nType: LoadBalancer\nIP Family Policy: SingleStack\nIP Families: IPv4\nIP: 10.0.84.120\nIPs: 10.0.84.120\nLoadBalancer Ingress: 35.211.139.103\nPort: <unset> 80/TCP\nTargetPort: 80/TCP\nNodePort: <unset> 31070/TCP\nEndpoints: 10.67.25.3:80\nSession Affinity: None\nExternal Traffic Policy: Cluster\nEvents:\n Type Reason Age From Message\n ---- ------ ---- ---- -------\n Normal EnsuredLoadBalancer 45m service-controller Ensured load balancer\n Normal EnsuringLoadBalancer 21m (x2 over 53m) service-controller Ensuring load balancer\n" Apr 16 18:35:35.657: INFO: Name: net-tiers-svc Namespace: services-3740 Labels: testid=net-tiers-svc-7f2698dd-f6cf-4779-95b2-981e98daa829 Annotations: cloud.google.com/network-tier: Premium Selector: testid=net-tiers-svc-7f2698dd-f6cf-4779-95b2-981e98daa829 Type: LoadBalancer IP Family Policy: SingleStack IP Families: IPv4 IP: 10.0.84.120 IPs: 10.0.84.120 LoadBalancer Ingress: 35.211.139.103 Port: <unset> 80/TCP TargetPort: 80/TCP NodePort: <unset> 31070/TCP Endpoints: 10.67.25.3:80 Session Affinity: None External Traffic Policy: Cluster Events: Type Reason Age From Message ---- ------ ---- ---- ------- Normal EnsuredLoadBalancer 45m service-controller Ensured load balancer Normal EnsuringLoadBalancer 21m (x2 over 53m) service-controller Ensuring load balancer Apr 16 18:35:35.657: INFO: cleaning gce resource for ab8ee954d32d1412a90397b4d54cd537 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 1h4m54.635s) test/e2e/network/network_tiers.go:67 In [AfterEach] (Node Runtime: 5m0s) test/e2e/network/network_tiers.go:56 Spec Goroutine goroutine 7790 [select] k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*MinimumRateLimiter).Accept(0xc010e4cb90, {0x72715d0, 0xc0232625a0}, 0x6578120?) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/ratelimit.go:100 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*gceRateLimiter).Accept(0xc0007ac0a8, {0x72715d0, 0xc0232625a0}, 0xc017cf2f00) vendor/k8s.io/legacy-cloud-providers/gce/support.go:64 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).pollOperation(0xc000240e40, {0x72715d0?, 0xc0232625a0}, {0x7259c00?, 0xc023262900}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:97 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).WaitForCompletion(0xc010e4cdc0?, {0x72715d0, 0xc0232625a0}, {0x6093d80?, 0xc0201d3040}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:76 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*GCEForwardingRules).Delete(0xc0007ac148, {0x72715d0?, 0xc0232625a0}, 0xc023262600) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/gen.go:12223 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*Cloud).DeleteRegionForwardingRule(0xc00077cf00, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50, 0x8}) vendor/k8s.io/legacy-cloud-providers/gce/gce_forwardingrule.go:183 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).cleanupGCEResources(0xc0007ac378, {0x7ff830060510, 0xc0231fc3f0}, {0x72adfb0, 0xc0201d3ba0}, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50?, 0xc0232024e0?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:314 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources.func1({0x7ff830060510?, 0xc0231fc3f0?}) test/e2e/framework/providers/gce/gce.go:291 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.runConditionWithCrashProtectionWithContext({0x7ff830060510?, 0xc0231fc3f0?}, 0x223c0c5?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:154 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc0231dd848, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:207 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc0231fc3f0}, 0xc0?, 0x1?, 0x1?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc00019c4e0?, 0xc0231dd830?, 0x13?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:85 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources(0x6b0f1fc?, {0x7ff830060510?, 0xc0231fc3f0?}, {0x72adfb0?, 0xc0201d3ba0?}, {0xc032bcdad0?, 0x1?}, {0x7ffc62d71a50?, 0x82fb081?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:290 > k8s.io/kubernetes/test/e2e/network.glob..func21.2({0x7ff830060510, 0xc0231fc3f0}) test/e2e/network/network_tiers.go:62 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc0231fc3f0}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 1h5m14.636s) test/e2e/network/network_tiers.go:67 In [AfterEach] (Node Runtime: 5m20.002s) test/e2e/network/network_tiers.go:56 Spec Goroutine goroutine 7790 [select] k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*MinimumRateLimiter).Accept(0xc010e4cb90, {0x72715d0, 0xc0232625a0}, 0x6578120?) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/ratelimit.go:100 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*gceRateLimiter).Accept(0xc0007ac0a8, {0x72715d0, 0xc0232625a0}, 0xc018ed38c0) vendor/k8s.io/legacy-cloud-providers/gce/support.go:64 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).pollOperation(0xc000240e40, {0x72715d0?, 0xc0232625a0}, {0x7259c00?, 0xc023262900}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:97 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).WaitForCompletion(0xc010e4cdc0?, {0x72715d0, 0xc0232625a0}, {0x6093d80?, 0xc0201d3040}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:76 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*GCEForwardingRules).Delete(0xc0007ac148, {0x72715d0?, 0xc0232625a0}, 0xc023262600) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/gen.go:12223 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*Cloud).DeleteRegionForwardingRule(0xc00077cf00, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50, 0x8}) vendor/k8s.io/legacy-cloud-providers/gce/gce_forwardingrule.go:183 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).cleanupGCEResources(0xc0007ac378, {0x7ff830060510, 0xc0231fc3f0}, {0x72adfb0, 0xc0201d3ba0}, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50?, 0xc0232024e0?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:314 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources.func1({0x7ff830060510?, 0xc0231fc3f0?}) test/e2e/framework/providers/gce/gce.go:291 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.runConditionWithCrashProtectionWithContext({0x7ff830060510?, 0xc0231fc3f0?}, 0x223c0c5?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:154 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc0231dd848, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:207 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc0231fc3f0}, 0xc0?, 0x1?, 0x1?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc00019c4e0?, 0xc0231dd830?, 0x13?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:85 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources(0x6b0f1fc?, {0x7ff830060510?, 0xc0231fc3f0?}, {0x72adfb0?, 0xc0201d3ba0?}, {0xc032bcdad0?, 0x1?}, {0x7ffc62d71a50?, 0x82fb081?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:290 > k8s.io/kubernetes/test/e2e/network.glob..func21.2({0x7ff830060510, 0xc0231fc3f0}) test/e2e/network/network_tiers.go:62 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc0231fc3f0}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 1h5m34.639s) test/e2e/network/network_tiers.go:67 In [AfterEach] (Node Runtime: 5m40.004s) test/e2e/network/network_tiers.go:56 Spec Goroutine goroutine 7790 [select] k8s.io/kubernetes/vendor/golang.org/x/net/http2.(*ClientConn).RoundTrip(0xc0231e6f00, 0xc011bb2900) vendor/golang.org/x/net/http2/transport.go:1269 k8s.io/kubernetes/vendor/golang.org/x/net/http2.(*Transport).RoundTripOpt(0xc0008d46c0, 0xc011bb2900, {0x0?}) vendor/golang.org/x/net/http2/transport.go:561 k8s.io/kubernetes/vendor/golang.org/x/net/http2.(*Transport).RoundTrip(...) vendor/golang.org/x/net/http2/transport.go:513 k8s.io/kubernetes/vendor/golang.org/x/net/http2.noDialH2RoundTripper.RoundTrip({0xc00069f2c0?}, 0xc011bb2900?) vendor/golang.org/x/net/http2/transport.go:3085 net/http.(*Transport).roundTrip(0xc00069f2c0, 0xc011bb2900) /usr/local/go/src/net/http/transport.go:548 net/http.(*Transport).RoundTrip(0xc010e4bb50?, 0xc032d8e1e0?) /usr/local/go/src/net/http/roundtrip.go:17 k8s.io/kubernetes/vendor/google.golang.org/api/transport/http.(*parameterTransport).RoundTrip(0xc000912040, 0xc011bb2800) vendor/google.golang.org/api/transport/http/dial.go:147 k8s.io/kubernetes/vendor/go.opencensus.io/plugin/ochttp.(*traceTransport).RoundTrip(0xc010b91900, 0xc011bb2700) vendor/go.opencensus.io/plugin/ochttp/trace.go:84 k8s.io/kubernetes/vendor/go.opencensus.io/plugin/ochttp.statsTransport.RoundTrip({{0x7241a20?, 0xc010b91900?}}, 0xc011bb2600) vendor/go.opencensus.io/plugin/ochttp/client_stats.go:57 k8s.io/kubernetes/vendor/go.opencensus.io/plugin/ochttp.(*Transport).RoundTrip(0xc00083dc70, 0xc011bb2600) vendor/go.opencensus.io/plugin/ochttp/client.go:99 k8s.io/kubernetes/vendor/golang.org/x/oauth2.(*Transport).RoundTrip(0xc00012d560, 0xc011bb2500) vendor/golang.org/x/oauth2/transport.go:55 net/http.send(0xc011bb2500, {0x72422c0, 0xc00012d560}, {0x8?, 0x69cbd20?, 0x0?}) /usr/local/go/src/net/http/client.go:252 net/http.(*Client).send(0xc0008d3e90, 0xc011bb2500, {0xc010e4c4f0?, 0xc023221900?, 0x0?}) /usr/local/go/src/net/http/client.go:176 net/http.(*Client).do(0xc0008d3e90, 0xc011bb2500) /usr/local/go/src/net/http/client.go:716 net/http.(*Client).Do(...) /usr/local/go/src/net/http/client.go:582 k8s.io/kubernetes/vendor/google.golang.org/api/internal/gensupport.send({0x72715d0?, 0xc0232625a0}, 0x6abce28?, 0xc011bb2400) vendor/google.golang.org/api/internal/gensupport/send.go:35 k8s.io/kubernetes/vendor/google.golang.org/api/internal/gensupport.SendRequest({0x72715d0, 0xc0232625a0}, 0x6aa7cee?, 0xc011bb2400) vendor/google.golang.org/api/internal/gensupport/send.go:28 k8s.io/kubernetes/vendor/google.golang.org/api/compute/v1.(*RegionOperationsGetCall).doRequest(0xc010e4cb40, {0x6a98b75, 0x4}) vendor/google.golang.org/api/compute/v1/compute-gen.go:131211 k8s.io/kubernetes/vendor/google.golang.org/api/compute/v1.(*RegionOperationsGetCall).Do(0xc010e4cb40, {0x0?, 0x2?, 0x0?}) vendor/google.golang.org/api/compute/v1/compute-gen.go:131223 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*gaOperation).isDone(0xc023262900, {0x72715d0?, 0xc0232625a0}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/op.go:69 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).pollOperation(0xc000240e40, {0x72715d0?, 0xc0232625a0}, {0x7259c00?, 0xc023262900}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:98 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).WaitForCompletion(0xc010e4cdc0?, {0x72715d0, 0xc0232625a0}, {0x6093d80?, 0xc0201d3040}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:76 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*GCEForwardingRules).Delete(0xc0007ac148, {0x72715d0?, 0xc0232625a0}, 0xc023262600) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/gen.go:12223 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*Cloud).DeleteRegionForwardingRule(0xc00077cf00, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50, 0x8}) vendor/k8s.io/legacy-cloud-providers/gce/gce_forwardingrule.go:183 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).cleanupGCEResources(0xc0007ac378, {0x7ff830060510, 0xc0231fc3f0}, {0x72adfb0, 0xc0201d3ba0}, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50?, 0xc0232024e0?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:314 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources.func1({0x7ff830060510?, 0xc0231fc3f0?}) test/e2e/framework/providers/gce/gce.go:291 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.runConditionWithCrashProtectionWithContext({0x7ff830060510?, 0xc0231fc3f0?}, 0x223c0c5?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:154 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc0231dd848, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:207 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc0231fc3f0}, 0xc0?, 0x1?, 0x1?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc00019c4e0?, 0xc0231dd830?, 0x13?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:85 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources(0x6b0f1fc?, {0x7ff830060510?, 0xc0231fc3f0?}, {0x72adfb0?, 0xc0201d3ba0?}, {0xc032bcdad0?, 0x1?}, {0x7ffc62d71a50?, 0x82fb081?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:290 > k8s.io/kubernetes/test/e2e/network.glob..func21.2({0x7ff830060510, 0xc0231fc3f0}) test/e2e/network/network_tiers.go:62 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc0231fc3f0}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 1h5m54.64s) test/e2e/network/network_tiers.go:67 In [AfterEach] (Node Runtime: 6m0.006s) test/e2e/network/network_tiers.go:56 Spec Goroutine goroutine 7790 [select] k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*MinimumRateLimiter).Accept(0xc010e4cb90, {0x72715d0, 0xc0232625a0}, 0x6578120?) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/ratelimit.go:100 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*gceRateLimiter).Accept(0xc0007ac0a8, {0x72715d0, 0xc0232625a0}, 0xc01566a800) vendor/k8s.io/legacy-cloud-providers/gce/support.go:64 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).pollOperation(0xc000240e40, {0x72715d0?, 0xc0232625a0}, {0x7259c00?, 0xc023262900}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:97 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).WaitForCompletion(0xc010e4cdc0?, {0x72715d0, 0xc0232625a0}, {0x6093d80?, 0xc0201d3040}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:76 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*GCEForwardingRules).Delete(0xc0007ac148, {0x72715d0?, 0xc0232625a0}, 0xc023262600) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/gen.go:12223 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*Cloud).DeleteRegionForwardingRule(0xc00077cf00, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50, 0x8}) vendor/k8s.io/legacy-cloud-providers/gce/gce_forwardingrule.go:183 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).cleanupGCEResources(0xc0007ac378, {0x7ff830060510, 0xc0231fc3f0}, {0x72adfb0, 0xc0201d3ba0}, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50?, 0xc0232024e0?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:314 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources.func1({0x7ff830060510?, 0xc0231fc3f0?}) test/e2e/framework/providers/gce/gce.go:291 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.runConditionWithCrashProtectionWithContext({0x7ff830060510?, 0xc0231fc3f0?}, 0x223c0c5?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:154 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc0231dd848, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:207 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc0231fc3f0}, 0xc0?, 0x1?, 0x1?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc00019c4e0?, 0xc0231dd830?, 0x13?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:85 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources(0x6b0f1fc?, {0x7ff830060510?, 0xc0231fc3f0?}, {0x72adfb0?, 0xc0201d3ba0?}, {0xc032bcdad0?, 0x1?}, {0x7ffc62d71a50?, 0x82fb081?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:290 > k8s.io/kubernetes/test/e2e/network.glob..func21.2({0x7ff830060510, 0xc0231fc3f0}) test/e2e/network/network_tiers.go:62 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc0231fc3f0}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 1h6m14.642s) test/e2e/network/network_tiers.go:67 In [AfterEach] (Node Runtime: 6m20.008s) test/e2e/network/network_tiers.go:56 Spec Goroutine goroutine 7790 [select, 2 minutes] k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*MinimumRateLimiter).Accept(0xc010e4cb90, {0x72715d0, 0xc0232625a0}, 0x6578120?) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/ratelimit.go:100 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*gceRateLimiter).Accept(0xc0007ac0a8, {0x72715d0, 0xc0232625a0}, 0xc01566bfc0) vendor/k8s.io/legacy-cloud-providers/gce/support.go:64 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).pollOperation(0xc000240e40, {0x72715d0?, 0xc0232625a0}, {0x7259c00?, 0xc023262900}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:97 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).WaitForCompletion(0xc010e4cdc0?, {0x72715d0, 0xc0232625a0}, {0x6093d80?, 0xc0201d3040}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:76 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*GCEForwardingRules).Delete(0xc0007ac148, {0x72715d0?, 0xc0232625a0}, 0xc023262600) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/gen.go:12223 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*Cloud).DeleteRegionForwardingRule(0xc00077cf00, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50, 0x8}) vendor/k8s.io/legacy-cloud-providers/gce/gce_forwardingrule.go:183 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).cleanupGCEResources(0xc0007ac378, {0x7ff830060510, 0xc0231fc3f0}, {0x72adfb0, 0xc0201d3ba0}, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50?, 0xc0232024e0?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:314 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources.func1({0x7ff830060510?, 0xc0231fc3f0?}) test/e2e/framework/providers/gce/gce.go:291 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.runConditionWithCrashProtectionWithContext({0x7ff830060510?, 0xc0231fc3f0?}, 0x223c0c5?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:154 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc0231dd848, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:207 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc0231fc3f0}, 0xc0?, 0x1?, 0x1?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc00019c4e0?, 0xc0231dd830?, 0x13?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:85 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources(0x6b0f1fc?, {0x7ff830060510?, 0xc0231fc3f0?}, {0x72adfb0?, 0xc0201d3ba0?}, {0xc032bcdad0?, 0x1?}, {0x7ffc62d71a50?, 0x82fb081?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:290 > k8s.io/kubernetes/test/e2e/network.glob..func21.2({0x7ff830060510, 0xc0231fc3f0}) test/e2e/network/network_tiers.go:62 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc0231fc3f0}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 1h6m34.643s) test/e2e/network/network_tiers.go:67 In [AfterEach] (Node Runtime: 6m40.009s) test/e2e/network/network_tiers.go:56 Spec Goroutine goroutine 7790 [select] k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*MinimumRateLimiter).Accept(0xc010e4cb90, {0x72715d0, 0xc0232625a0}, 0x6578120?) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/ratelimit.go:100 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*gceRateLimiter).Accept(0xc0007ac0a8, {0x72715d0, 0xc0232625a0}, 0xc01bebd500) vendor/k8s.io/legacy-cloud-providers/gce/support.go:64 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).pollOperation(0xc000240e40, {0x72715d0?, 0xc0232625a0}, {0x7259c00?, 0xc023262900}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:97 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).WaitForCompletion(0xc010e4cdc0?, {0x72715d0, 0xc0232625a0}, {0x6093d80?, 0xc0201d3040}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:76 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*GCEForwardingRules).Delete(0xc0007ac148, {0x72715d0?, 0xc0232625a0}, 0xc023262600) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/gen.go:12223 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*Cloud).DeleteRegionForwardingRule(0xc00077cf00, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50, 0x8}) vendor/k8s.io/legacy-cloud-providers/gce/gce_forwardingrule.go:183 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).cleanupGCEResources(0xc0007ac378, {0x7ff830060510, 0xc0231fc3f0}, {0x72adfb0, 0xc0201d3ba0}, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50?, 0xc0232024e0?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:314 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources.func1({0x7ff830060510?, 0xc0231fc3f0?}) test/e2e/framework/providers/gce/gce.go:291 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.runConditionWithCrashProtectionWithContext({0x7ff830060510?, 0xc0231fc3f0?}, 0x223c0c5?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:154 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc0231dd848, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:207 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc0231fc3f0}, 0xc0?, 0x1?, 0x1?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc00019c4e0?, 0xc0231dd830?, 0x13?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:85 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources(0x6b0f1fc?, {0x7ff830060510?, 0xc0231fc3f0?}, {0x72adfb0?, 0xc0201d3ba0?}, {0xc032bcdad0?, 0x1?}, {0x7ffc62d71a50?, 0x82fb081?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:290 > k8s.io/kubernetes/test/e2e/network.glob..func21.2({0x7ff830060510, 0xc0231fc3f0}) test/e2e/network/network_tiers.go:62 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc0231fc3f0}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 1h6m54.645s) test/e2e/network/network_tiers.go:67 In [AfterEach] (Node Runtime: 7m0.01s) test/e2e/network/network_tiers.go:56 Spec Goroutine goroutine 7790 [select] k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*MinimumRateLimiter).Accept(0xc010e4cb90, {0x72715d0, 0xc0232625a0}, 0x6578120?) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/ratelimit.go:100 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*gceRateLimiter).Accept(0xc0007ac0a8, {0x72715d0, 0xc0232625a0}, 0xc017c20200) vendor/k8s.io/legacy-cloud-providers/gce/support.go:64 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).pollOperation(0xc000240e40, {0x72715d0?, 0xc0232625a0}, {0x7259c00?, 0xc023262900}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:97 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).WaitForCompletion(0xc010e4cdc0?, {0x72715d0, 0xc0232625a0}, {0x6093d80?, 0xc0201d3040}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:76 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*GCEForwardingRules).Delete(0xc0007ac148, {0x72715d0?, 0xc0232625a0}, 0xc023262600) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/gen.go:12223 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*Cloud).DeleteRegionForwardingRule(0xc00077cf00, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50, 0x8}) vendor/k8s.io/legacy-cloud-providers/gce/gce_forwardingrule.go:183 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).cleanupGCEResources(0xc0007ac378, {0x7ff830060510, 0xc0231fc3f0}, {0x72adfb0, 0xc0201d3ba0}, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50?, 0xc0232024e0?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:314 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources.func1({0x7ff830060510?, 0xc0231fc3f0?}) test/e2e/framework/providers/gce/gce.go:291 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.runConditionWithCrashProtectionWithContext({0x7ff830060510?, 0xc0231fc3f0?}, 0x223c0c5?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:154 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc0231dd848, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:207 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc0231fc3f0}, 0xc0?, 0x1?, 0x1?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc00019c4e0?, 0xc0231dd830?, 0x13?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:85 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources(0x6b0f1fc?, {0x7ff830060510?, 0xc0231fc3f0?}, {0x72adfb0?, 0xc0201d3ba0?}, {0xc032bcdad0?, 0x1?}, {0x7ffc62d71a50?, 0x82fb081?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:290 > k8s.io/kubernetes/test/e2e/network.glob..func21.2({0x7ff830060510, 0xc0231fc3f0}) test/e2e/network/network_tiers.go:62 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc0231fc3f0}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 1h7m14.647s) test/e2e/network/network_tiers.go:67 In [AfterEach] (Node Runtime: 7m20.012s) test/e2e/network/network_tiers.go:56 Spec Goroutine goroutine 7790 [select] k8s.io/kubernetes/vendor/golang.org/x/net/http2.(*ClientConn).RoundTrip(0xc0231e6f00, 0xc0115c8b00) vendor/golang.org/x/net/http2/transport.go:1269 k8s.io/kubernetes/vendor/golang.org/x/net/http2.(*Transport).RoundTripOpt(0xc0008d46c0, 0xc0115c8b00, {0x0?}) vendor/golang.org/x/net/http2/transport.go:561 k8s.io/kubernetes/vendor/golang.org/x/net/http2.(*Transport).RoundTrip(...) vendor/golang.org/x/net/http2/transport.go:513 k8s.io/kubernetes/vendor/golang.org/x/net/http2.noDialH2RoundTripper.RoundTrip({0xc00069f2c0?}, 0xc0115c8b00?) vendor/golang.org/x/net/http2/transport.go:3085 net/http.(*Transport).roundTrip(0xc00069f2c0, 0xc0115c8b00) /usr/local/go/src/net/http/transport.go:548 net/http.(*Transport).RoundTrip(0xc010e4bb50?, 0xc017e94570?) /usr/local/go/src/net/http/roundtrip.go:17 k8s.io/kubernetes/vendor/google.golang.org/api/transport/http.(*parameterTransport).RoundTrip(0xc000912040, 0xc0115c8a00) vendor/google.golang.org/api/transport/http/dial.go:147 k8s.io/kubernetes/vendor/go.opencensus.io/plugin/ochttp.(*traceTransport).RoundTrip(0xc017cf2480, 0xc0115c8900) vendor/go.opencensus.io/plugin/ochttp/trace.go:84 k8s.io/kubernetes/vendor/go.opencensus.io/plugin/ochttp.statsTransport.RoundTrip({{0x7241a20?, 0xc017cf2480?}}, 0xc0115c8800) vendor/go.opencensus.io/plugin/ochttp/client_stats.go:57 k8s.io/kubernetes/vendor/go.opencensus.io/plugin/ochttp.(*Transport).RoundTrip(0xc00083dc70, 0xc0115c8800) vendor/go.opencensus.io/plugin/ochttp/client.go:99 k8s.io/kubernetes/vendor/golang.org/x/oauth2.(*Transport).RoundTrip(0xc00012d560, 0xc0115c8700) vendor/golang.org/x/oauth2/transport.go:55 net/http.send(0xc0115c8700, {0x72422c0, 0xc00012d560}, {0x8?, 0x69cbd20?, 0x0?}) /usr/local/go/src/net/http/client.go:252 net/http.(*Client).send(0xc0008d3e90, 0xc0115c8700, {0xc010e4c4f0?, 0xc032bd2300?, 0x0?}) /usr/local/go/src/net/http/client.go:176 net/http.(*Client).do(0xc0008d3e90, 0xc0115c8700) /usr/local/go/src/net/http/client.go:716 net/http.(*Client).Do(...) /usr/local/go/src/net/http/client.go:582 k8s.io/kubernetes/vendor/google.golang.org/api/internal/gensupport.send({0x72715d0?, 0xc0232625a0}, 0x6abce28?, 0xc0115c8600) vendor/google.golang.org/api/internal/gensupport/send.go:35 k8s.io/kubernetes/vendor/google.golang.org/api/internal/gensupport.SendRequest({0x72715d0, 0xc0232625a0}, 0x6aa7cee?, 0xc0115c8600) vendor/google.golang.org/api/internal/gensupport/send.go:28 k8s.io/kubernetes/vendor/google.golang.org/api/compute/v1.(*RegionOperationsGetCall).doRequest(0xc010e4cb40, {0x6a98b75, 0x4}) vendor/google.golang.org/api/compute/v1/compute-gen.go:131211 k8s.io/kubernetes/vendor/google.golang.org/api/compute/v1.(*RegionOperationsGetCall).Do(0xc010e4cb40, {0x0?, 0x2?, 0x0?}) vendor/google.golang.org/api/compute/v1/compute-gen.go:131223 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*gaOperation).isDone(0xc023262900, {0x72715d0?, 0xc0232625a0}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/op.go:69 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).pollOperation(0xc000240e40, {0x72715d0?, 0xc0232625a0}, {0x7259c00?, 0xc023262900}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:98 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).WaitForCompletion(0xc010e4cdc0?, {0x72715d0, 0xc0232625a0}, {0x6093d80?, 0xc0201d3040}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:76 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*GCEForwardingRules).Delete(0xc0007ac148, {0x72715d0?, 0xc0232625a0}, 0xc023262600) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/gen.go:12223 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*Cloud).DeleteRegionForwardingRule(0xc00077cf00, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50, 0x8}) vendor/k8s.io/legacy-cloud-providers/gce/gce_forwardingrule.go:183 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).cleanupGCEResources(0xc0007ac378, {0x7ff830060510, 0xc0231fc3f0}, {0x72adfb0, 0xc0201d3ba0}, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50?, 0xc0232024e0?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:314 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources.func1({0x7ff830060510?, 0xc0231fc3f0?}) test/e2e/framework/providers/gce/gce.go:291 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.runConditionWithCrashProtectionWithContext({0x7ff830060510?, 0xc0231fc3f0?}, 0x223c0c5?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:154 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc0231dd848, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:207 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc0231fc3f0}, 0xc0?, 0x1?, 0x1?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc00019c4e0?, 0xc0231dd830?, 0x13?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:85 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources(0x6b0f1fc?, {0x7ff830060510?, 0xc0231fc3f0?}, {0x72adfb0?, 0xc0201d3ba0?}, {0xc032bcdad0?, 0x1?}, {0x7ffc62d71a50?, 0x82fb081?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:290 > k8s.io/kubernetes/test/e2e/network.glob..func21.2({0x7ff830060510, 0xc0231fc3f0}) test/e2e/network/network_tiers.go:62 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc0231fc3f0}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 1h7m34.649s) test/e2e/network/network_tiers.go:67 In [AfterEach] (Node Runtime: 7m40.015s) test/e2e/network/network_tiers.go:56 Spec Goroutine goroutine 7790 [select] k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*MinimumRateLimiter).Accept(0xc010e4cb90, {0x72715d0, 0xc0232625a0}, 0x6578120?) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/ratelimit.go:100 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*gceRateLimiter).Accept(0xc0007ac0a8, {0x72715d0, 0xc0232625a0}, 0xc010864740) vendor/k8s.io/legacy-cloud-providers/gce/support.go:64 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).pollOperation(0xc000240e40, {0x72715d0?, 0xc0232625a0}, {0x7259c00?, 0xc023262900}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:97 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).WaitForCompletion(0xc010e4cdc0?, {0x72715d0, 0xc0232625a0}, {0x6093d80?, 0xc0201d3040}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:76 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*GCEForwardingRules).Delete(0xc0007ac148, {0x72715d0?, 0xc0232625a0}, 0xc023262600) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/gen.go:12223 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*Cloud).DeleteRegionForwardingRule(0xc00077cf00, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50, 0x8}) vendor/k8s.io/legacy-cloud-providers/gce/gce_forwardingrule.go:183 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).cleanupGCEResources(0xc0007ac378, {0x7ff830060510, 0xc0231fc3f0}, {0x72adfb0, 0xc0201d3ba0}, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50?, 0xc0232024e0?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:314 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources.func1({0x7ff830060510?, 0xc0231fc3f0?}) test/e2e/framework/providers/gce/gce.go:291 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.runConditionWithCrashProtectionWithContext({0x7ff830060510?, 0xc0231fc3f0?}, 0x223c0c5?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:154 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc0231dd848, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:207 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc0231fc3f0}, 0xc0?, 0x1?, 0x1?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc00019c4e0?, 0xc0231dd830?, 0x13?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:85 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources(0x6b0f1fc?, {0x7ff830060510?, 0xc0231fc3f0?}, {0x72adfb0?, 0xc0201d3ba0?}, {0xc032bcdad0?, 0x1?}, {0x7ffc62d71a50?, 0x82fb081?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:290 > k8s.io/kubernetes/test/e2e/network.glob..func21.2({0x7ff830060510, 0xc0231fc3f0}) test/e2e/network/network_tiers.go:62 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc0231fc3f0}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 1h7m54.652s) test/e2e/network/network_tiers.go:67 In [AfterEach] (Node Runtime: 8m0.018s) test/e2e/network/network_tiers.go:56 Spec Goroutine goroutine 7790 [select] k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*MinimumRateLimiter).Accept(0xc010e4cb90, {0x72715d0, 0xc0232625a0}, 0x6578120?) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/ratelimit.go:100 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*gceRateLimiter).Accept(0xc0007ac0a8, {0x72715d0, 0xc0232625a0}, 0xc02321f740) vendor/k8s.io/legacy-cloud-providers/gce/support.go:64 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).pollOperation(0xc000240e40, {0x72715d0?, 0xc0232625a0}, {0x7259c00?, 0xc023262900}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:97 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).WaitForCompletion(0xc010e4cdc0?, {0x72715d0, 0xc0232625a0}, {0x6093d80?, 0xc0201d3040}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:76 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*GCEForwardingRules).Delete(0xc0007ac148, {0x72715d0?, 0xc0232625a0}, 0xc023262600) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/gen.go:12223 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*Cloud).DeleteRegionForwardingRule(0xc00077cf00, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50, 0x8}) vendor/k8s.io/legacy-cloud-providers/gce/gce_forwardingrule.go:183 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).cleanupGCEResources(0xc0007ac378, {0x7ff830060510, 0xc0231fc3f0}, {0x72adfb0, 0xc0201d3ba0}, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50?, 0xc0232024e0?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:314 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources.func1({0x7ff830060510?, 0xc0231fc3f0?}) test/e2e/framework/providers/gce/gce.go:291 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.runConditionWithCrashProtectionWithContext({0x7ff830060510?, 0xc0231fc3f0?}, 0x223c0c5?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:154 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc0231dd848, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:207 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc0231fc3f0}, 0xc0?, 0x1?, 0x1?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc00019c4e0?, 0xc0231dd830?, 0x13?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:85 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources(0x6b0f1fc?, {0x7ff830060510?, 0xc0231fc3f0?}, {0x72adfb0?, 0xc0201d3ba0?}, {0xc032bcdad0?, 0x1?}, {0x7ffc62d71a50?, 0x82fb081?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:290 > k8s.io/kubernetes/test/e2e/network.glob..func21.2({0x7ff830060510, 0xc0231fc3f0}) test/e2e/network/network_tiers.go:62 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc0231fc3f0}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 1h8m14.654s) test/e2e/network/network_tiers.go:67 In [AfterEach] (Node Runtime: 8m20.019s) test/e2e/network/network_tiers.go:56 Spec Goroutine goroutine 7790 [select] k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*MinimumRateLimiter).Accept(0xc010e4cb90, {0x72715d0, 0xc0232625a0}, 0x18?) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/ratelimit.go:100 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*gceRateLimiter).Accept(0xc0007ac0a8, {0x72715d0, 0xc0232625a0}, 0xc0291fe080) vendor/k8s.io/legacy-cloud-providers/gce/support.go:64 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).pollOperation(0xc000240e40, {0x72715d0?, 0xc0232625a0}, {0x7259c00?, 0xc023262900}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:97 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).WaitForCompletion(0xc010e4cdc0?, {0x72715d0, 0xc0232625a0}, {0x6093d80?, 0xc0201d3040}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:76 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*GCEForwardingRules).Delete(0xc0007ac148, {0x72715d0?, 0xc0232625a0}, 0xc023262600) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/gen.go:12223 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*Cloud).DeleteRegionForwardingRule(0xc00077cf00, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50, 0x8}) vendor/k8s.io/legacy-cloud-providers/gce/gce_forwardingrule.go:183 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).cleanupGCEResources(0xc0007ac378, {0x7ff830060510, 0xc0231fc3f0}, {0x72adfb0, 0xc0201d3ba0}, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50?, 0xc0232024e0?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:314 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources.func1({0x7ff830060510?, 0xc0231fc3f0?}) test/e2e/framework/providers/gce/gce.go:291 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.runConditionWithCrashProtectionWithContext({0x7ff830060510?, 0xc0231fc3f0?}, 0x223c0c5?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:154 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc0231dd848, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:207 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc0231fc3f0}, 0xc0?, 0x1?, 0x1?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc00019c4e0?, 0xc0231dd830?, 0x13?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:85 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources(0x6b0f1fc?, {0x7ff830060510?, 0xc0231fc3f0?}, {0x72adfb0?, 0xc0201d3ba0?}, {0xc032bcdad0?, 0x1?}, {0x7ffc62d71a50?, 0x82fb081?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:290 > k8s.io/kubernetes/test/e2e/network.glob..func21.2({0x7ff830060510, 0xc0231fc3f0}) test/e2e/network/network_tiers.go:62 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc0231fc3f0}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 1h8m34.656s) test/e2e/network/network_tiers.go:67 In [AfterEach] (Node Runtime: 8m40.021s) test/e2e/network/network_tiers.go:56 Spec Goroutine goroutine 7790 [select] k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*MinimumRateLimiter).Accept(0xc010e4cb90, {0x72715d0, 0xc0232625a0}, 0x6578120?) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/ratelimit.go:100 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*gceRateLimiter).Accept(0xc0007ac0a8, {0x72715d0, 0xc0232625a0}, 0xc01bcfd100) vendor/k8s.io/legacy-cloud-providers/gce/support.go:64 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).pollOperation(0xc000240e40, {0x72715d0?, 0xc0232625a0}, {0x7259c00?, 0xc023262900}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:97 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).WaitForCompletion(0xc010e4cdc0?, {0x72715d0, 0xc0232625a0}, {0x6093d80?, 0xc0201d3040}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:76 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*GCEForwardingRules).Delete(0xc0007ac148, {0x72715d0?, 0xc0232625a0}, 0xc023262600) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/gen.go:12223 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*Cloud).DeleteRegionForwardingRule(0xc00077cf00, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50, 0x8}) vendor/k8s.io/legacy-cloud-providers/gce/gce_forwardingrule.go:183 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).cleanupGCEResources(0xc0007ac378, {0x7ff830060510, 0xc0231fc3f0}, {0x72adfb0, 0xc0201d3ba0}, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50?, 0xc0232024e0?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:314 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources.func1({0x7ff830060510?, 0xc0231fc3f0?}) test/e2e/framework/providers/gce/gce.go:291 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.runConditionWithCrashProtectionWithContext({0x7ff830060510?, 0xc0231fc3f0?}, 0x223c0c5?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:154 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc0231dd848, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:207 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc0231fc3f0}, 0xc0?, 0x1?, 0x1?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc00019c4e0?, 0xc0231dd830?, 0x13?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:85 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources(0x6b0f1fc?, {0x7ff830060510?, 0xc0231fc3f0?}, {0x72adfb0?, 0xc0201d3ba0?}, {0xc032bcdad0?, 0x1?}, {0x7ffc62d71a50?, 0x82fb081?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:290 > k8s.io/kubernetes/test/e2e/network.glob..func21.2({0x7ff830060510, 0xc0231fc3f0}) test/e2e/network/network_tiers.go:62 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc0231fc3f0}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 1h8m54.658s) test/e2e/network/network_tiers.go:67 In [AfterEach] (Node Runtime: 9m0.024s) test/e2e/network/network_tiers.go:56 Spec Goroutine goroutine 7790 [select] k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*MinimumRateLimiter).Accept(0xc010e4cb90, {0x72715d0, 0xc0232625a0}, 0x6578120?) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/ratelimit.go:100 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*gceRateLimiter).Accept(0xc0007ac0a8, {0x72715d0, 0xc0232625a0}, 0xc0291ff600) vendor/k8s.io/legacy-cloud-providers/gce/support.go:64 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).pollOperation(0xc000240e40, {0x72715d0?, 0xc0232625a0}, {0x7259c00?, 0xc023262900}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:97 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).WaitForCompletion(0xc010e4cdc0?, {0x72715d0, 0xc0232625a0}, {0x6093d80?, 0xc0201d3040}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:76 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*GCEForwardingRules).Delete(0xc0007ac148, {0x72715d0?, 0xc0232625a0}, 0xc023262600) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/gen.go:12223 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*Cloud).DeleteRegionForwardingRule(0xc00077cf00, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50, 0x8}) vendor/k8s.io/legacy-cloud-providers/gce/gce_forwardingrule.go:183 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).cleanupGCEResources(0xc0007ac378, {0x7ff830060510, 0xc0231fc3f0}, {0x72adfb0, 0xc0201d3ba0}, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50?, 0xc0232024e0?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:314 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources.func1({0x7ff830060510?, 0xc0231fc3f0?}) test/e2e/framework/providers/gce/gce.go:291 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.runConditionWithCrashProtectionWithContext({0x7ff830060510?, 0xc0231fc3f0?}, 0x223c0c5?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:154 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc0231dd848, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:207 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc0231fc3f0}, 0xc0?, 0x1?, 0x1?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc00019c4e0?, 0xc0231dd830?, 0x13?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:85 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources(0x6b0f1fc?, {0x7ff830060510?, 0xc0231fc3f0?}, {0x72adfb0?, 0xc0201d3ba0?}, {0xc032bcdad0?, 0x1?}, {0x7ffc62d71a50?, 0x82fb081?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:290 > k8s.io/kubernetes/test/e2e/network.glob..func21.2({0x7ff830060510, 0xc0231fc3f0}) test/e2e/network/network_tiers.go:62 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc0231fc3f0}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 1h9m14.66s) test/e2e/network/network_tiers.go:67 In [AfterEach] (Node Runtime: 9m20.025s) test/e2e/network/network_tiers.go:56 Spec Goroutine goroutine 7790 [select] k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*MinimumRateLimiter).Accept(0xc010e4cb90, {0x72715d0, 0xc0232625a0}, 0x6578120?) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/ratelimit.go:100 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*gceRateLimiter).Accept(0xc0007ac0a8, {0x72715d0, 0xc0232625a0}, 0xc018ed3c00) vendor/k8s.io/legacy-cloud-providers/gce/support.go:64 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).pollOperation(0xc000240e40, {0x72715d0?, 0xc0232625a0}, {0x7259c00?, 0xc023262900}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:97 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).WaitForCompletion(0xc010e4cdc0?, {0x72715d0, 0xc0232625a0}, {0x6093d80?, 0xc0201d3040}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:76 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*GCEForwardingRules).Delete(0xc0007ac148, {0x72715d0?, 0xc0232625a0}, 0xc023262600) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/gen.go:12223 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*Cloud).DeleteRegionForwardingRule(0xc00077cf00, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50, 0x8}) vendor/k8s.io/legacy-cloud-providers/gce/gce_forwardingrule.go:183 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).cleanupGCEResources(0xc0007ac378, {0x7ff830060510, 0xc0231fc3f0}, {0x72adfb0, 0xc0201d3ba0}, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50?, 0xc0232024e0?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:314 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources.func1({0x7ff830060510?, 0xc0231fc3f0?}) test/e2e/framework/providers/gce/gce.go:291 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.runConditionWithCrashProtectionWithContext({0x7ff830060510?, 0xc0231fc3f0?}, 0x223c0c5?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:154 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc0231dd848, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:207 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc0231fc3f0}, 0xc0?, 0x1?, 0x1?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc00019c4e0?, 0xc0231dd830?, 0x13?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:85 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources(0x6b0f1fc?, {0x7ff830060510?, 0xc0231fc3f0?}, {0x72adfb0?, 0xc0201d3ba0?}, {0xc032bcdad0?, 0x1?}, {0x7ffc62d71a50?, 0x82fb081?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:290 > k8s.io/kubernetes/test/e2e/network.glob..func21.2({0x7ff830060510, 0xc0231fc3f0}) test/e2e/network/network_tiers.go:62 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc0231fc3f0}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 1h9m34.661s) test/e2e/network/network_tiers.go:67 In [AfterEach] (Node Runtime: 9m40.027s) test/e2e/network/network_tiers.go:56 Spec Goroutine goroutine 7790 [select] k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*MinimumRateLimiter).Accept(0xc010e4cb90, {0x72715d0, 0xc0232625a0}, 0x6578120?) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/ratelimit.go:100 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*gceRateLimiter).Accept(0xc0007ac0a8, {0x72715d0, 0xc0232625a0}, 0xc01d0eb340) vendor/k8s.io/legacy-cloud-providers/gce/support.go:64 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).pollOperation(0xc000240e40, {0x72715d0?, 0xc0232625a0}, {0x7259c00?, 0xc023262900}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:97 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).WaitForCompletion(0xc010e4cdc0?, {0x72715d0, 0xc0232625a0}, {0x6093d80?, 0xc0201d3040}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:76 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*GCEForwardingRules).Delete(0xc0007ac148, {0x72715d0?, 0xc0232625a0}, 0xc023262600) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/gen.go:12223 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*Cloud).DeleteRegionForwardingRule(0xc00077cf00, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50, 0x8}) vendor/k8s.io/legacy-cloud-providers/gce/gce_forwardingrule.go:183 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).cleanupGCEResources(0xc0007ac378, {0x7ff830060510, 0xc0231fc3f0}, {0x72adfb0, 0xc0201d3ba0}, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50?, 0xc0232024e0?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:314 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources.func1({0x7ff830060510?, 0xc0231fc3f0?}) test/e2e/framework/providers/gce/gce.go:291 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.runConditionWithCrashProtectionWithContext({0x7ff830060510?, 0xc0231fc3f0?}, 0x223c0c5?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:154 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc0231dd848, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:207 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc0231fc3f0}, 0xc0?, 0x1?, 0x1?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc00019c4e0?, 0xc0231dd830?, 0x13?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:85 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources(0x6b0f1fc?, {0x7ff830060510?, 0xc0231fc3f0?}, {0x72adfb0?, 0xc0201d3ba0?}, {0xc032bcdad0?, 0x1?}, {0x7ffc62d71a50?, 0x82fb081?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:290 > k8s.io/kubernetes/test/e2e/network.glob..func21.2({0x7ff830060510, 0xc0231fc3f0}) test/e2e/network/network_tiers.go:62 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc0231fc3f0}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 1h9m54.663s) test/e2e/network/network_tiers.go:67 In [AfterEach] (Node Runtime: 10m0.029s) test/e2e/network/network_tiers.go:56 Spec Goroutine goroutine 7790 [select] k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*MinimumRateLimiter).Accept(0xc010e4cb90, {0x72715d0, 0xc0232625a0}, 0x6578120?) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/ratelimit.go:100 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*gceRateLimiter).Accept(0xc0007ac0a8, {0x72715d0, 0xc0232625a0}, 0xc010864f40) vendor/k8s.io/legacy-cloud-providers/gce/support.go:64 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).pollOperation(0xc000240e40, {0x72715d0?, 0xc0232625a0}, {0x7259c00?, 0xc023262900}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:97 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).WaitForCompletion(0xc010e4cdc0?, {0x72715d0, 0xc0232625a0}, {0x6093d80?, 0xc0201d3040}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:76 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*GCEForwardingRules).Delete(0xc0007ac148, {0x72715d0?, 0xc0232625a0}, 0xc023262600) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/gen.go:12223 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*Cloud).DeleteRegionForwardingRule(0xc00077cf00, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50, 0x8}) vendor/k8s.io/legacy-cloud-providers/gce/gce_forwardingrule.go:183 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).cleanupGCEResources(0xc0007ac378, {0x7ff830060510, 0xc0231fc3f0}, {0x72adfb0, 0xc0201d3ba0}, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50?, 0xc0232024e0?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:314 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources.func1({0x7ff830060510?, 0xc0231fc3f0?}) test/e2e/framework/providers/gce/gce.go:291 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.runConditionWithCrashProtectionWithContext({0x7ff830060510?, 0xc0231fc3f0?}, 0x223c0c5?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:154 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc0231dd848, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:207 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc0231fc3f0}, 0xc0?, 0x1?, 0x1?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc00019c4e0?, 0xc0231dd830?, 0x13?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:85 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources(0x6b0f1fc?, {0x7ff830060510?, 0xc0231fc3f0?}, {0x72adfb0?, 0xc0201d3ba0?}, {0xc032bcdad0?, 0x1?}, {0x7ffc62d71a50?, 0x82fb081?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:290 > k8s.io/kubernetes/test/e2e/network.glob..func21.2({0x7ff830060510, 0xc0231fc3f0}) test/e2e/network/network_tiers.go:62 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc0231fc3f0}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 1h10m14.665s) test/e2e/network/network_tiers.go:67 In [AfterEach] (Node Runtime: 10m20.031s) test/e2e/network/network_tiers.go:56 Spec Goroutine goroutine 7790 [select] k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*MinimumRateLimiter).Accept(0xc010e4cb90, {0x72715d0, 0xc0232625a0}, 0x6578120?) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/ratelimit.go:100 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*gceRateLimiter).Accept(0xc0007ac0a8, {0x72715d0, 0xc0232625a0}, 0xc017c21780) vendor/k8s.io/legacy-cloud-providers/gce/support.go:64 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).pollOperation(0xc000240e40, {0x72715d0?, 0xc0232625a0}, {0x7259c00?, 0xc023262900}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:97 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).WaitForCompletion(0xc010e4cdc0?, {0x72715d0, 0xc0232625a0}, {0x6093d80?, 0xc0201d3040}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:76 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*GCEForwardingRules).Delete(0xc0007ac148, {0x72715d0?, 0xc0232625a0}, 0xc023262600) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/gen.go:12223 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*Cloud).DeleteRegionForwardingRule(0xc00077cf00, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50, 0x8}) vendor/k8s.io/legacy-cloud-providers/gce/gce_forwardingrule.go:183 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).cleanupGCEResources(0xc0007ac378, {0x7ff830060510, 0xc0231fc3f0}, {0x72adfb0, 0xc0201d3ba0}, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50?, 0xc0232024e0?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:314 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources.func1({0x7ff830060510?, 0xc0231fc3f0?}) test/e2e/framework/providers/gce/gce.go:291 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.runConditionWithCrashProtectionWithContext({0x7ff830060510?, 0xc0231fc3f0?}, 0x223c0c5?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:154 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc0231dd848, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:207 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc0231fc3f0}, 0xc0?, 0x1?, 0x1?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc00019c4e0?, 0xc0231dd830?, 0x13?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:85 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources(0x6b0f1fc?, {0x7ff830060510?, 0xc0231fc3f0?}, {0x72adfb0?, 0xc0201d3ba0?}, {0xc032bcdad0?, 0x1?}, {0x7ffc62d71a50?, 0x82fb081?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:290 > k8s.io/kubernetes/test/e2e/network.glob..func21.2({0x7ff830060510, 0xc0231fc3f0}) test/e2e/network/network_tiers.go:62 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc0231fc3f0}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 Automatically polling progress: [sig-network] Services GCE [Slow] should be able to create and tear down a standard-tier load balancer [Slow] (Spec Runtime: 1h10m34.668s) test/e2e/network/network_tiers.go:67 In [AfterEach] (Node Runtime: 10m40.033s) test/e2e/network/network_tiers.go:56 Spec Goroutine goroutine 7790 [select] k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*MinimumRateLimiter).Accept(0xc00fa8ea88, {0x72715d0, 0xc01be5d110}, 0x6578120?) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/ratelimit.go:100 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*gceRateLimiter).Accept(0xc0007ac0a8, {0x72715d0, 0xc01be5d110}, 0xc017c21c00) vendor/k8s.io/legacy-cloud-providers/gce/support.go:64 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).pollOperation(0xc000240e40, {0x72715d0?, 0xc01be5d110}, {0x7259c00?, 0xc017e94090}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:97 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*Service).WaitForCompletion(0xc00fa8ecb8?, {0x72715d0, 0xc01be5d110}, {0x6093d80?, 0xc0201d2d00}) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/service.go:76 k8s.io/kubernetes/vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud.(*GCETargetPools).Delete(0xc0007ac320, {0x72715d0?, 0xc01be5d110}, 0xc01be5d170) vendor/github.com/GoogleCloudPlatform/k8s-cloud-provider/pkg/cloud/gen.go:36247 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*Cloud).DeleteTargetPool(0xc00077cf00, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50, 0x8}) vendor/k8s.io/legacy-cloud-providers/gce/gce_targetpool.go:58 k8s.io/kubernetes/vendor/k8s.io/legacy-cloud-providers/gce.(*Cloud).DeleteExternalTargetPoolAndChecks(0x1?, 0xc02156c500, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50, 0x8}, {0xc032a28820, 0x10}, {0xc00fa8efa0, 0x1, ...}) vendor/k8s.io/legacy-cloud-providers/gce/gce_loadbalancer_external.go:384 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).cleanupGCEResources(0xc0007ac378, {0x7ff830060510, 0xc0231fc3f0}, {0x72adfb0, 0xc0201d3ba0}, {0xc032bcdad0, 0x20}, {0x7ffc62d71a50?, 0xc0232024e0?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:337 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources.func1({0x7ff830060510?, 0xc0231fc3f0?}) test/e2e/framework/providers/gce/gce.go:291 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.runConditionWithCrashProtectionWithContext({0x7ff830060510?, 0xc0231fc3f0?}, 0x223c0c5?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:154 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.waitForWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc0231dd848, 0x2bc926a?) vendor/k8s.io/apimachinery/pkg/util/wait/wait.go:207 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.poll({0x7ff830060510, 0xc0231fc3f0}, 0xc0?, 0x1?, 0x1?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:260 k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/util/wait.PollWithContext({0x7ff830060510, 0xc0231fc3f0}, 0xc00019c4e0?, 0xc0231dd830?, 0x13?) vendor/k8s.io/apimachinery/pkg/util/wait/poll.go:85 k8s.io/kubernetes/test/e2e/framework/providers/gce.(*Provider).CleanupServiceResources(0x6b0f1fc?, {0x7ff830060510?, 0xc0231fc3f0?}, {0x72adfb0?, 0xc0201d3ba0?}, {0xc032bcdad0?, 0x1?}, {0x7ffc62d71a50?, 0x82fb081?}, {0x7ffc62d71a38, ...}) test/e2e/framework/providers/gce/gce.go:290 > k8s.io/kubernetes/test/e2e/network.glob..func21.2({0x7ff830060510, 0xc0231fc3f0}) test/e2e/network/network_tiers.go:62 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func2({0x7279968?, 0xc0231fc3f0}) vendor/github.com/onsi/ginkgo/v2/internal/node.go:456 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() vendor/github.com/onsi/ginkgo/v2/internal/suite.go:863 k8s.io/kubernetes/vendor/github.com/onsi/ginkgo/v2/internal.(*Suite).runNode vendor/github.com/onsi/ginkgo/v2/internal/suite.go:850 I0416 18:46:21.646003 10188 gce_loadbalancer_external.go:402] DeleteExternalTargetPoolAndChecks(ab8ee954d32d1412a90397b4d54cd537(/)): Deleting health check k8s-4795ea35ec96c479-node. < Exit [AfterEach] [sig-network] Services GCE [Slow] - test/e2e/network/network_tiers.go:56 @ 04/16/23 18:46:22.01 (10m46.621s) > Enter [DeferCleanup (Each)] [sig-network] Services GCE [Slow] - test/e2e/framework/metrics/init/init.go:35 @ 04/16/23 18:46:22.01 < Exit [DeferCleanup (Each)] [sig-network] Services GCE [Slow] - test/e2e/framework/metrics/init/init.go:35 @ 04/16/23 18:46:22.01 (0s) > Enter [DeferCleanup (Each)] [sig-network] Services GCE [Slow] - dump namespaces | framework.go:209 @ 04/16/23 18:46:22.01 STEP: dump namespace information after failure - test/e2e/framework/framework.go:288 @ 04/16/23 18:46:22.01 STEP: Collecting events from namespace "services-3740". - test/e2e/framework/debug/dump.go:42 @ 04/16/23 18:46:22.01 STEP: Found 2 events. - test/e2e/framework/debug/dump.go:46 @ 04/16/23 18:46:22.043 Apr 16 18:46:22.043: INFO: At 2023-04-16 17:42:32 +0000 UTC - event for net-tiers-svc: {service-controller } EnsuringLoadBalancer: Ensuring load balancer Apr 16 18:46:22.043: INFO: At 2023-04-16 17:50:33 +0000 UTC - event for net-tiers-svc: {service-controller } EnsuredLoadBalancer: Ensured load balancer Apr 16 18:46:22.087: INFO: POD NODE PHASE GRACE CONDITIONS Apr 16 18:46:22.087: INFO: net-tiers-svc-8hj2v gce-scale-cluster-minion-group-s8v0 Running [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2023-04-16 17:35:41 +0000 UTC } {Ready True 0001-01-01 00:00:00 +0000 UTC 2023-04-16 17:35:46 +0000 UTC } {ContainersReady True 0001-01-01 00:00:00 +0000 UTC 2023-04-16 17:35:46 +0000 UTC } {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2023-04-16 17:35:41 +0000 UTC }] Apr 16 18:46:22.087: INFO: Apr 16 18:46:23.069: INFO: skipping dumping cluster info - cluster too large END STEP: dump namespace information after failure - test/e2e/framework/framework.go:288 @ 04/16/23 18:46:23.069 (1.059s) < Exit [DeferCleanup (Each)] [sig-network] Services GCE [Slow] - dump namespaces | framework.go:209 @ 04/16/23 18:46:23.069 (1.059s) > Enter [DeferCleanup (Each)] [sig-network] Services GCE [Slow] - tear down framework | framework.go:206 @ 04/16/23 18:46:23.069 STEP: Destroying namespace "services-3740" for this suite. - test/e2e/framework/framework.go:351 @ 04/16/23 18:46:23.069 < Exit [DeferCleanup (Each)] [sig-network] Services GCE [Slow] - tear down framework | framework.go:206 @ 04/16/23 18:46:23.106 (36ms) > Enter [ReportAfterEach] TOP-LEVEL - test/e2e/e2e_test.go:144 @ 04/16/23 18:46:23.106 < Exit [ReportAfterEach] TOP-LEVEL - test/e2e/e2e_test.go:144 @ 04/16/23 18:46:23.106 (0s)
Filter through log files | View test history on testgrid
go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-storage\]\sHostPathType\sCharacter\sDevice\s\[Slow\]\sShould\sfail\son\smounting\scharacter\sdevice\s\'achardev\'\swhen\sHostPathType\sis\sHostPathSocket$'
[FAILED] Told to stop trying after 12.237s. The phase of Pod test-hostpath-type-hp2j6 is Failed which is unexpected. In [BeforeEach] at: test/e2e/framework/pod/pod_client.go:105 @ 04/16/23 17:44:17.372from junit_01.xml
> Enter [BeforeEach] [sig-storage] HostPathType Character Device [Slow] - set up framework | framework.go:191 @ 04/16/23 17:44:04.864 STEP: Creating a kubernetes client - test/e2e/framework/framework.go:211 @ 04/16/23 17:44:04.864 Apr 16 17:44:04.864: INFO: >>> kubeConfig: /workspace/.kube/config STEP: Building a namespace api object, basename host-path-type-char-dev - test/e2e/framework/framework.go:250 @ 04/16/23 17:44:04.865 STEP: Waiting for a default service account to be provisioned in namespace - test/e2e/framework/framework.go:259 @ 04/16/23 17:44:04.966 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace - test/e2e/framework/framework.go:262 @ 04/16/23 17:44:05.031 < Exit [BeforeEach] [sig-storage] HostPathType Character Device [Slow] - set up framework | framework.go:191 @ 04/16/23 17:44:05.095 (231ms) > Enter [BeforeEach] [sig-storage] HostPathType Character Device [Slow] - test/e2e/framework/metrics/init/init.go:33 @ 04/16/23 17:44:05.095 < Exit [BeforeEach] [sig-storage] HostPathType Character Device [Slow] - test/e2e/framework/metrics/init/init.go:33 @ 04/16/23 17:44:05.095 (0s) > Enter [BeforeEach] [sig-storage] HostPathType Character Device [Slow] - test/e2e/storage/host_path_type.go:261 @ 04/16/23 17:44:05.095 STEP: Create a pod for further testing - test/e2e/storage/host_path_type.go:264 @ 04/16/23 17:44:05.095 Apr 16 17:44:17.371: INFO: Failed inside E2E framework: k8s.io/kubernetes/test/e2e/framework/pod.WaitForPodCondition({0x7f0ee0c75fc8, 0xc014a11c50}, {0x72adfb0?, 0xc012269040?}, {0xc014590fe0, 0x1c}, {0xc01477a450, 0x18}, {0x6acadc5, 0x11}, ...) test/e2e/framework/pod/wait.go:228 +0x25f k8s.io/kubernetes/test/e2e/framework/pod.WaitTimeoutForPodReadyInNamespace({0x7f0ee0c75fc8?, 0xc014a11c50?}, {0x72adfb0?, 0xc012269040?}, {0xc01477a450?, 0xc010d9cd80?}, {0xc014590fe0?, 0xc014a50180?}, 0x5e08ee0?) test/e2e/framework/pod/wait.go:492 +0x75 k8s.io/kubernetes/test/e2e/framework/pod.(*PodClient).CreateSync(0xc014a29200, {0x7f0ee0c75fc8, 0xc014a11c50}, 0x6aa5c0f?) test/e2e/framework/pod/pod_client.go:105 +0x97 k8s.io/kubernetes/test/e2e/storage.glob..func14.1({0x7f0ee0c75fc8, 0xc014a11c50}) test/e2e/storage/host_path_type.go:267 +0x1e5 [FAILED] Told to stop trying after 12.237s. The phase of Pod test-hostpath-type-hp2j6 is Failed which is unexpected. In [BeforeEach] at: test/e2e/framework/pod/pod_client.go:105 @ 04/16/23 17:44:17.372 < Exit [BeforeEach] [sig-storage] HostPathType Character Device [Slow] - test/e2e/storage/host_path_type.go:261 @ 04/16/23 17:44:17.372 (12.276s) > Enter [AfterEach] [sig-storage] HostPathType Character Device [Slow] - test/e2e/framework/node/init/init.go:33 @ 04/16/23 17:44:17.372 Apr 16 17:44:17.372: INFO: Waiting up to 3m0s for all (but 50) nodes to be ready Apr 16 17:44:18.191: INFO: Condition Ready of node gce-scale-cluster-master is false, but Node is tainted by NodeController with [{node-role.kubernetes.io/master NoSchedule <nil>} {node.kubernetes.io/unschedulable NoSchedule <nil>} {node.kubernetes.io/not-ready NoSchedule <nil>} {node.kubernetes.io/network-unavailable NoSchedule 2023-04-16 17:08:26 +0000 UTC} {node.kubernetes.io/not-ready NoExecute 2023-04-16 17:13:03 +0000 UTC}]. Failure < Exit [AfterEach] [sig-storage] HostPathType Character Device [Slow] - test/e2e/framework/node/init/init.go:33 @ 04/16/23 17:44:18.192 (820ms) > Enter [DeferCleanup (Each)] [sig-storage] HostPathType Character Device [Slow] - test/e2e/framework/metrics/init/init.go:35 @ 04/16/23 17:44:18.192 < Exit [DeferCleanup (Each)] [sig-storage] HostPathType Character Device [Slow] - test/e2e/framework/metrics/init/init.go:35 @ 04/16/23 17:44:18.192 (0s) > Enter [DeferCleanup (Each)] [sig-storage] HostPathType Character Device [Slow] - dump namespaces | framework.go:209 @ 04/16/23 17:44:18.192 STEP: dump namespace information after failure - test/e2e/framework/framework.go:288 @ 04/16/23 17:44:18.192 STEP: Collecting events from namespace "host-path-type-char-dev-7691". - test/e2e/framework/debug/dump.go:42 @ 04/16/23 17:44:18.192 STEP: Found 4 events. - test/e2e/framework/debug/dump.go:46 @ 04/16/23 17:44:18.225 Apr 16 17:44:18.225: INFO: At 2023-04-16 17:44:05 +0000 UTC - event for test-hostpath-type-hp2j6: {default-scheduler } Scheduled: Successfully assigned host-path-type-char-dev-7691/test-hostpath-type-hp2j6 to gce-scale-cluster-minion-group-4-nlws Apr 16 17:44:18.225: INFO: At 2023-04-16 17:44:10 +0000 UTC - event for test-hostpath-type-hp2j6: {kubelet gce-scale-cluster-minion-group-4-nlws} Pulled: Container image "registry.k8s.io/e2e-test-images/agnhost:2.43" already present on machine Apr 16 17:44:18.225: INFO: At 2023-04-16 17:44:11 +0000 UTC - event for test-hostpath-type-hp2j6: {kubelet gce-scale-cluster-minion-group-4-nlws} Created: Created container host-path-testing Apr 16 17:44:18.225: INFO: At 2023-04-16 17:44:12 +0000 UTC - event for test-hostpath-type-hp2j6: {kubelet gce-scale-cluster-minion-group-4-nlws} Failed: Error: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to create new parent process: namespace path: lstat /proc/221164/ns/ipc: no such file or directory: unknown Apr 16 17:44:18.258: INFO: POD NODE PHASE GRACE CONDITIONS Apr 16 17:44:18.258: INFO: test-hostpath-type-hp2j6 gce-scale-cluster-minion-group-4-nlws Failed [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2023-04-16 17:44:05 +0000 UTC } {Ready False 0001-01-01 00:00:00 +0000 UTC 2023-04-16 17:44:05 +0000 UTC PodFailed } {ContainersReady False 0001-01-01 00:00:00 +0000 UTC 2023-04-16 17:44:05 +0000 UTC PodFailed } {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2023-04-16 17:44:05 +0000 UTC }] Apr 16 17:44:18.258: INFO: Apr 16 17:44:19.133: INFO: skipping dumping cluster info - cluster too large END STEP: dump namespace information after failure - test/e2e/framework/framework.go:288 @ 04/16/23 17:44:19.133 (941ms) < Exit [DeferCleanup (Each)] [sig-storage] HostPathType Character Device [Slow] - dump namespaces | framework.go:209 @ 04/16/23 17:44:19.133 (941ms) > Enter [DeferCleanup (Each)] [sig-storage] HostPathType Character Device [Slow] - tear down framework | framework.go:206 @ 04/16/23 17:44:19.133 STEP: Destroying namespace "host-path-type-char-dev-7691" for this suite. - test/e2e/framework/framework.go:351 @ 04/16/23 17:44:19.133 < Exit [DeferCleanup (Each)] [sig-storage] HostPathType Character Device [Slow] - tear down framework | framework.go:206 @ 04/16/23 17:44:19.168 (35ms) > Enter [ReportAfterEach] TOP-LEVEL - test/e2e/e2e_test.go:144 @ 04/16/23 17:44:19.168 < Exit [ReportAfterEach] TOP-LEVEL - test/e2e/e2e_test.go:144 @ 04/16/23 17:44:19.168 (0s)
Filter through log files | View test history on testgrid
go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-storage\]\sIn\-tree\sVolumes\s\[Driver\:\slocal\]\[LocalVolumeType\:\sblockfs\]\s\[Testpattern\:\sPre\-provisioned\sPV\s\(default\sfs\)\]\ssubPath\sshould\ssupport\sreadOnly\sdirectory\sspecified\sin\sthe\svolumeMount$'
[FAILED] unable to upgrade connection: container not found ("agnhost-container") In [It] at: test/e2e/storage/utils/local.go:135 @ 04/16/23 17:38:55.096from junit_01.xml
> Enter [BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath - test/e2e/storage/framework/testsuite.go:51 @ 04/16/23 17:38:10.955 < Exit [BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath - test/e2e/storage/framework/testsuite.go:51 @ 04/16/23 17:38:10.955 (0s) > Enter [BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath - set up framework | framework.go:191 @ 04/16/23 17:38:10.955 STEP: Creating a kubernetes client - test/e2e/framework/framework.go:211 @ 04/16/23 17:38:10.955 Apr 16 17:38:10.955: INFO: >>> kubeConfig: /workspace/.kube/config STEP: Building a namespace api object, basename provisioning - test/e2e/framework/framework.go:250 @ 04/16/23 17:38:10.956 STEP: Waiting for a default service account to be provisioned in namespace - test/e2e/framework/framework.go:259 @ 04/16/23 17:38:11.056 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace - test/e2e/framework/framework.go:262 @ 04/16/23 17:38:11.12 < Exit [BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath - set up framework | framework.go:191 @ 04/16/23 17:38:11.184 (229ms) > Enter [BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath - test/e2e/framework/metrics/init/init.go:33 @ 04/16/23 17:38:11.184 < Exit [BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath - test/e2e/framework/metrics/init/init.go:33 @ 04/16/23 17:38:11.184 (0s) > Enter [It] should support readOnly directory specified in the volumeMount - test/e2e/storage/testsuites/subpath.go:367 @ 04/16/23 17:38:11.184 Apr 16 17:38:12.073: INFO: In-tree plugin kubernetes.io/local-volume is not migrated, not validating any metrics STEP: Creating block device on node "gce-scale-cluster-minion-group-321b" using path "/tmp/local-driver-a4b091f2-eb33-4be9-858f-018da542d88a" - test/e2e/storage/utils/local.go:125 @ 04/16/23 17:38:12.073 Apr 16 17:38:54.906: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c mkdir -p /tmp/local-driver-a4b091f2-eb33-4be9-858f-018da542d88a && dd if=/dev/zero of=/tmp/local-driver-a4b091f2-eb33-4be9-858f-018da542d88a/file bs=4096 count=5120 && losetup -f /tmp/local-driver-a4b091f2-eb33-4be9-858f-018da542d88a/file] Namespace:provisioning-7918 PodName:hostexec-gce-scale-cluster-minion-group-321b-ffbbc ContainerName:agnhost-container Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true Quiet:false} Apr 16 17:38:54.906: INFO: >>> kubeConfig: /workspace/.kube/config Apr 16 17:38:54.907: INFO: ExecWithOptions: Clientset creation Apr 16 17:38:54.907: INFO: ExecWithOptions: execute(POST https://34.23.19.83/api/v1/namespaces/provisioning-7918/pods/hostexec-gce-scale-cluster-minion-group-321b-ffbbc/exec?command=nsenter&command=--mount%3D%2Frootfs%2Fproc%2F1%2Fns%2Fmnt&command=--&command=sh&command=-c&command=mkdir+-p+%2Ftmp%2Flocal-driver-a4b091f2-eb33-4be9-858f-018da542d88a+%26%26+dd+if%3D%2Fdev%2Fzero+of%3D%2Ftmp%2Flocal-driver-a4b091f2-eb33-4be9-858f-018da542d88a%2Ffile+bs%3D4096+count%3D5120+%26%26+losetup+-f+%2Ftmp%2Flocal-driver-a4b091f2-eb33-4be9-858f-018da542d88a%2Ffile&container=agnhost-container&container=agnhost-container&stderr=true&stdout=true) Apr 16 17:38:55.096: INFO: exec gce-scale-cluster-minion-group-321b: command: mkdir -p /tmp/local-driver-a4b091f2-eb33-4be9-858f-018da542d88a && dd if=/dev/zero of=/tmp/local-driver-a4b091f2-eb33-4be9-858f-018da542d88a/file bs=4096 count=5120 && losetup -f /tmp/local-driver-a4b091f2-eb33-4be9-858f-018da542d88a/file Apr 16 17:38:55.096: INFO: exec gce-scale-cluster-minion-group-321b: stdout: "" Apr 16 17:38:55.096: INFO: exec gce-scale-cluster-minion-group-321b: stderr: "" Apr 16 17:38:55.096: INFO: exec gce-scale-cluster-minion-group-321b: exit code: 0 Apr 16 17:38:55.096: INFO: Unexpected error: <*errors.errorString | 0xc0089e5560>: unable to upgrade connection: container not found ("agnhost-container") { s: "unable to upgrade connection: container not found (\"agnhost-container\")", } [FAILED] unable to upgrade connection: container not found ("agnhost-container") In [It] at: test/e2e/storage/utils/local.go:135 @ 04/16/23 17:38:55.096 < Exit [It] should support readOnly directory specified in the volumeMount - test/e2e/storage/testsuites/subpath.go:367 @ 04/16/23 17:38:55.096 (43.912s) > Enter [AfterEach] [Testpattern: Pre-provisioned PV (default fs)] subPath - test/e2e/framework/node/init/init.go:33 @ 04/16/23 17:38:55.096 Apr 16 17:38:55.096: INFO: Waiting up to 3m0s for all (but 50) nodes to be ready Apr 16 17:38:55.951: INFO: Condition Ready of node gce-scale-cluster-master is false, but Node is tainted by NodeController with [{node-role.kubernetes.io/master NoSchedule <nil>} {node.kubernetes.io/unschedulable NoSchedule <nil>} {node.kubernetes.io/not-ready NoSchedule <nil>} {node.kubernetes.io/network-unavailable NoSchedule 2023-04-16 17:08:26 +0000 UTC} {node.kubernetes.io/not-ready NoExecute 2023-04-16 17:13:03 +0000 UTC}]. Failure < Exit [AfterEach] [Testpattern: Pre-provisioned PV (default fs)] subPath - test/e2e/framework/node/init/init.go:33 @ 04/16/23 17:38:55.952 (856ms) > Enter [DeferCleanup (Each)] [Testpattern: Pre-provisioned PV (default fs)] subPath - test/e2e/storage/drivers/in_tree.go:1664 @ 04/16/23 17:38:55.952 STEP: Deleting pod hostexec-gce-scale-cluster-minion-group-321b-ffbbc in namespace provisioning-7918 - test/e2e/framework/pod/delete.go:41 @ 04/16/23 17:38:55.952 < Exit [DeferCleanup (Each)] [Testpattern: Pre-provisioned PV (default fs)] subPath - test/e2e/storage/drivers/in_tree.go:1664 @ 04/16/23 17:38:55.994 (42ms) > Enter [DeferCleanup (Each)] [Testpattern: Pre-provisioned PV (default fs)] subPath - test/e2e/framework/metrics/init/init.go:35 @ 04/16/23 17:38:55.994 < Exit [DeferCleanup (Each)] [Testpattern: Pre-provisioned PV (default fs)] subPath - test/e2e/framework/metrics/init/init.go:35 @ 04/16/23 17:38:55.994 (0s) > Enter [DeferCleanup (Each)] [Testpattern: Pre-provisioned PV (default fs)] subPath - dump namespaces | framework.go:209 @ 04/16/23 17:38:55.994 STEP: dump namespace information after failure - test/e2e/framework/framework.go:288 @ 04/16/23 17:38:55.994 STEP: Collecting events from namespace "provisioning-7918". - test/e2e/framework/debug/dump.go:42 @ 04/16/23 17:38:55.994 STEP: Found 9 events. - test/e2e/framework/debug/dump.go:46 @ 04/16/23 17:38:56.027 Apr 16 17:38:56.027: INFO: At 2023-04-16 17:38:12 +0000 UTC - event for hostexec-gce-scale-cluster-minion-group-321b-ffbbc: {default-scheduler } Scheduled: Successfully assigned provisioning-7918/hostexec-gce-scale-cluster-minion-group-321b-ffbbc to gce-scale-cluster-minion-group-321b Apr 16 17:38:56.027: INFO: At 2023-04-16 17:38:14 +0000 UTC - event for hostexec-gce-scale-cluster-minion-group-321b-ffbbc: {kubelet gce-scale-cluster-minion-group-321b} Pulling: Pulling image "registry.k8s.io/e2e-test-images/agnhost:2.43" Apr 16 17:38:56.027: INFO: At 2023-04-16 17:38:49 +0000 UTC - event for hostexec-gce-scale-cluster-minion-group-321b-ffbbc: {kubelet gce-scale-cluster-minion-group-321b} Pulled: Successfully pulled image "registry.k8s.io/e2e-test-images/agnhost:2.43" in 35.030306573s (35.030351677s including waiting) Apr 16 17:38:56.027: INFO: At 2023-04-16 17:38:49 +0000 UTC - event for hostexec-gce-scale-cluster-minion-group-321b-ffbbc: {kubelet gce-scale-cluster-minion-group-321b} Failed: Error: failed to get sandbox container task: no running task found: task 2cd9891d610fcaf6a3e67ee332e0d4df80bc68d38c8dad5c449dadafc412f239 not found: not found Apr 16 17:38:56.027: INFO: At 2023-04-16 17:38:49 +0000 UTC - event for hostexec-gce-scale-cluster-minion-group-321b-ffbbc: {kubelet gce-scale-cluster-minion-group-321b} SandboxChanged: Pod sandbox changed, it will be killed and re-created. Apr 16 17:38:56.027: INFO: At 2023-04-16 17:38:50 +0000 UTC - event for hostexec-gce-scale-cluster-minion-group-321b-ffbbc: {kubelet gce-scale-cluster-minion-group-321b} Pulled: Container image "registry.k8s.io/e2e-test-images/agnhost:2.43" already present on machine Apr 16 17:38:56.027: INFO: At 2023-04-16 17:38:51 +0000 UTC - event for hostexec-gce-scale-cluster-minion-group-321b-ffbbc: {kubelet gce-scale-cluster-minion-group-321b} Created: Created container agnhost-container Apr 16 17:38:56.027: INFO: At 2023-04-16 17:38:52 +0000 UTC - event for hostexec-gce-scale-cluster-minion-group-321b-ffbbc: {kubelet gce-scale-cluster-minion-group-321b} Failed: Error: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to create new parent process: namespace path: lstat /proc/178969/ns/ipc: no such file or directory: unknown Apr 16 17:38:56.027: INFO: At 2023-04-16 17:38:54 +0000 UTC - event for hostexec-gce-scale-cluster-minion-group-321b-ffbbc: {kubelet gce-scale-cluster-minion-group-321b} Failed: Error: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to create new parent process: namespace path: lstat /proc/179251/ns/ipc: no such file or directory: unknown Apr 16 17:38:56.060: INFO: POD NODE PHASE GRACE CONDITIONS Apr 16 17:38:56.060: INFO: Apr 16 17:38:56.927: INFO: skipping dumping cluster info - cluster too large END STEP: dump namespace information after failure - test/e2e/framework/framework.go:288 @ 04/16/23 17:38:56.927 (933ms) < Exit [DeferCleanup (Each)] [Testpattern: Pre-provisioned PV (default fs)] subPath - dump namespaces | framework.go:209 @ 04/16/23 17:38:56.927 (933ms) > Enter [DeferCleanup (Each)] [Testpattern: Pre-provisioned PV (default fs)] subPath - tear down framework | framework.go:206 @ 04/16/23 17:38:56.927 STEP: Destroying namespace "provisioning-7918" for this suite. - test/e2e/framework/framework.go:351 @ 04/16/23 17:38:56.927 < Exit [DeferCleanup (Each)] [Testpattern: Pre-provisioned PV (default fs)] subPath - tear down framework | framework.go:206 @ 04/16/23 17:38:56.963 (36ms) > Enter [ReportAfterEach] TOP-LEVEL - test/e2e/e2e_test.go:144 @ 04/16/23 17:38:56.963 < Exit [ReportAfterEach] TOP-LEVEL - test/e2e/e2e_test.go:144 @ 04/16/23 17:38:56.963 (0s)
Filter through log files | View test history on testgrid
error during ./hack/ginkgo-e2e.sh --ginkgo.skip=\[Driver:.gcepd\]|\[Serial\]|\[Disruptive\]|\[Flaky\]|\[Feature:.+\] --minStartupPods=8 --node-schedulable-timeout=90m --logexporter-gcs-path=gs://k8s-infra-scalability-tests-logs/ci-kubernetes-e2e-gce-scale-correctness/1647646371211120640 --report-dir=/logs/artifacts --disable-log-dump=true --cluster-ip-range=10.64.0.0/11: exit status 1
from junit_runner.xml
Filter through log files | View test history on testgrid
Kubernetes e2e suite [It] [sig-api-machinery] API priority and fairness should ensure that requests can be classified by adding FlowSchema and PriorityLevelConfiguration
Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] listing mutating webhooks should work [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] listing validating webhooks should work [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a mutating webhook should work [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a validating webhook should work [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny attaching pod [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny custom resource creation, update and deletion [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny pod and configmap creation [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should deny crd creation [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should honor timeout [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should include webhook resources in discovery documents [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate configmap [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource with different stored version [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource with pruning [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate pod and apply defaults after mutation [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should not be able to mutate or prevent deletion of webhook configuration objects [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should unconditionally reject operations on fail closed webhook [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] Aggregator Should be able to support the 1.17 Sample API Server using the current Aggregator [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceConversionWebhook [Privileged:ClusterAdmin] should be able to convert a non homogeneous list of CRs [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceConversionWebhook [Privileged:ClusterAdmin] should be able to convert from CR v1 to CR v2 [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceDefinition Watch [Privileged:ClusterAdmin] CustomResourceDefinition Watch watch on custom resource definition objects [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition creating/deleting custom resource definition objects works [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition getting/updating/patching custom resource definition status sub-resource works [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition listing custom resource definition objects works [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] custom resource defaulting for requests and from storage works [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] should include custom resource definition resources in discovery documents [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] removes definition from spec when one version gets changed to not be served [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] updates the published spec when one version gets renamed [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD preserving unknown fields at the schema root [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD preserving unknown fields in an embedded object [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD with validation schema [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD without validation schema [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of different groups [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of same group and version but different kinds [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of same group but different versions [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST NOT fail validation for create of a custom resource that satisfies the x-kubernetes-validations rules
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST fail create of a custom resource definition that contains a x-kubernetes-validations rule that refers to a property that do not exist
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST fail create of a custom resource definition that contains an x-kubernetes-validations rule that contains a syntax error
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST fail create of a custom resource definition that contains an x-kubernetes-validations rule that exceeds the estimated cost limit
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST fail create of a custom resource that exceeds the runtime cost limit for x-kubernetes-validations rule execution
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST fail update of a custom resource that does not satisfy a x-kubernetes-validations transition rule
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST fail validation for create of a custom resource that does not satisfy the x-kubernetes-validations rules
Kubernetes e2e suite [It] [sig-api-machinery] Discovery Custom resource should have storage version hash
Kubernetes e2e suite [It] [sig-api-machinery] Discovery should accurately determine present and missing resources
Kubernetes e2e suite [It] [sig-api-machinery] Discovery should validate PreferredVersion for each APIGroup [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] FieldValidation should create/apply a CR with unknown fields for CRD with no validation schema [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] FieldValidation should create/apply a valid CR for CRD with validation schema [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] FieldValidation should create/apply an invalid CR with extra properties for CRD with validation schema [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] FieldValidation should detect duplicates in a CR when preserving unknown fields [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] FieldValidation should detect unknown and duplicate fields of a typed object [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] FieldValidation should detect unknown metadata fields in both the root and embedded object of a CR [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] FieldValidation should detect unknown metadata fields of a typed object [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should delete RS created by deployment when not orphaning [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should delete jobs and pods created by cronjob
Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should delete pods created by rc when not orphaning [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should keep the rc around until all its pods are deleted if the deleteOptions says so [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should not be blocked by dependency circle [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should not delete dependents that have both valid owner and owner that's waiting for dependents to be deleted [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should orphan RS created by deployment when deleteOptions.PropagationPolicy is Orphan [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should orphan pods created by rc if delete options say so [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should orphan pods created by rc if deleteOptions.OrphanDependents is nil
Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should support cascading deletion of custom resources
Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should support orphan deletion of custom resources
Kubernetes e2e suite [It] [sig-api-machinery] Generated clientset should create pods, set the deletionTimestamp and deletionGracePeriodSeconds of the pod
Kubernetes e2e suite [It] [sig-api-machinery] Generated clientset should create v1 cronJobs, delete cronJobs, watch cronJobs
Kubernetes e2e suite [It] [sig-api-machinery] OpenAPIV3 should contain OpenAPI V3 for Aggregated APIServer
Kubernetes e2e suite [It] [sig-api-machinery] OpenAPIV3 should publish OpenAPI V3 for CustomResourceDefinition
Kubernetes e2e suite [It] [sig-api-machinery] OpenAPIV3 should round trip OpenAPI V3 for all built-in group versions
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota should apply changes to a resourcequota status [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota should be able to update and delete ResourceQuota. [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a configMap. [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a custom resource.
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a persistent volume claim
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a persistent volume claim with a storage class
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a pod. [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a replica set. [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a replication controller. [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a secret. [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a service. [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota should create a ResourceQuota and ensure its status is promptly calculated. [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota should manage the lifecycle of a ResourceQuota [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota should verify ResourceQuota with best effort scope. [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota should verify ResourceQuota with cross namespace pod affinity scope using scope-selectors.
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota should verify ResourceQuota with terminating scopes. [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] Server request timeout default timeout should be used if the specified timeout in the request URL is 0s
Kubernetes e2e suite [It] [sig-api-machinery] Server request timeout should return HTTP status code 400 if the user specifies an invalid timeout in the request URL
Kubernetes e2e suite [It] [sig-api-machinery] Server request timeout the request should be served with a default timeout if the specified timeout in the request URL exceeds maximum allowed
Kubernetes e2e suite [It] [sig-api-machinery] ServerSideApply should create an applied object if it does not already exist
Kubernetes e2e suite [It] [sig-api-machinery] ServerSideApply should give up ownership of a field if forced applied by a controller
Kubernetes e2e suite [It] [sig-api-machinery] ServerSideApply should ignore conflict errors if force apply is used
Kubernetes e2e suite [It] [sig-api-machinery] ServerSideApply should not remove a field if an owner unsets the field but other managers still have ownership of the field
Kubernetes e2e suite [It] [sig-api-machinery] ServerSideApply should remove a field if it is owned but removed in the apply request
Kubernetes e2e suite [It] [sig-api-machinery] ServerSideApply should work for CRDs
Kubernetes e2e suite [It] [sig-api-machinery] ServerSideApply should work for subresources
Kubernetes e2e suite [It] [sig-api-machinery] Servers with support for API chunking should return chunks of results for list calls
Kubernetes e2e suite [It] [sig-api-machinery] Servers with support for API chunking should support continue listing from the last key if the original version has been compacted away, though the list is inconsistent [Slow]
Kubernetes e2e suite [It] [sig-api-machinery] Servers with support for Table transformation should return a 406 for a backend which does not implement metadata [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] Servers with support for Table transformation should return chunks of table results for list calls
Kubernetes e2e suite [It] [sig-api-machinery] Servers with support for Table transformation should return generic metadata details across all namespaces for nodes
Kubernetes e2e suite [It] [sig-api-machinery] Servers with support for Table transformation should return pod details
Kubernetes e2e suite [It] [sig-api-machinery] Watchers should be able to restart watching from the last resource version observed by the previous watch [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] Watchers should be able to start watching from a specific resource version [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] Watchers should observe add, update, and delete watch notifications on configmaps [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] Watchers should observe an object deletion if it stops meeting the requirements of the selector [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] Watchers should receive events on concurrent watches in same order [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] client-go should negotiate watch and report errors with accept "application/json"
Kubernetes e2e suite [It] [sig-api-machinery] client-go should negotiate watch and report errors with accept "application/json,application/vnd.kubernetes.protobuf"
Kubernetes e2e suite [It] [sig-api-machinery] client-go should negotiate watch and report errors with accept "application/vnd.kubernetes.protobuf"
Kubernetes e2e suite [It] [sig-api-machinery] client-go should negotiate watch and report errors with accept "application/vnd.kubernetes.protobuf,application/json"
Kubernetes e2e suite [It] [sig-api-machinery] health handlers should contain necessary checks
Kubernetes e2e suite [It] [sig-api-machinery] server version should find the server version [Conformance]
Kubernetes e2e suite [It] [sig-apps] CronJob should be able to schedule after more than 100 missed schedule
Kubernetes e2e suite [It] [sig-apps] CronJob should delete failed finished jobs with limit of one job
Kubernetes e2e suite [It] [sig-apps] CronJob should delete successful finished jobs with limit of one successful job
Kubernetes e2e suite [It] [sig-apps] CronJob should not emit unexpected warnings
Kubernetes e2e suite [It] [sig-apps] CronJob should not schedule jobs when suspended [Slow] [Conformance]
Kubernetes e2e suite [It] [sig-apps] CronJob should not schedule new jobs when ForbidConcurrent [Slow] [Conformance]
Kubernetes e2e suite [It] [sig-apps] CronJob should remove from active list jobs that have been deleted
Kubernetes e2e suite [It] [sig-apps] CronJob should replace jobs when ReplaceConcurrent [Conformance]
Kubernetes e2e suite [It] [sig-apps] CronJob should schedule multiple jobs concurrently [Conformance]
Kubernetes e2e suite [It] [sig-apps] CronJob should support CronJob API operations [Conformance]
Kubernetes e2e suite [It] [sig-apps] CronJob should support timezone
Kubernetes e2e suite [It] [sig-apps] Deployment Deployment should have a working scale subresource [Conformance]
Kubernetes e2e suite [It] [sig-apps] Deployment RecreateDeployment should delete old pods and create new ones [Conformance]
Kubernetes e2e suite [It] [sig-apps] Deployment deployment reaping should cascade to its replica sets and pods
Kubernetes e2e suite [It] [sig-apps] Deployment deployment should delete old replica sets [Conformance]
Kubernetes e2e suite [It] [sig-apps] Deployment deployment should support proportional scaling [Conformance]
Kubernetes e2e suite [It] [sig-apps] Deployment deployment should support rollover [Conformance]
Kubernetes e2e suite [It] [sig-apps] Deployment iterative rollouts should eventually progress
Kubernetes e2e suite [It] [sig-apps] Deployment should not disrupt a cloud load-balancer's connectivity during rollout
Kubernetes e2e suite [It] [sig-apps] Deployment should run the lifecycle of a Deployment [Conformance]
Kubernetes e2e suite [It] [sig-apps] Deployment should validate Deployment Status endpoints [Conformance]
Kubernetes e2e suite [It] [sig-apps] Deployment test Deployment ReplicaSet orphaning and adoption regarding controllerRef
Kubernetes e2e suite [It] [sig-apps] DisruptionController Listing PodDisruptionBudgets for all namespaces should list and delete a collection of PodDisruptionBudgets [Conformance]
Kubernetes e2e suite [It] [sig-apps] DisruptionController evictions: enough pods, absolute => should allow an eviction
Kubernetes e2e suite [It] [sig-apps] DisruptionController evictions: enough pods, replicaSet, percentage => should allow an eviction
Kubernetes e2e suite [It] [sig-apps] DisruptionController evictions: maxUnavailable allow single eviction, percentage => should allow an eviction
Kubernetes e2e suite [It] [sig-apps] DisruptionController evictions: no PDB => should allow an eviction
Kubernetes e2e suite [It] [sig-apps] DisruptionController evictions: too few pods, absolute => should not allow an eviction
Kubernetes e2e suite [It] [sig-apps] DisruptionController should block an eviction until the PDB is updated to allow it [Conformance]
Kubernetes e2e suite [It] [sig-apps] DisruptionController should create a PodDisruptionBudget [Conformance]
Kubernetes e2e suite [It] [sig-apps] DisruptionController should observe PodDisruptionBudget status updated [Conformance]
Kubernetes e2e suite [It] [sig-apps] DisruptionController should observe that the PodDisruptionBudget status is not updated for unmanaged pods
Kubernetes e2e suite [It] [sig-apps] DisruptionController should update/patch PodDisruptionBudget status [Conformance]
Kubernetes e2e suite [It] [sig-apps] Job Using a pod failure policy to not count some failures towards the backoffLimit Ignore DisruptionTarget condition
Kubernetes e2e suite [It] [sig-apps] Job Using a pod failure policy to not count some failures towards the backoffLimit Ignore exit code 137
Kubernetes e2e suite [It] [sig-apps] Job should adopt matching orphans and release non-matching pods [Conformance]
Kubernetes e2e suite [It] [sig-apps] Job should allow to use the pod failure policy on exit code to fail the job early
Kubernetes e2e suite [It] [sig-apps] Job should allow to use the pod failure policy to not count the failure towards the backoffLimit
Kubernetes e2e suite [It] [sig-apps] Job should apply changes to a job status [Conformance]
Kubernetes e2e suite [It] [sig-apps] Job should create pods for an Indexed job with completion indexes and specified hostname [Conformance]
Kubernetes e2e suite [It] [sig-apps] Job should delete a job [Conformance]
Kubernetes e2e suite [It] [sig-apps] Job should delete pods when suspended
Kubernetes e2e suite [It] [sig-apps] Job should fail to exceed backoffLimit
Kubernetes e2e suite [It] [sig-apps] Job should fail when exceeds active deadline
Kubernetes e2e suite [It] [sig-apps] Job should manage the lifecycle of a job [Conformance]
Kubernetes e2e suite [It] [sig-apps] Job should not create pods when created in suspend state
Kubernetes e2e suite [It] [sig-apps] Job should remove pods when job is deleted
Kubernetes e2e suite [It] [sig-apps] Job should run a job to completion when tasks sometimes fail and are locally restarted [Conformance]
Kubernetes e2e suite [It] [sig-apps] Job should run a job to completion when tasks sometimes fail and are not locally restarted
Kubernetes e2e suite [It] [sig-apps] Job should run a job to completion when tasks succeed
Kubernetes e2e suite [It] [sig-apps] ReplicaSet Replace and Patch tests [Conformance]
Kubernetes e2e suite [It] [sig-apps] ReplicaSet Replicaset should have a working scale subresource [Conformance]
Kubernetes e2e suite [It] [sig-apps] ReplicaSet should adopt matching pods on creation and release no longer matching pods [Conformance]
Kubernetes e2e suite [It] [sig-apps] ReplicaSet should list and delete a collection of ReplicaSets [Conformance]
Kubernetes e2e suite [It] [sig-apps] ReplicaSet should serve a basic image on each replica with a private image
Kubernetes e2e suite [It] [sig-apps] ReplicaSet should serve a basic image on each replica with a public image [Conformance]
Kubernetes e2e suite [It] [sig-apps] ReplicaSet should surface a failure condition on a common issue like exceeded quota
Kubernetes e2e suite [It] [sig-apps] ReplicaSet should validate Replicaset Status endpoints [Conformance]
Kubernetes e2e suite [It] [sig-apps] ReplicationController should adopt matching pods on creation [Conformance]
Kubernetes e2e suite [It] [sig-apps] ReplicationController should get and update a ReplicationController scale [Conformance]
Kubernetes e2e suite [It] [sig-apps] ReplicationController should release no longer matching pods [Conformance]
Kubernetes e2e suite [It] [sig-apps] ReplicationController should serve a basic image on each replica with a private image
Kubernetes e2e suite [It] [sig-apps] ReplicationController should serve a basic image on each replica with a public image [Conformance]
Kubernetes e2e suite [It] [sig-apps] ReplicationController should surface a failure condition on a common issue like exceeded quota [Conformance]
Kubernetes e2e suite [It] [sig-apps] ReplicationController should test the lifecycle of a ReplicationController [Conformance]
Kubernetes e2e suite [It] [sig-apps] StatefulSet AvailableReplicas should get updated accordingly when MinReadySeconds is enabled
Kubernetes e2e suite [It] [sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] Burst scaling should run to completion even with unhealthy pods [Slow] [Conformance]
Kubernetes e2e suite [It] [sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] Scaling should happen in predictable order and halt if any stateful pod is unhealthy [Slow] [Conformance]
Kubernetes e2e suite [It] [sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] Should recreate evicted statefulset [Conformance]
Kubernetes e2e suite [It] [sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should have a working scale subresource [Conformance]
Kubernetes e2e suite [It] [sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should implement legacy replacement when the update strategy is OnDelete
Kubernetes e2e suite [It] [sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should list, patch and delete a collection of StatefulSets [Conformance]
Kubernetes e2e suite [It] [sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should perform canary updates and phased rolling updates of template modifications [Conformance]
Kubernetes e2e suite [It] [sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should perform rolling updates and roll backs of template modifications [Conformance]
Kubernetes e2e suite [It] [sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should validate Statefulset Status endpoints [Conformance]
Kubernetes e2e suite [It] [sig-apps] StatefulSet MinReadySeconds should be honored when enabled
Kubernetes e2e suite [It] [sig-apps] TTLAfterFinished job should be deleted once it finishes after TTL seconds
Kubernetes e2e suite [It] [sig-architecture] Conformance Tests should have at least two untainted nodes [Conformance]
Kubernetes e2e suite [It] [sig-auth] Certificates API [Privileged:ClusterAdmin] should support CSR API operations [Conformance]
Kubernetes e2e suite [It] [sig-auth] Certificates API [Privileged:ClusterAdmin] should support building a client with a CSR
Kubernetes e2e suite [It] [sig-auth] ServiceAccounts ServiceAccountIssuerDiscovery should support OIDC discovery of service account issuer [Conformance]
Kubernetes e2e suite [It] [sig-auth] ServiceAccounts no secret-based service account token should be auto-generated
Kubernetes e2e suite [It] [sig-auth] ServiceAccounts should allow opting out of API token automount [Conformance]
Kubernetes e2e suite [It] [sig-auth] ServiceAccounts should guarantee kube-root-ca.crt exist in any namespace [Conformance]
Kubernetes e2e suite [It] [sig-auth] ServiceAccounts should mount an API token into pods [Conformance]
Kubernetes e2e suite [It] [sig-auth] ServiceAccounts should mount projected service account token [Conformance]
Kubernetes e2e suite [It] [sig-auth] ServiceAccounts should run through the lifecycle of a ServiceAccount [Conformance]
Kubernetes e2e suite [It] [sig-auth] ServiceAccounts should set ownership and permission when RunAsUser or FsGroup is present [LinuxOnly] [NodeFeature:FSGroup]
Kubernetes e2e suite [It] [sig-auth] ServiceAccounts should support InClusterConfig with token rotation [Slow]
Kubernetes e2e suite [It] [sig-auth] ServiceAccounts should update a ServiceAccount [Conformance]
Kubernetes e2e suite [It] [sig-auth] SubjectReview should support SubjectReview API operations [Conformance]
Kubernetes e2e suite [It] [sig-autoscaling] DNS horizontal autoscaling kube-dns-autoscaler should scale kube-dns pods in both nonfaulty and faulty scenarios
Kubernetes e2e suite [It] [sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 should support forwarding over websockets
Kubernetes e2e suite [It] [sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 that expects NO client request should support a client that connects, sends DATA, and disconnects
Kubernetes e2e suite [It] [sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 that expects a client request should support a client that connects, sends DATA, and disconnects
Kubernetes e2e suite [It] [sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 that expects a client request should support a client that connects, sends NO DATA, and disconnects
Kubernetes e2e suite [It] [sig-cli] Kubectl Port forwarding With a server listening on localhost should support forwarding over websockets
Kubernetes e2e suite [It] [sig-cli] Kubectl Port forwarding With a server listening on localhost that expects NO client request should support a client that connects, sends DATA, and disconnects
Kubernetes e2e suite [It] [sig-cli] Kubectl Port forwarding With a server listening on localhost that expects a client request should support a client that connects, sends DATA, and disconnects
Kubernetes e2e suite [It] [sig-cli] Kubectl Port forwarding With a server listening on localhost that expects a client request should support a client that connects, sends NO DATA, and disconnects
Kubernetes e2e suite [It] [sig-cli] Kubectl client Guestbook application should create and stop a working application [Conformance]
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl api-versions should check if v1 is in available api versions [Conformance]
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl apply apply set/view last-applied
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl apply should apply a new configuration to an existing RC
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl apply should reuse port when apply to an existing SVC
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl cluster-info dump should check if cluster-info dump succeeds
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl cluster-info should check if Kubernetes control plane services is included in cluster-info [Conformance]
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl copy should copy a file from a running Pod
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl create quota should create a quota with scopes
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl create quota should create a quota without scopes
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl create quota should reject quota with invalid scopes
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl describe should check if kubectl describe prints relevant information for cronjob
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl describe should check if kubectl describe prints relevant information for rc and pods [Conformance]
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl diff should check if kubectl diff finds a difference for Deployments [Conformance]
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl events should show event when pod is created
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl expose should create services for rc [Conformance]
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl get componentstatuses should get componentstatuses
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl label should update the label on a resource [Conformance]
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl patch should add annotations for pods in rc [Conformance]
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl prune with applyset should apply and prune objects
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl replace should update a single-container pod's image [Conformance]
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl run pod should create a pod from an image when restart is Never [Conformance]
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl server-side dry-run should check if kubectl can dry-run update Pods [Conformance]
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl validation should create/apply a CR with unknown fields for CRD with no validation schema
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl validation should create/apply a valid CR for CRD with validation schema
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl validation should create/apply an invalid/valid CR with arbitrary-extra properties for CRD with partially-specified validation schema
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl validation should detect unknown metadata fields in both the root and embedded object of a CR
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl validation should detect unknown metadata fields of a typed object
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl version should check is all data is printed [Conformance]
Kubernetes e2e suite [It] [sig-cli] Kubectl client Proxy server should support --unix-socket=/path [Conformance]
Kubernetes e2e suite [It] [sig-cli] Kubectl client Proxy server should support proxy with --port 0 [Conformance]
Kubernetes e2e suite [It] [sig-cli] Kubectl client Simple pod Kubectl run [Slow] running a failing command with --leave-stdin-open
Kubernetes e2e suite [It] [sig-cli] Kubectl client Simple pod Kubectl run [Slow] running a failing command without --restart=Never
Kubernetes e2e suite [It] [sig-cli] Kubectl client Simple pod Kubectl run [Slow] running a failing command without --restart=Never, but with --rm
Kubernetes e2e suite [It] [sig-cli] Kubectl client Simple pod Kubectl run running a failing command
Kubernetes e2e suite [It] [sig-cli] Kubectl client Simple pod Kubectl run running a successful command
Kubernetes e2e suite [It] [sig-cli] Kubectl client Simple pod should contain last line of the log
Kubernetes e2e suite [It] [sig-cli] Kubectl client Simple pod should return command exit codes execing into a container with a failing command
Kubernetes e2e suite [It] [sig-cli] Kubectl client Simple pod should return command exit codes execing into a container with a successful command
Kubernetes e2e suite [It] [sig-cli] Kubectl client Simple pod should return command exit codes should handle in-cluster config
Kubernetes e2e suite [It] [sig-cli] Kubectl client Simple pod should return command exit codes should support port-forward
Kubernetes e2e suite [It] [sig-cli] Kubectl client Simple pod should support exec
Kubernetes e2e suite [It] [sig-cli] Kubectl client Simple pod should support exec through an HTTP proxy
Kubernetes e2e suite [It] [sig-cli] Kubectl client Simple pod should support exec through kubectl proxy
Kubernetes e2e suite [It] [sig-cli] Kubectl client Simple pod should support exec using resource/name
Kubernetes e2e suite [It] [sig-cli] Kubectl client Simple pod should support inline execution and attach
Kubernetes e2e suite [It] [sig-cli] Kubectl client Update Demo should create and stop a replication controller [Conformance]
Kubernetes e2e suite [It] [sig-cli] Kubectl client Update Demo should scale a replication controller [Conformance]
Kubernetes e2e suite [It] [sig-cli] Kubectl client kubectl subresource flag GET on status subresource of built-in type (node) returns identical info as GET on the built-in type
Kubernetes e2e suite [It] [sig-cli] Kubectl client kubectl subresource flag should not be used in a bulk GET
Kubernetes e2e suite [It] [sig-cli] Kubectl client kubectl wait should ignore not found error with --for=delete
Kubernetes e2e suite [It] [sig-cli] Kubectl logs default container logs the second container is the default-container by annotation should log default container if not specified
Kubernetes e2e suite [It] [sig-cli] Kubectl logs logs should be able to retrieve and filter logs [Conformance]
Kubernetes e2e suite [It] [sig-cloud-provider-gcp] Addon update should propagate add-on file changes [Slow]
Kubernetes e2e suite [It] [sig-instrumentation] Events API should delete a collection of events [Conformance]
Kubernetes e2e suite [It] [sig-instrumentation] Events API should ensure that an event can be fetched, patched, deleted, and listed [Conformance]
Kubernetes e2e suite [It] [sig-instrumentation] Events should delete a collection of events [Conformance]
Kubernetes e2e suite [It] [sig-instrumentation] Events should manage the lifecycle of an event [Conformance]
Kubernetes e2e suite [It] [sig-instrumentation] MetricsGrabber should grab all metrics from API server.
Kubernetes e2e suite [It] [sig-instrumentation] MetricsGrabber should grab all metrics from a ControllerManager.
Kubernetes e2e suite [It] [sig-instrumentation] MetricsGrabber should grab all metrics from a Kubelet.
Kubernetes e2e suite [It] [sig-instrumentation] MetricsGrabber should grab all metrics from a Scheduler.
Kubernetes e2e suite [It] [sig-instrumentation] MetricsGrabber should grab all metrics slis from API server.
Kubernetes e2e suite [It] [sig-network] CVE-2021-29923 IPv4 Service Type ClusterIP with leading zeros should work interpreted as decimal
Kubernetes e2e suite [It] [sig-network] Connectivity Pod Lifecycle should be able to connect from a Pod to a terminating Pod
Kubernetes e2e suite [It] [sig-network] Connectivity Pod Lifecycle should be able to connect to other Pod from a terminating Pod
Kubernetes e2e suite [It] [sig-network] Conntrack should be able to preserve UDP traffic when initial unready endpoints get ready
Kubernetes e2e suite [It] [sig-network] Conntrack should be able to preserve UDP traffic when server pod cycles for a ClusterIP service
Kubernetes e2e suite [It] [sig-network] Conntrack should be able to preserve UDP traffic when server pod cycles for a NodePort service
Kubernetes e2e suite [It] [sig-network] Conntrack should drop INVALID conntrack entries [Privileged]
Kubernetes e2e suite [It] [sig-network] DNS HostNetwork should resolve DNS of partial qualified names for services on hostNetwork pods with dnsPolicy: ClusterFirstWithHostNet [LinuxOnly]
Kubernetes e2e suite [It] [sig-network] DNS should provide /etc/hosts entries for the cluster [Conformance]
Kubernetes e2e suite [It] [sig-network] DNS should provide DNS for ExternalName services [Conformance]
Kubernetes e2e suite [It] [sig-network] DNS should provide DNS for pods for Hostname [Conformance]
Kubernetes e2e suite [It] [sig-network] DNS should provide DNS for pods for Subdomain [Conformance]
Kubernetes e2e suite [It] [sig-network] DNS should provide DNS for services [Conformance]
Kubernetes e2e suite [It] [sig-network] DNS should provide DNS for the cluster [Conformance]
Kubernetes e2e suite [It] [sig-network] DNS should provide DNS for the cluster [Provider:GCE]
Kubernetes e2e suite [It] [sig-network] DNS should resolve DNS of partial qualified names for services [LinuxOnly] [Conformance]
Kubernetes e2e suite [It] [sig-network] DNS should resolve DNS of partial qualified names for the cluster [LinuxOnly]
Kubernetes e2e suite [It] [sig-network] DNS should support configurable pod DNS nameservers [Conformance]
Kubernetes e2e suite [It] [sig-network] DNS should support configurable pod resolv.conf
Kubernetes e2e suite [It] [sig-network] DNS should work with the pod containing more than 6 DNS search paths and longer than 256 search list characters
Kubernetes e2e suite [It] [sig-network] EndpointSlice should create Endpoints and EndpointSlices for Pods matching a Service [Conformance]
Kubernetes e2e suite [It] [sig-network] EndpointSlice should create and delete Endpoints and EndpointSlices for a Service with a selector specified [Conformance]
Kubernetes e2e suite [It] [sig-network] EndpointSlice should have Endpoints and EndpointSlices pointing to API Server [Conformance]
Kubernetes e2e suite [It] [sig-network] EndpointSlice should support a Service with multiple endpoint IPs specified in multiple EndpointSlices
Kubernetes e2e suite [It] [sig-network] EndpointSlice should support a Service with multiple ports specified in multiple EndpointSlices
Kubernetes e2e suite [It] [sig-network] EndpointSlice should support creating EndpointSlice API operations [Conformance]
Kubernetes e2e suite [It] [sig-network] EndpointSliceMirroring should mirror a custom Endpoint with multiple subsets and same IP address
Kubernetes e2e suite [It] [sig-network] EndpointSliceMirroring should mirror a custom Endpoints resource through create update and delete [Conformance]
Kubernetes e2e suite [It] [sig-network] Firewall rule control plane should not expose well-known ports
Kubernetes e2e suite [It] [sig-network] Firewall rule should have correct firewall rules for e2e cluster
Kubernetes e2e suite [It] [sig-network] HostPort validates that there is no conflict between pods with same hostPort but different hostIP and protocol [LinuxOnly] [Conformance]
Kubernetes e2e suite [It] [sig-network] Ingress API should support creating Ingress API operations [Conformance]
Kubernetes e2e suite [It] [sig-network] IngressClass API should support creating IngressClass API operations [Conformance]
Kubernetes e2e suite [It] [sig-network] KubeProxy should set TCP CLOSE_WAIT timeout [Privileged]
Kubernetes e2e suite [It] [sig-network] LoadBalancers ESIPP [Slow] should handle updates to ExternalTrafficPolicy field
Kubernetes e2e suite [It] [sig-network] LoadBalancers ESIPP [Slow] should only target nodes with endpoints
Kubernetes e2e suite [It] [sig-network] LoadBalancers ESIPP [Slow] should work for type=LoadBalancer
Kubernetes e2e suite [It] [sig-network] LoadBalancers ESIPP [Slow] should work for type=NodePort
Kubernetes e2e suite [It] [sig-network] LoadBalancers ESIPP [Slow] should work from pods
Kubernetes e2e suite [It] [sig-network] LoadBalancers should be able to change the type and ports of a TCP service [Slow]
Kubernetes e2e suite [It] [sig-network] LoadBalancers should be able to change the type and ports of a UDP service [Slow]
Kubernetes e2e suite [It] [sig-network] LoadBalancers should be able to create LoadBalancer Service without NodePort and change it [Slow]
Kubernetes e2e suite [It] [sig-network] LoadBalancers should be able to create an internal type load balancer [Slow]
Kubernetes e2e suite [It] [sig-network] LoadBalancers should be able to preserve UDP traffic when server pod cycles for a LoadBalancer service on different nodes
Kubernetes e2e suite [It] [sig-network] LoadBalancers should be able to preserve UDP traffic when server pod cycles for a LoadBalancer service on the same nodes
Kubernetes e2e suite [It] [sig-network] LoadBalancers should be able to switch session affinity for LoadBalancer service with ESIPP off [Slow] [LinuxOnly]
Kubernetes e2e suite [It] [sig-network] LoadBalancers should be able to switch session affinity for LoadBalancer service with ESIPP on [Slow] [LinuxOnly]
Kubernetes e2e suite [It] [sig-network] LoadBalancers should handle load balancer cleanup finalizer for service [Slow]
Kubernetes e2e suite [It] [sig-network] LoadBalancers should have session affinity work for LoadBalancer service with ESIPP off [Slow] [LinuxOnly]
Kubernetes e2e suite [It] [sig-network] LoadBalancers should have session affinity work for LoadBalancer service with ESIPP on [Slow] [LinuxOnly]
Kubernetes e2e suite [It] [sig-network] LoadBalancers should only allow access from service loadbalancer source ranges [Slow]
Kubernetes e2e suite [It] [sig-network] Netpol API should support creating NetworkPolicy API operations
Kubernetes e2e suite [It] [sig-network] Netpol API should support creating NetworkPolicy API with endport field
Kubernetes e2e suite [It] [sig-network] NetworkPolicy API should support creating NetworkPolicy API operations
Kubernetes e2e suite [It] [sig-network] Networking Granular Checks: Pods should function for intra-pod communication: http [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-network] Networking Granular Checks: Pods should function for intra-pod communication: udp [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-network] Networking Granular Checks: Pods should function for node-pod communication: http [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-network] Networking Granular Checks: Pods should function for node-pod communication: udp [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-network] Networking Granular Checks: Services should be able to handle large requests: http
Kubernetes e2e suite [It] [sig-network] Networking Granular Checks: Services should be able to handle large requests: udp
Kubernetes e2e suite [It] [sig-network] Networking Granular Checks: Services should function for client IP based session affinity: http [LinuxOnly]
Kubernetes e2e suite [It] [sig-network] Networking Granular Checks: Services should function for client IP based session affinity: udp [LinuxOnly]
Kubernetes e2e suite [It] [sig-network] Networking Granular Checks: Services should function for endpoint-Service: http
Kubernetes e2e suite [It] [sig-network] Networking Granular Checks: Services should function for endpoint-Service: udp
Kubernetes e2e suite [It] [sig-network] Networking Granular Checks: Services should function for multiple endpoint-Services with same selector
Kubernetes e2e suite [It] [sig-network] Networking Granular Checks: Services should function for node-Service: http
Kubernetes e2e suite [It] [sig-network] Networking Granular Checks: Services should function for node-Service: udp
Kubernetes e2e suite [It] [sig-network] Networking Granular Checks: Services should function for pod-Service: http
Kubernetes e2e suite [It] [sig-network] Networking Granular Checks: Services should function for pod-Service: udp
Kubernetes e2e suite [It] [sig-network] Networking Granular Checks: Services should function for service endpoints using hostNetwork
Kubernetes e2e suite [It] [sig-network] Networking Granular Checks: Services should support basic nodePort: udp functionality
Kubernetes e2e suite [It] [sig-network] Networking Granular Checks: Services should update endpoints: http
Kubernetes e2e suite [It] [sig-network] Networking Granular Checks: Services should update endpoints: udp
Kubernetes e2e suite [It] [sig-network] Networking Granular Checks: Services should update nodePort: http [Slow]
Kubernetes e2e suite [It] [sig-network] Networking Granular Checks: Services should update nodePort: udp [Slow]
Kubernetes e2e suite [It] [sig-network] Networking should check kube-proxy urls
Kubernetes e2e suite [It] [sig-network] Networking should provide unchanging, static URL paths for kubernetes api services
Kubernetes e2e suite [It] [sig-network] Proxy version v1 A set of valid responses are returned for both pod and service Proxy [Conformance]
Kubernetes e2e suite [It] [sig-network] Proxy version v1 A set of valid responses are returned for both pod and service ProxyWithPath [Conformance]
Kubernetes e2e suite [It] [sig-network] Proxy version v1 should proxy logs on node using proxy subresource
Kubernetes e2e suite [It] [sig-network] Proxy version v1 should proxy logs on node with explicit kubelet port using proxy subresource
Kubernetes e2e suite [It] [sig-network] Proxy version v1 should proxy through a service and a pod [Conformance]
Kubernetes e2e suite [It] [sig-network] Service endpoints latency should not be very high [Conformance]
Kubernetes e2e suite [It] [sig-network] Services should allow pods to hairpin back to themselves through services
Kubernetes e2e suite [It] [sig-network] Services should be able to change the type from ClusterIP to ExternalName [Conformance]
Kubernetes e2e suite [It] [sig-network] Services should be able to change the type from ExternalName to ClusterIP [Conformance]
Kubernetes e2e suite [It] [sig-network] Services should be able to change the type from ExternalName to NodePort [Conformance]
Kubernetes e2e suite [It] [sig-network] Services should be able to change the type from NodePort to ExternalName [Conformance]
Kubernetes e2e suite [It] [sig-network] Services should be able to connect to terminating and unready endpoints if PublishNotReadyAddresses is true
Kubernetes e2e suite [It] [sig-network] Services should be able to create a functioning NodePort service [Conformance]
Kubernetes e2e suite [It] [sig-network] Services should be able to switch session affinity for NodePort service [LinuxOnly] [Conformance]
Kubernetes e2e suite [It] [sig-network] Services should be able to switch session affinity for service with type clusterIP [LinuxOnly] [Conformance]
Kubernetes e2e suite [It] [sig-network] Services should be able to up and down services
Kubernetes e2e suite [It] [sig-network] Services should be able to update service type to NodePort listening on same port number but different protocols
Kubernetes e2e suite [It] [sig-network] Services should be possible to connect to a service via ExternalIP when the external IP is not assigned to a node
Kubernetes e2e suite [It] [sig-network] Services should be rejected for evicted pods (no endpoints exist)
Kubernetes e2e suite [It] [sig-network] Services should be rejected when no endpoints exist
Kubernetes e2e suite [It] [sig-network] Services should be updated after adding or deleting ports
Kubernetes e2e suite [It] [sig-network] Services should check NodePort out-of-range
Kubernetes e2e suite [It] [sig-network] Services should complete a service status lifecycle [Conformance]
Kubernetes e2e suite [It] [sig-network] Services should create endpoints for unready pods
Kubernetes e2e suite [It] [sig-network] Services should delete a collection of services [Conformance]
Kubernetes e2e suite [It] [sig-network] Services should find a service from listing all namespaces [Conformance]
Kubernetes e2e suite [It] [sig-network] Services should have session affinity timeout work for NodePort service [LinuxOnly]
Kubernetes e2e suite [It] [sig-network] Services should have session affinity timeout work for service with type clusterIP [LinuxOnly]
Kubernetes e2e suite [It] [sig-network] Services should have session affinity work for NodePort service [LinuxOnly] [Conformance]
Kubernetes e2e suite [It] [sig-network] Services should have session affinity work for service with type clusterIP [LinuxOnly] [Conformance]
Kubernetes e2e suite [It] [sig-network] Services should implement service.kubernetes.io/headless
Kubernetes e2e suite [It] [sig-network] Services should implement service.kubernetes.io/service-proxy-name
Kubernetes e2e suite [It] [sig-network] Services should not be able to connect to terminating and unready endpoints if PublishNotReadyAddresses is false
Kubernetes e2e suite [It] [sig-network] Services should preserve source pod IP for traffic thru service cluster IP [LinuxOnly]
Kubernetes e2e suite [It] [sig-network] Services should prevent NodePort collisions
Kubernetes e2e suite [It] [sig-network] Services should provide secure master service [Conformance]
Kubernetes e2e suite [It] [sig-network] Services should release NodePorts on delete
Kubernetes e2e suite [It] [sig-network] Services should serve a basic endpoint from pods [Conformance]
Kubernetes e2e suite [It] [sig-network] Services should serve endpoints on same port and different protocol for internal traffic on Type LoadBalancer
Kubernetes e2e suite [It] [sig-network] Services should serve endpoints on same port and different protocols
Kubernetes e2e suite [It] [sig-network] Services should serve multiport endpoints from pods [Conformance]
Kubernetes e2e suite [It] [sig-network] Services should test the lifecycle of an Endpoint [Conformance]
Kubernetes e2e suite [It] [sig-network] Services should work after the service has been recreated
Kubernetes e2e suite [It] [sig-node] AppArmor load AppArmor profiles can disable an AppArmor profile, using unconfined
Kubernetes e2e suite [It] [sig-node] AppArmor load AppArmor profiles should enforce an AppArmor profile
Kubernetes e2e suite [It] [sig-node] ConfigMap should be consumable via environment variable [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] ConfigMap should be consumable via the environment [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] ConfigMap should fail to create ConfigMap with empty key [Conformance]
Kubernetes e2e suite [It] [sig-node] ConfigMap should run through a ConfigMap lifecycle [Conformance]
Kubernetes e2e suite [It] [sig-node] ConfigMap should update ConfigMap successfully
Kubernetes e2e suite [It] [sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart exec hook properly [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart http hook properly [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart https hook properly [MinimumKubeletVersion:1.23] [NodeConformance]
Kubernetes e2e suite [It] [sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop exec hook properly [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop http hook properly [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop https hook properly [MinimumKubeletVersion:1.23] [NodeConformance]
Kubernetes e2e suite [It] [sig-node] Container Runtime blackbox test on terminated container should report termination message as empty when pod succeeds and TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Container Runtime blackbox test on terminated container should report termination message from file when pod succeeds and TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Container Runtime blackbox test on terminated container should report termination message from log output if TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Container Runtime blackbox test on terminated container should report termination message if TerminationMessagePath is set [NodeConformance]
Kubernetes e2e suite [It] [sig-node] Container Runtime blackbox test on terminated container should report termination message if TerminationMessagePath is set as non-root user and at a non-default path [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Container Runtime blackbox test when running a container with a new image should be able to pull from private registry with secret [NodeConformance]
Kubernetes e2e suite [It] [sig-node] Container Runtime blackbox test when running a container with a new image should be able to pull image [NodeConformance]
Kubernetes e2e suite [It] [sig-node] Container Runtime blackbox test when running a container with a new image should not be able to pull from private registry without secret [NodeConformance]
Kubernetes e2e suite [It] [sig-node] Container Runtime blackbox test when running a container with a new image should not be able to pull image from invalid registry [NodeConformance]
Kubernetes e2e suite [It] [sig-node] Container Runtime blackbox test when starting a container that exits should run with the expected status [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Containers should be able to override the image's default arguments (container cmd) [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Containers should be able to override the image's default command (container entrypoint) [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Containers should be able to override the image's default command and arguments [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Containers should use the image defaults if command and args are blank [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Downward API should provide container's limits.cpu/memory and requests.cpu/memory as env vars [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Downward API should provide default limits.cpu/memory from node allocatable [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Downward API should provide host IP and pod IP as an env var if pod uses host network [LinuxOnly]
Kubernetes e2e suite [It] [sig-node] Downward API should provide host IP as an env var [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Downward API should provide pod UID as env vars [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Downward API should provide pod name, namespace and IP address as env vars [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Ephemeral Containers [NodeConformance] will start an ephemeral container in an existing pod [Conformance]
Kubernetes e2e suite [It] [sig-node] Events should be sent by kubelets and the scheduler about pods scheduling and running
Kubernetes e2e suite [It] [sig-node] InitContainer [NodeConformance] should invoke init containers on a RestartAlways pod [Conformance]
Kubernetes e2e suite [It] [sig-node] InitContainer [NodeConformance] should invoke init containers on a RestartNever pod [Conformance]
Kubernetes e2e suite [It] [sig-node] InitContainer [NodeConformance] should not start app containers and fail the pod if init containers fail on a RestartNever pod [Conformance]
Kubernetes e2e suite [It] [sig-node] InitContainer [NodeConformance] should not start app containers if init containers fail on a RestartAlways pod [Conformance]
Kubernetes e2e suite [It] [sig-node] Kubelet when scheduling a busybox command in a pod should print the output to logs [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Kubelet when scheduling a busybox command that always fails in a pod should be possible to delete [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Kubelet when scheduling a busybox command that always fails in a pod should have an terminated reason [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Kubelet when scheduling a read only busybox container should not write to root filesystem [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Kubelet when scheduling an agnhost Pod with hostAliases should write entries to /etc/hosts [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] KubeletManagedEtcHosts should test kubelet managed /etc/hosts file [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Lease lease API should be available [Conformance]
Kubernetes e2e suite [It] [sig-node] Mount propagation should propagate mounts within defined scopes
Kubernetes e2e suite [It] [sig-node] NodeLease NodeLease should have OwnerReferences set
Kubernetes e2e suite [It] [sig-node] NodeLease NodeLease the kubelet should create and update a lease in the kube-node-lease namespace
Kubernetes e2e suite [It] [sig-node] NodeLease NodeLease the kubelet should report node status infrequently
Kubernetes e2e suite [It] [sig-node] NodeProblemDetector should run without error
Kubernetes e2e suite [It] [sig-node] PodOSRejection [NodeConformance] Kubelet should reject pod when the node OS doesn't match pod's OS
Kubernetes e2e suite [It] [sig-node] PodTemplates should delete a collection of pod templates [Conformance]
Kubernetes e2e suite [It] [sig-node] PodTemplates should replace a pod template [Conformance]
Kubernetes e2e suite [It] [sig-node] PodTemplates should run the lifecycle of PodTemplates [Conformance]
Kubernetes e2e suite [It] [sig-node] Pods Extended Delete Grace Period should be submitted and removed
Kubernetes e2e suite [It] [sig-node] Pods Extended Pod Container Status should never report container start when an init container fails
Kubernetes e2e suite [It] [sig-node] Pods Extended Pod Container Status should never report success for a pending container
Kubernetes e2e suite [It] [sig-node] Pods Extended Pod Container lifecycle evicted pods should be terminal
Kubernetes e2e suite [It] [sig-node] Pods Extended Pod Container lifecycle should not create extra sandbox if all containers are done
Kubernetes e2e suite [It] [sig-node] Pods Extended Pod TerminationGracePeriodSeconds is negative pod with negative grace period
Kubernetes e2e suite [It] [sig-node] Pods Extended Pods Set QOS Class should be set on Pods with matching resource requests and limits for memory and cpu [Conformance]
Kubernetes e2e suite [It] [sig-node] Pods should allow activeDeadlineSeconds to be updated [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Pods should be submitted and removed [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Pods should be updated [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Pods should cap back-off at MaxContainerBackOff [Slow][NodeConformance]
Kubernetes e2e suite [It] [sig-node] Pods should contain environment variables for services [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Pods should delete a collection of pods [Conformance]
Kubernetes e2e suite [It] [sig-node] Pods should get a host IP [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Pods should have their auto-restart back-off timer reset on image update [Slow][NodeConformance]
Kubernetes e2e suite [It] [sig-node] Pods should patch a pod status [Conformance]
Kubernetes e2e suite [It] [sig-node] Pods should run through the lifecycle of Pods and PodStatus [Conformance]
Kubernetes e2e suite [It] [sig-node] Pods should support pod readiness gates [NodeConformance]
Kubernetes e2e suite [It] [sig-node] Pods should support remote command execution over websockets [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Pods should support retrieving logs from the container over websockets [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] PreStop graceful pod terminated should wait until preStop hook completes the process
Kubernetes e2e suite [It] [sig-node] PreStop should call prestop when killing a pod [Conformance]
Kubernetes e2e suite [It] [sig-node] PrivilegedPod [NodeConformance] should enable privileged commands [LinuxOnly]
Kubernetes e2e suite [It] [sig-node] Probing container should *not* be restarted by liveness probe because startup probe delays it
Kubernetes e2e suite [It] [sig-node] Probing container should *not* be restarted with a /healthz http liveness probe [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Probing container should *not* be restarted with a GRPC liveness probe [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Probing container should *not* be restarted with a exec "cat /tmp/health" liveness probe [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Probing container should *not* be restarted with a non-local redirect http liveness probe
Kubernetes e2e suite [It] [sig-node] Probing container should *not* be restarted with a tcp:8080 liveness probe [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Probing container should be ready immediately after startupProbe succeeds
Kubernetes e2e suite [It] [sig-node] Probing container should be restarted by liveness probe after startup probe enables it
Kubernetes e2e suite [It] [sig-node] Probing container should be restarted startup probe fails
Kubernetes e2e suite [It] [sig-node] Probing container should be restarted with a /healthz http liveness probe [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Probing container should be restarted with a GRPC liveness probe [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Probing container should be restarted with a exec "cat /tmp/health" liveness probe [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Probing container should be restarted with a failing exec liveness probe that took longer than the timeout
Kubernetes e2e suite [It] [sig-node] Probing container should be restarted with a local redirect http liveness probe
Kubernetes e2e suite [It] [sig-node] Probing container should be restarted with an exec liveness probe with timeout [MinimumKubeletVersion:1.20] [NodeConformance]
Kubernetes e2e suite [It] [sig-node] Probing container should have monotonically increasing restart count [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Probing container should mark readiness on pods to false and disable liveness probes while pod is in progress of terminating
Kubernetes e2e suite [It] [sig-node] Probing container should mark readiness on pods to false while pod is in progress of terminating when a pod has a readiness probe
Kubernetes e2e suite [It] [sig-node] Probing container should not be ready with an exec readiness probe timeout [MinimumKubeletVersion:1.20] [NodeConformance]
Kubernetes e2e suite [It] [sig-node] Probing container with readiness probe should not be ready before initial delay and never restart [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Probing container with readiness probe that fails should never be ready and never restart [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] RuntimeClass should support RuntimeClasses API operations [Conformance]
Kubernetes e2e suite [It] [sig-node] RuntimeClass should reject a Pod requesting a RuntimeClass with an unconfigured handler [NodeFeature:RuntimeHandler]
Kubernetes e2e suite [It] [sig-node] RuntimeClass should reject a Pod requesting a RuntimeClass with conflicting node selector
Kubernetes e2e suite [It] [sig-node] RuntimeClass should reject a Pod requesting a deleted RuntimeClass [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] RuntimeClass should reject a Pod requesting a non-existent RuntimeClass [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] RuntimeClass should run a Pod requesting a RuntimeClass with a configured handler [NodeFeature:RuntimeHandler]
Kubernetes e2e suite [It] [sig-node] RuntimeClass should run a Pod requesting a RuntimeClass with scheduling without taints
Kubernetes e2e suite [It] [sig-node] RuntimeClass should schedule a Pod requesting a RuntimeClass and initialize its Overhead [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] RuntimeClass should schedule a Pod requesting a RuntimeClass without PodOverhead [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] SSH should SSH to all nodes and run commands
Kubernetes e2e suite [It] [sig-node] Secrets should be consumable from pods in env vars [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Secrets should be consumable via the environment [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Secrets should fail to create secret due to empty secret key [Conformance]
Kubernetes e2e suite [It] [sig-node] Secrets should patch a secret [Conformance]
Kubernetes e2e suite [It] [sig-node] Security Context When creating a container with runAsNonRoot should not run with an explicit root user ID [LinuxOnly]
Kubernetes e2e suite [It] [sig-node] Security Context When creating a container with runAsNonRoot should not run without a specified user ID
Kubernetes e2e suite [It] [sig-node] Security Context When creating a container with runAsNonRoot should run with an explicit non-root user ID [LinuxOnly]
Kubernetes e2e suite [It] [sig-node] Security Context When creating a container with runAsNonRoot should run with an image specified user ID
Kubernetes e2e suite [It] [sig-node] Security Context When creating a container with runAsUser should run the container with uid 0 [LinuxOnly] [NodeConformance]
Kubernetes e2e suite [It] [sig-node] Security Context When creating a container with runAsUser should run the container with uid 65534 [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Security Context When creating a pod with privileged should run the container as privileged when true [LinuxOnly] [NodeFeature:HostAccess]
Kubernetes e2e suite [It] [sig-node] Security Context When creating a pod with privileged should run the container as unprivileged when false [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Security Context When creating a pod with readOnlyRootFilesystem should run the container with readonly rootfs when readOnlyRootFilesystem=true [LinuxOnly] [NodeConformance]
Kubernetes e2e suite [It] [sig-node] Security Context When creating a pod with readOnlyRootFilesystem should run the container with writable rootfs when readOnlyRootFilesystem=false [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Security Context should support container.SecurityContext.RunAsUser And container.SecurityContext.RunAsGroup [LinuxOnly] [Conformance]
Kubernetes e2e suite [It] [sig-node] Security Context should support container.SecurityContext.RunAsUser [LinuxOnly]
Kubernetes e2e suite [It] [sig-node] Security Context should support pod.Spec.SecurityContext.RunAsUser And pod.Spec.SecurityContext.RunAsGroup [LinuxOnly] [Conformance]
Kubernetes e2e suite [It] [sig-node] Security Context should support pod.Spec.SecurityContext.RunAsUser [LinuxOnly]
Kubernetes e2e suite [It] [sig-node] Security Context should support pod.Spec.SecurityContext.SupplementalGroups [LinuxOnly]
Kubernetes e2e suite [It] [sig-node] Security Context should support seccomp default which is unconfined [LinuxOnly]
Kubernetes e2e suite [It] [sig-node] Security Context should support seccomp runtime/default [LinuxOnly]
Kubernetes e2e suite [It] [sig-node] Security Context should support seccomp unconfined on the container [LinuxOnly]
Kubernetes e2e suite [It] [sig-node] Security Context should support seccomp unconfined on the pod [LinuxOnly]
Kubernetes e2e suite [It] [sig-node] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when not explicitly set and uid != 0 [LinuxOnly] [NodeConformance]
Kubernetes e2e suite [It] [sig-node] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when true [LinuxOnly] [NodeConformance]
Kubernetes e2e suite [It] [sig-node] Security Context when creating containers with AllowPrivilegeEscalation should not allow privilege escalation when false [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Security Context when if the container's primary UID belongs to some groups in the image [LinuxOnly] should add pod.Spec.SecurityContext.SupplementalGroups to them [LinuxOnly] in resultant supplementary groups for the container processes
Kubernetes e2e suite [It] [sig-node] Sysctls [LinuxOnly] [NodeConformance] should not launch unsafe, but not explicitly enabled sysctls on the node [MinimumKubeletVersion:1.21]
Kubernetes e2e suite [It] [sig-node] Sysctls [LinuxOnly] [NodeConformance] should reject invalid sysctls [MinimumKubeletVersion:1.21] [Conformance]
Kubernetes e2e suite [It] [sig-node] Sysctls [LinuxOnly] [NodeConformance] should support sysctls [MinimumKubeletVersion:1.21] [Conformance]
Kubernetes e2e suite [It] [sig-node] Sysctls [LinuxOnly] [NodeConformance] should support sysctls with slashes as separator [MinimumKubeletVersion:1.23]
Kubernetes e2e suite [It] [sig-node] Variable Expansion should allow composing env vars into new env vars [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Variable Expansion should allow substituting values in a container's args [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Variable Expansion should allow substituting values in a container's command [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-node] Variable Expansion should allow substituting values in a volume subpath [Conformance]
Kubernetes e2e suite [It] [sig-node] Variable Expansion should fail substituting values in a volume subpath with absolute path [Slow] [Conformance]
Kubernetes e2e suite [It] [sig-node] Variable Expansion should fail substituting values in a volume subpath with backticks [Slow] [Conformance]
Kubernetes e2e suite [It] [sig-node] Variable Expansion should succeed in writing subpaths in container [Slow] [Conformance]
Kubernetes e2e suite [It] [sig-node] Variable Expansion should verify that a failing subpath expansion can be modified during the lifecycle of a container [Slow] [Conformance]
Kubernetes e2e suite [It] [sig-node] crictl should be able to run crictl on the node
Kubernetes e2e suite [It] [sig-node] kubelet Clean up pods on node kubelet should be able to delete 10 pods per node in 1m0s.
Kubernetes e2e suite [It] [sig-scheduling] LimitRange should create a LimitRange with defaults and ensure pod has those defaults applied. [Conformance]
Kubernetes e2e suite [It] [sig-scheduling] LimitRange should list, patch and delete a LimitRange by collection [Conformance]
Kubernetes e2e suite [It] [sig-storage] CSI Mock fsgroup as mount option Delegate FSGroup to CSI driver [LinuxOnly] should not pass FSGroup to CSI driver if it is set in pod and driver supports VOLUME_MOUNT_GROUP
Kubernetes e2e suite [It] [sig-storage] CSI Mock fsgroup as mount option Delegate FSGroup to CSI driver [LinuxOnly] should pass FSGroup to CSI driver if it is set in pod and driver supports VOLUME_MOUNT_GROUP
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume attach CSI CSIDriver deployment after pod creation using non-attachable mock driver should bringup pod after deploying CSIDriver attach=false [Slow]
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume attach CSI attach test using mock driver should not require VolumeAttach for drivers without attachment
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume attach CSI attach test using mock driver should preserve attachment policy when no CSIDriver present
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume attach CSI attach test using mock driver should require VolumeAttach for drivers with attachment
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume attach CSI attach test using mock driver should require VolumeAttach for ephemermal volume and drivers with attachment
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume expansion CSI Volume expansion should expand volume by restarting pod if attach=off, nodeExpansion=on
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume expansion CSI Volume expansion should expand volume by restarting pod if attach=on, nodeExpansion=on
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume expansion CSI Volume expansion should expand volume without restarting pod if nodeExpansion=off
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume expansion CSI Volume expansion should not expand volume if resizingOnDriver=off, resizingOnSC=on
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume expansion CSI Volume expansion should not have staging_path missing in node expand volume pod if attach=on, nodeExpansion=on
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume expansion CSI online volume expansion should expand volume without restarting pod if attach=off, nodeExpansion=on
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume expansion CSI online volume expansion should expand volume without restarting pod if attach=on, nodeExpansion=on
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume expansion CSI online volume expansion with secret should expand volume without restarting pod if attach=on, nodeExpansion=on, csiNodeExpandSecret=on
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume fsgroup policies CSI FSGroupPolicy [LinuxOnly] should modify fsGroup if fsGroupPolicy=File
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume fsgroup policies CSI FSGroupPolicy [LinuxOnly] should modify fsGroup if fsGroupPolicy=default
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume fsgroup policies CSI FSGroupPolicy [LinuxOnly] should not modify fsGroup if fsGroupPolicy=None
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume limit CSI volume limit information using mock driver should report attach limit for generic ephemeral volume when persistent volume is attached [Slow]
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume limit CSI volume limit information using mock driver should report attach limit for persistent volume when generic ephemeral volume is attached [Slow]
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume limit CSI volume limit information using mock driver should report attach limit when limit is bigger than 0 [Slow]
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume node stage CSI NodeStage error cases [Slow] should call NodeUnstage after NodeStage ephemeral error
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume node stage CSI NodeStage error cases [Slow] should call NodeUnstage after NodeStage success
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume node stage CSI NodeStage error cases [Slow] should not call NodeUnstage after NodeStage final error
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume node stage CSI NodeStage error cases [Slow] should retry NodeStage after NodeStage ephemeral error
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume node stage CSI NodeStage error cases [Slow] should retry NodeStage after NodeStage final error
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume node stage CSI NodeUnstage error cases [Slow] should call NodeStage after NodeUnstage success
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume node stage CSI NodeUnstage error cases [Slow] two pods: should call NodeStage after previous NodeUnstage final error
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume node stage CSI NodeUnstage error cases [Slow] two pods: should call NodeStage after previous NodeUnstage transient error
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume service account token CSIServiceAccountToken token should be plumbed down when csiServiceAccountTokenEnabled=true
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume service account token CSIServiceAccountToken token should not be plumbed down when CSIDriver is not deployed
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume service account token CSIServiceAccountToken token should not be plumbed down when csiServiceAccountTokenEnabled=false
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume storage capacity CSIStorageCapacity CSIStorageCapacity disabled
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume storage capacity CSIStorageCapacity CSIStorageCapacity unused
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume storage capacity CSIStorageCapacity CSIStorageCapacity used, have capacity
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume storage capacity CSIStorageCapacity CSIStorageCapacity used, insufficient capacity
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume storage capacity CSIStorageCapacity CSIStorageCapacity used, no capacity
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume storage capacity storage capacity exhausted, immediate binding
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume storage capacity storage capacity exhausted, late binding, no topology
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume storage capacity storage capacity exhausted, late binding, with topology
Kubernetes e2e suite [It] [sig-storage] CSI Mock volume storage capacity storage capacity unlimited
Kubernetes e2e suite [It] [sig-storage] CSI Mock workload info CSI workload information using mock driver contain ephemeral=true when using inline volume
Kubernetes e2e suite [It] [sig-storage] CSI Mock workload info CSI workload information using mock driver should be passed when podInfoOnMount=true
Kubernetes e2e suite [It] [sig-storage] CSI Mock workload info CSI workload information using mock driver should not be passed when CSIDriver does not exist
Kubernetes e2e suite [It] [sig-storage] CSI Mock workload info CSI workload information using mock driver should not be passed when podInfoOnMount=false
Kubernetes e2e suite [It] [sig-storage] CSI Mock workload info CSI workload information using mock driver should not be passed when podInfoOnMount=nil
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support multiple inline ephemeral volumes
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support two pods which have the same volume definition
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] read-write-once-pod should block a second pod from using an in-use ReadWriteOncePod volume on the same node
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] read-write-once-pod should preempt lower priority pods using ReadWriteOncePod volumes
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition
Kubernetes e2e suite [It] [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits
Kubernetes e2e suite [It] [sig-storage] CSIInlineVolumes should support CSIVolumeSource in Pod API [Conformance]
Kubernetes e2e suite [It] [sig-storage] CSIInlineVolumes should support ephemeral VolumeLifecycleMode in CSIDriver API [Conformance]
Kubernetes e2e suite [It] [sig-storage] CSIStorageCapacity should support CSIStorageCapacities API operations [Conformance]
Kubernetes e2e suite [It] [sig-storage] ConfigMap Should fail non-optional pod creation due to configMap object does not exist [Slow]
Kubernetes e2e suite [It] [sig-storage] ConfigMap Should fail non-optional pod creation due to the key in the configMap object does not exist [Slow]
Kubernetes e2e suite [It] [sig-storage] ConfigMap binary data should be reflected in volume [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] ConfigMap optional updates should be reflected in volume [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] ConfigMap should be consumable from pods in volume [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] ConfigMap should be consumable from pods in volume as non-root [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] ConfigMap should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]
Kubernetes e2e suite [It] [sig-storage] ConfigMap should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeFeature:FSGroup]
Kubernetes e2e suite [It] [sig-storage] ConfigMap should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] ConfigMap should be consumable from pods in volume with mappings [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] ConfigMap should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] ConfigMap should be consumable from pods in volume with mappings as non-root [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] ConfigMap should be consumable from pods in volume with mappings as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]
Kubernetes e2e suite [It] [sig-storage] ConfigMap should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] ConfigMap should be immutable if `immutable` field is set [Conformance]
Kubernetes e2e suite [It] [sig-storage] ConfigMap updates should be reflected in volume [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Downward API volume should provide container's cpu limit [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Downward API volume should provide container's cpu request [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Downward API volume should provide container's memory limit [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Downward API volume should provide container's memory request [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Downward API volume should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Downward API volume should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Downward API volume should provide podname as non-root with fsgroup [LinuxOnly] [NodeFeature:FSGroup]
Kubernetes e2e suite [It] [sig-storage] Downward API volume should provide podname as non-root with fsgroup and defaultMode [LinuxOnly] [NodeFeature:FSGroup]
Kubernetes e2e suite [It] [sig-storage] Downward API volume should provide podname only [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Downward API volume should set DefaultMode on files [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Downward API volume should set mode on item file [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Downward API volume should update annotations on modification [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Downward API volume should update labels on modification [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Dynamic Provisioning DynamicProvisioner External should let an external dynamic provisioner create and delete persistent volumes [Slow]
Kubernetes e2e suite [It] [sig-storage] EmptyDir volumes pod should support memory backed volumes of specified size
Kubernetes e2e suite [It] [sig-storage] EmptyDir volumes pod should support shared volumes between containers [Conformance]
Kubernetes e2e suite [It] [sig-storage] EmptyDir volumes should support (non-root,0644,default) [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] EmptyDir volumes should support (non-root,0644,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] EmptyDir volumes should support (non-root,0666,default) [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] EmptyDir volumes should support (non-root,0666,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] EmptyDir volumes should support (non-root,0777,default) [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] EmptyDir volumes should support (non-root,0777,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] EmptyDir volumes should support (root,0644,default) [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] EmptyDir volumes should support (root,0644,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] EmptyDir volumes should support (root,0666,default) [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] EmptyDir volumes should support (root,0666,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] EmptyDir volumes should support (root,0777,default) [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] EmptyDir volumes should support (root,0777,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] EmptyDir volumes volume on default medium should have the correct mode [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] EmptyDir volumes volume on tmpfs should have the correct mode [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] files with FSGroup ownership should support (root,0644,tmpfs)
Kubernetes e2e suite [It] [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] new files should be created with FSGroup ownership when container is non-root
Kubernetes e2e suite [It] [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] new files should be created with FSGroup ownership when container is root
Kubernetes e2e suite [It] [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] nonexistent volume subPath should have the correct mode and owner using FSGroup
Kubernetes e2e suite [It] [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] volume on default medium should have the correct mode using FSGroup
Kubernetes e2e suite [It] [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] volume on tmpfs should have the correct mode using FSGroup
Kubernetes e2e suite [It] [sig-storage] EmptyDir wrapper volumes should not conflict [Conformance]
Kubernetes e2e suite [It] [sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : configmap
Kubernetes e2e suite [It] [sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : projected
Kubernetes e2e suite [It] [sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : secret
Kubernetes e2e suite [It] [sig-storage] Flexvolumes should be mountable when non-attachable
Kubernetes e2e suite [It] [sig-storage] HostPath should give a volume the correct mode [LinuxOnly] [NodeConformance]
Kubernetes e2e suite [It] [sig-storage] HostPath should support r/w [NodeConformance]
Kubernetes e2e suite [It] [sig-storage] HostPath should support subPath [NodeConformance]
Kubernetes e2e suite [It] [sig-storage] HostPathType Block Device [Slow] Should be able to mount block device 'ablkdev' successfully when HostPathType is HostPathBlockDev
Kubernetes e2e suite [It] [sig-storage] HostPathType Block Device [Slow] Should be able to mount block device 'ablkdev' successfully when HostPathType is HostPathUnset
Kubernetes e2e suite [It] [sig-storage] HostPathType Block Device [Slow] Should fail on mounting block device 'ablkdev' when HostPathType is HostPathCharDev
Kubernetes e2e suite [It] [sig-storage] HostPathType Block Device [Slow] Should fail on mounting block device 'ablkdev' when HostPathType is HostPathDirectory
Kubernetes e2e suite [It] [sig-storage] HostPathType Block Device [Slow] Should fail on mounting block device 'ablkdev' when HostPathType is HostPathFile
Kubernetes e2e suite [It] [sig-storage] HostPathType Block Device [Slow] Should fail on mounting block device 'ablkdev' when HostPathType is HostPathSocket
Kubernetes e2e suite [It] [sig-storage] HostPathType Block Device [Slow] Should fail on mounting non-existent block device 'does-not-exist-blk-dev' when HostPathType is HostPathBlockDev
Kubernetes e2e suite [It] [sig-storage] HostPathType Character Device [Slow] Should be able to mount character device 'achardev' successfully when HostPathType is HostPathCharDev
Kubernetes e2e suite [It] [sig-storage] HostPathType Character Device [Slow] Should be able to mount character device 'achardev' successfully when HostPathType is HostPathUnset
Kubernetes e2e suite [It] [sig-storage] HostPathType Character Device [Slow] Should fail on mounting character device 'achardev' when HostPathType is HostPathBlockDev
Kubernetes e2e suite [It] [sig-storage] HostPathType Character Device [Slow] Should fail on mounting character device 'achardev' when HostPathType is HostPathDirectory
Kubernetes e2e suite [It] [sig-storage] HostPathType Character Device [Slow] Should fail on mounting character device 'achardev' when HostPathType is HostPathFile
Kubernetes e2e suite [It] [sig-storage] HostPathType Character Device [Slow] Should fail on mounting non-existent character device 'does-not-exist-char-dev' when HostPathType is HostPathCharDev
Kubernetes e2e suite [It] [sig-storage] HostPathType Directory [Slow] Should be able to mount directory 'adir' successfully when HostPathType is HostPathDirectory
Kubernetes e2e suite [It] [sig-storage] HostPathType Directory [Slow] Should be able to mount directory 'adir' successfully when HostPathType is HostPathUnset
Kubernetes e2e suite [It] [sig-storage] HostPathType Directory [Slow] Should fail on mounting directory 'adir' when HostPathType is HostPathBlockDev
Kubernetes e2e suite [It] [sig-storage] HostPathType Directory [Slow] Should fail on mounting directory 'adir' when HostPathType is HostPathCharDev
Kubernetes e2e suite [It] [sig-storage] HostPathType Directory [Slow] Should fail on mounting directory 'adir' when HostPathType is HostPathFile
Kubernetes e2e suite [It] [sig-storage] HostPathType Directory [Slow] Should fail on mounting directory 'adir' when HostPathType is HostPathSocket
Kubernetes e2e suite [It] [sig-storage] HostPathType Directory [Slow] Should fail on mounting non-existent directory 'does-not-exist-dir' when HostPathType is HostPathDirectory
Kubernetes e2e suite [It] [sig-storage] HostPathType File [Slow] Should be able to mount file 'afile' successfully when HostPathType is HostPathFile
Kubernetes e2e suite [It] [sig-storage] HostPathType File [Slow] Should be able to mount file 'afile' successfully when HostPathType is HostPathUnset
Kubernetes e2e suite [It] [sig-storage] HostPathType File [Slow] Should fail on mounting file 'afile' when HostPathType is HostPathBlockDev
Kubernetes e2e suite [It] [sig-storage] HostPathType File [Slow] Should fail on mounting file 'afile' when HostPathType is HostPathCharDev
Kubernetes e2e suite [It] [sig-storage] HostPathType File [Slow] Should fail on mounting file 'afile' when HostPathType is HostPathDirectory
Kubernetes e2e suite [It] [sig-storage] HostPathType File [Slow] Should fail on mounting file 'afile' when HostPathType is HostPathSocket
Kubernetes e2e suite [It] [sig-storage] HostPathType File [Slow] Should fail on mounting non-existent file 'does-not-exist-file' when HostPathType is HostPathFile
Kubernetes e2e suite [It] [sig-storage] HostPathType Socket [Slow] Should be able to mount socket 'asocket' successfully when HostPathType is HostPathSocket
Kubernetes e2e suite [It] [sig-storage] HostPathType Socket [Slow] Should be able to mount socket 'asocket' successfully when HostPathType is HostPathUnset
Kubernetes e2e suite [It] [sig-storage] HostPathType Socket [Slow] Should fail on mounting non-existent socket 'does-not-exist-socket' when HostPathType is HostPathSocket
Kubernetes e2e suite [It] [sig-storage] HostPathType Socket [Slow] Should fail on mounting socket 'asocket' when HostPathType is HostPathBlockDev
Kubernetes e2e suite [It] [sig-storage] HostPathType Socket [Slow] Should fail on mounting socket 'asocket' when HostPathType is HostPathCharDev
Kubernetes e2e suite [It] [sig-storage] HostPathType Socket [Slow] Should fail on mounting socket 'asocket' when HostPathType is HostPathDirectory
Kubernetes e2e suite [It] [sig-storage] HostPathType Socket [Slow] Should fail on mounting socket 'asocket' when HostPathType is HostPathFile
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [It] [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]
Kubernetes e2e suite [It] [sig-storage] PV Protection Verify "immediate" deletion of a PV that is not bound to a PVC
Kubernetes e2e suite [It] [sig-storage] PV Protection Verify that PV bound to a PVC is not removed immediately
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes NFS when invoking the Recycle reclaim policy should test that a PV becomes Available and is clean after the PVC is deleted.
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PV and a pre-bound PVC: test write access
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PVC and a pre-bound PV: test write access
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PVC and non-pre-bound PV: test write access
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes NFS with Single PV - PVC pairs should create a non-pre-bound PV and PVC: test write access
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes NFS with multiple PVs and PVCs all in same ns should create 2 PVs and 4 PVCs: test write access
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes NFS with multiple PVs and PVCs all in same ns should create 3 PVs and 3 PVCs: test write access
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes NFS with multiple PVs and PVCs all in same ns should create 4 PVs and 2 PVCs: test write access [Slow]
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-expansion loopback local block volume should support online expansion on node
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local Local volume that cannot be mounted [Slow] should fail due to non-existent path
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local Local volume that cannot be mounted [Slow] should fail due to wrong node
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local Pod with node different from PV's NodeAffinity should fail scheduling due to different NodeAffinity
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local Pod with node different from PV's NodeAffinity should fail scheduling due to different NodeSelector
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local StatefulSet with pod affinity [Slow] should use volumes on one node when pod has affinity
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local StatefulSet with pod affinity [Slow] should use volumes on one node when pod management is parallel and pod has affinity
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local StatefulSet with pod affinity [Slow] should use volumes spread across nodes when pod has anti-affinity
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local StatefulSet with pod affinity [Slow] should use volumes spread across nodes when pod management is parallel and pod has anti-affinity
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: block] One pod requesting one prebound PVC should be able to mount volume and read from pod1
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: block] One pod requesting one prebound PVC should be able to mount volume and write from pod1
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: block] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: block] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] One pod requesting one prebound PVC should be able to mount volume and read from pod1
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] One pod requesting one prebound PVC should be able to mount volume and write from pod1
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Set fsGroup for local volume should set fsGroup for one pod [Slow]
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] One pod requesting one prebound PVC should be able to mount volume and read from pod1
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] One pod requesting one prebound PVC should be able to mount volume and write from pod1
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Set fsGroup for local volume should set fsGroup for one pod [Slow]
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] One pod requesting one prebound PVC should be able to mount volume and read from pod1
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] One pod requesting one prebound PVC should be able to mount volume and write from pod1
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Set fsGroup for local volume should set fsGroup for one pod [Slow]
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] One pod requesting one prebound PVC should be able to mount volume and read from pod1
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] One pod requesting one prebound PVC should be able to mount volume and write from pod1
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Set fsGroup for local volume should set fsGroup for one pod [Slow]
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: dir-link] One pod requesting one prebound PVC should be able to mount volume and read from pod1
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: dir-link] One pod requesting one prebound PVC should be able to mount volume and write from pod1
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: dir-link] Set fsGroup for local volume should set fsGroup for one pod [Slow]
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: dir-link] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: dir-link] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: dir-link] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: dir] One pod requesting one prebound PVC should be able to mount volume and read from pod1
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: dir] One pod requesting one prebound PVC should be able to mount volume and write from pod1
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: dir] Set fsGroup for local volume should set fsGroup for one pod [Slow]
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: dir] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: dir] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: dir] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: tmpfs] One pod requesting one prebound PVC should be able to mount volume and read from pod1
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: tmpfs] One pod requesting one prebound PVC should be able to mount volume and write from pod1
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: tmpfs] Set fsGroup for local volume should set fsGroup for one pod [Slow]
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: tmpfs] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: tmpfs] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2
Kubernetes e2e suite [It] [sig-storage] PersistentVolumes-local [Volume type: tmpfs] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2
Kubernetes e2e suite [It] [sig-storage] Projected combined should project all components that make up the projection API [Projection][NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected configMap Should fail non-optional pod creation due to configMap object does not exist [Slow]
Kubernetes e2e suite [It] [sig-storage] Projected configMap Should fail non-optional pod creation due to the key in the configMap object does not exist [Slow]
Kubernetes e2e suite [It] [sig-storage] Projected configMap optional updates should be reflected in volume [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected configMap should be consumable from pods in volume [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected configMap should be consumable from pods in volume as non-root [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected configMap should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]
Kubernetes e2e suite [It] [sig-storage] Projected configMap should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeFeature:FSGroup]
Kubernetes e2e suite [It] [sig-storage] Projected configMap should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected configMap should be consumable from pods in volume with mappings [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected configMap should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected configMap should be consumable from pods in volume with mappings as non-root [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected configMap should be consumable from pods in volume with mappings as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]
Kubernetes e2e suite [It] [sig-storage] Projected configMap should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected configMap updates should be reflected in volume [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected downwardAPI should provide container's cpu limit [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected downwardAPI should provide container's cpu request [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected downwardAPI should provide container's memory limit [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected downwardAPI should provide container's memory request [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected downwardAPI should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected downwardAPI should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected downwardAPI should provide podname as non-root with fsgroup [LinuxOnly] [NodeFeature:FSGroup]
Kubernetes e2e suite [It] [sig-storage] Projected downwardAPI should provide podname as non-root with fsgroup and defaultMode [LinuxOnly] [NodeFeature:FSGroup]
Kubernetes e2e suite [It] [sig-storage] Projected downwardAPI should provide podname only [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected downwardAPI should set DefaultMode on files [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected downwardAPI should set mode on item file [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected downwardAPI should update annotations on modification [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected downwardAPI should update labels on modification [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected secret Should fail non-optional pod creation due to secret object does not exist [Slow]
Kubernetes e2e suite [It] [sig-storage] Projected secret Should fail non-optional pod creation due to the key in the secret object does not exist [Slow]
Kubernetes e2e suite [It] [sig-storage] Projected secret optional updates should be reflected in volume [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected secret should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance]
Kubernetes e2e suite [It] [sig-storage] Projected secret should be consumable from pods in volume [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected secret should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected secret should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected secret should be consumable from pods in volume with mappings [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected secret should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Projected secret should be consumable in multiple volumes in a pod [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Secrets Should fail non-optional pod creation due to secret object does not exist [Slow]
Kubernetes e2e suite [It] [sig-storage] Secrets Should fail non-optional pod creation due to the key in the secret object does not exist [Slow]
Kubernetes e2e suite [It] [sig-storage] Secrets optional updates should be reflected in volume [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Secrets should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Secrets should be consumable from pods in volume [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Secrets should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Secrets should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Secrets should be consumable from pods in volume with mappings [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Secrets should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Secrets should be consumable in multiple volumes in a pod [NodeConformance] [Conformance]
Kubernetes e2e suite [It] [sig-storage] Secrets should be immutable if `immutable` field is set [Conformance]
Kubernetes e2e suite [It] [sig-storage] Subpath Atomic writer volumes should support subpaths with configmap pod [Conformance]
Kubernetes e2e suite [It] [sig-storage] Subpath Atomic writer volumes should support subpaths with configmap pod with mountPath of existing file [Conformance]
Kubernetes e2e suite [It] [sig-storage] Subpath Atomic writer volumes should support subpaths with downward pod [Conformance]
Kubernetes e2e suite [It] [sig-storage] Subpath Atomic writer volumes should support subpaths with projected pod [Conformance]
Kubernetes e2e suite [It] [sig-storage] Subpath Atomic writer volumes should support subpaths with secret pod [Conformance]
Kubernetes e2e suite [It] [sig-storage] Subpath Container restart should verify that container can restart successfully after configmaps modified
Kubernetes e2e suite [It] [sig-storage] Volumes ConfigMap should be mountable
Kubernetes e2e suite [It] [sig-storage] Volumes NFSv3 should be mountable for NFSv3
Kubernetes e2e suite [It] [sig-storage] Volumes NFSv4 should be mountable for NFSv4
Kubernetes e2e suite [ReportAfterSuite] Ginkgo JSON report
Kubernetes e2e suite [ReportAfterSuite] JUnit XML report
Kubernetes e2e suite [ReportAfterSuite] Kubernetes e2e suite report
Kubernetes e2e suite [ReportBeforeSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedAfterSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
Kubernetes e2e suite [SynchronizedBeforeSuite]
kubetest Check APIReachability
kubetest Deferred TearDown
kubetest DumpClusterLogs
kubetest Extract
kubetest GetDeployer
kubetest IsUp
kubetest Prepare
kubetest TearDown
kubetest TearDown Previous
kubetest Timeout
kubetest Up
kubetest kubectl version
kubetest list nodes
kubetest test setup
Kubernetes e2e suite [It] [sig-api-machinery] API Streaming (aka. WatchList) [Serial] [Feature:WatchList] should be requested when ENABLE_CLIENT_GO_WATCH_LIST_ALPHA is set
Kubernetes e2e suite [It] [sig-api-machinery] API priority and fairness should ensure that requests can't be drowned out (fairness)
Kubernetes e2e suite [It] [sig-api-machinery] API priority and fairness should ensure that requests can't be drowned out (priority)
Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] [Flaky] kubectl explain works for CR with the same resource name as built-in object.
Kubernetes e2e suite [It] [sig-api-machinery] Etcd failure [Disruptive] should recover from SIGKILL
Kubernetes e2e suite [It] [sig-api-machinery] Etcd failure [Disruptive] should recover from network partition with master
Kubernetes e2e suite [It] [sig-api-machinery] Namespaces [Serial] should always delete fast (ALL of 100 namespaces in 150 seconds) [Feature:ComprehensiveNamespaceDraining]
Kubernetes e2e suite [It] [sig-api-machinery] Namespaces [Serial] should apply a finalizer to a Namespace [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] Namespaces [Serial] should apply an update to a Namespace [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] Namespaces [Serial] should apply changes to a namespace status [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] Namespaces [Serial] should delete fast enough (90 percent of 100 namespaces in 150 seconds)
Kubernetes e2e suite [It] [sig-api-machinery] Namespaces [Serial] should ensure that all pods are removed when a namespace is deleted [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] Namespaces [Serial] should ensure that all services are removed when a namespace is deleted [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] Namespaces [Serial] should patch a Namespace [Conformance]
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's multiple priority class scope (quota set to pod count: 2) against 2 pods with same priority classes.
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (cpu, memory quota set) against a pod with same priority class.
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against 2 pods with different priority class.
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against 2 pods with same priority class.
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with different priority class (ScopeSelectorOpExists).
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with different priority class (ScopeSelectorOpNotIn).
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with same priority class.
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota [Feature:ScopeSelectors] should verify ResourceQuota with best effort scope using scope-selectors.
Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota [Feature:ScopeSelectors] should verify ResourceQuota with terminating scopes through scope selectors.
Kubernetes e2e suite [It] [sig-api-machinery] StorageVersion resources [Feature:StorageVersionAPI] storage version with non-existing id should be GC'ed
Kubernetes e2e suite [It] [sig-api-machinery] kube-apiserver identity [Feature:APIServerIdentity] kube-apiserver identity should persist after restart [Disruptive]
Kubernetes e2e suite [It] [sig-apps] ControllerRevision [Serial] should manage the lifecycle of a ControllerRevision [Conformance]
Kubernetes e2e suite [It] [sig-apps] Daemon set [Serial] should list and delete a collection of DaemonSets [Conformance]
Kubernetes e2e suite [It] [sig-apps] Daemon set [Serial] should not update pod when spec was updated and update strategy is OnDelete
Kubernetes e2e suite [It] [sig-apps] Daemon set [Serial] should retry creating failed daemon pods [Conformance]
Kubernetes e2e suite [It] [sig-apps] Daemon set [Serial] should rollback without unnecessary restarts [Conformance]
Kubernetes e2e suite [It] [sig-apps] Daemon set [Serial] should run and stop complex daemon [Conformance]
Kubernetes e2e suite [It] [sig-apps] Daemon set [Serial] should run and stop complex daemon with node affinity
Kubernetes e2e suite [It] [sig-apps] Daemon set [Serial] should run and stop simple daemon [Conformance]
Kubernetes e2e suite [It] [sig-apps] Daemon set [Serial] should surge pods onto nodes when spec was updated and update strategy is RollingUpdate
Kubernetes e2e suite [It] [sig-apps] Daemon set [Serial] should update pod when spec was updated and update strategy is RollingUpdate [Conformance]
Kubernetes e2e suite [It] [sig-apps] Daemon set [Serial] should verify changes to a daemon set status [Conformance]
Kubernetes e2e suite [It] [sig-apps] DaemonRestart [Disruptive] Controller Manager should not create/delete replicas across restart
Kubernetes e2e suite [It] [sig-apps] DaemonRestart [Disruptive] Kube-proxy should recover after being killed accidentally
Kubernetes e2e suite [It] [sig-apps] DaemonRestart [Disruptive] Kubelet should not restart containers across restart
Kubernetes e2e suite [It] [sig-apps] DaemonRestart [Disruptive] Scheduler should continue assigning pods to nodes across restart
Kubernetes e2e suite [It] [sig-apps] DisruptionController evictions: maxUnavailable deny evictions, integer => should not allow an eviction [Serial]
Kubernetes e2e suite [It] [sig-apps] DisruptionController evictions: too few pods, replicaSet, percentage => should not allow an eviction [Serial]
Kubernetes e2e suite [It] [sig-apps] Job should run a job to completion with CPU requests [Serial]
Kubernetes e2e suite [It] [sig-apps] StatefulSet Automatically recreate PVC for pending pod when PVC is missing PVC should be recreated when pod is pending due to missing PVC [Disruptive][Serial]
Kubernetes e2e suite [It] [sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should adopt matching orphans and release non-matching pods
Kubernetes e2e suite [It] [sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should not deadlock when a pod's predecessor fails
Kubernetes e2e suite [It] [sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should perform rolling updates and roll backs of template modifications with PVCs
Kubernetes e2e suite [It] [sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should provide basic identity
Kubernetes e2e suite [It] [sig-apps] StatefulSet Deploy clustered applications [Feature:StatefulSet] [Slow] should creating a working CockroachDB cluster
Kubernetes e2e suite [It] [sig-apps] StatefulSet Deploy clustered applications [Feature:StatefulSet] [Slow] should creating a working mysql cluster
Kubernetes e2e suite [It] [sig-apps] StatefulSet Deploy clustered applications [Feature:StatefulSet] [Slow] should creating a working redis cluster
Kubernetes e2e suite [It] [sig-apps] StatefulSet Deploy clustered applications [Feature:StatefulSet] [Slow] should creating a working zookeeper cluster
Kubernetes e2e suite [It] [sig-apps] StatefulSet Non-retain StatefulSetPersistentVolumeClaimPolicy should delete PVCs after adopting pod (WhenDeleted)
Kubernetes e2e suite [It] [sig-apps] StatefulSet Non-retain StatefulSetPersistentVolumeClaimPolicy should delete PVCs after adopting pod (WhenScaled)
Kubernetes e2e suite [It] [sig-apps] StatefulSet Non-retain StatefulSetPersistentVolumeClaimPolicy should delete PVCs with a OnScaledown policy
Kubernetes e2e suite [It] [sig-apps] StatefulSet Non-retain StatefulSetPersistentVolumeClaimPolicy should delete PVCs with a WhenDeleted policy
Kubernetes e2e suite [It] [sig-apps] StatefulSet Scaling StatefulSetStartOrdinal [Feature:StatefulSetStartOrdinal] Decreasing .start.ordinal
Kubernetes e2e suite [It] [sig-apps] StatefulSet Scaling StatefulSetStartOrdinal [Feature:StatefulSetStartOrdinal] Increasing .start.ordinal
Kubernetes e2e suite [It] [sig-apps] StatefulSet Scaling StatefulSetStartOrdinal [Feature:StatefulSetStartOrdinal] Removing .start.ordinal
Kubernetes e2e suite [It] [sig-apps] StatefulSet Scaling StatefulSetStartOrdinal [Feature:StatefulSetStartOrdinal] Setting .start.ordinal
Kubernetes e2e suite [It] [sig-apps] stateful Upgrade [Feature:StatefulUpgrade] stateful upgrade should maintain a functioning cluster
Kubernetes e2e suite [It] [sig-auth] SelfSubjectReview [Feature:APISelfSubjectReview] should support SelfSubjectReview API operations
Kubernetes e2e suite [It] [sig-auth] SelfSubjectReview [Feature:APISelfSubjectReview] testing SSR in different API groups authentication/v1alpha1
Kubernetes e2e suite [It] [sig-auth] SelfSubjectReview [Feature:APISelfSubjectReview] testing SSR in different API groups authentication/v1beta1
Kubernetes e2e suite [It] [sig-auth] ServiceAccount admission controller migration [Feature:BoundServiceAccountTokenVolume] master upgrade should maintain a functioning cluster
Kubernetes e2e suite [It] [sig-auth] [Feature:NodeAuthenticator] The kubelet can delegate ServiceAccount tokens to the API server
Kubernetes e2e suite [It] [sig-auth] [Feature:NodeAuthenticator] The kubelet's main port 10250 should reject requests with no credentials
Kubernetes e2e suite [It] [sig-auth] [Feature:NodeAuthorizer] A node shouldn't be able to create another node
Kubernetes e2e suite [It] [sig-auth] [Feature:NodeAuthorizer] A node shouldn't be able to delete another node
Kubernetes e2e suite [It] [sig-auth] [Feature:NodeAuthorizer] Getting a non-existent configmap should exit with the Forbidden error, not a NotFound error
Kubernetes e2e suite [It] [sig-auth] [Feature:NodeAuthorizer] Getting a non-existent secret should exit with the Forbidden error, not a NotFound error
Kubernetes e2e suite [It] [sig-auth] [Feature:NodeAuthorizer] Getting a secret for a workload the node has access to should succeed
Kubernetes e2e suite [It] [sig-auth] [Feature:NodeAuthorizer] Getting an existing configmap should exit with the Forbidden error
Kubernetes e2e suite [It] [sig-auth] [Feature:NodeAuthorizer] Getting an existing secret should exit with the Forbidden error
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaler scalability [Slow] CA ignores unschedulable pods while scheduling schedulable pods [Feature:ClusterAutoscalerScalability6]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaler scalability [Slow] should scale down empty nodes [Feature:ClusterAutoscalerScalability3]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaler scalability [Slow] should scale down underutilized nodes [Feature:ClusterAutoscalerScalability4]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaler scalability [Slow] should scale up at all [Feature:ClusterAutoscalerScalability1]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaler scalability [Slow] should scale up twice [Feature:ClusterAutoscalerScalability2]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaler scalability [Slow] shouldn't scale down with underutilized nodes due to host port conflicts [Feature:ClusterAutoscalerScalability5]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] Should be able to scale a node group down to 0[Feature:ClusterSizeAutoscalingScaleDown]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] Should be able to scale a node group up from 0[Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] Should not scale GPU pool up if pod does not require GPUs [GpuType:] [Feature:ClusterSizeAutoscalingGpu]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] Should scale down GPU pool from 1 [GpuType:] [Feature:ClusterSizeAutoscalingGpu]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] Should scale up GPU pool from 0 [GpuType:] [Feature:ClusterSizeAutoscalingGpu]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] Should scale up GPU pool from 1 [GpuType:] [Feature:ClusterSizeAutoscalingGpu]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] Shouldn't perform scale up operation and should list unhealthy status if most of the cluster is broken[Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] should add node to the particular mig [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] should be able to scale down by draining multiple pods one by one as dictated by pdb[Feature:ClusterSizeAutoscalingScaleDown]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] should be able to scale down by draining system pods with pdb[Feature:ClusterSizeAutoscalingScaleDown]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] should be able to scale down when rescheduling a pod is required and pdb allows for it[Feature:ClusterSizeAutoscalingScaleDown]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] should correctly scale down after a node is not needed [Feature:ClusterSizeAutoscalingScaleDown]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] should correctly scale down after a node is not needed and one node is broken [Feature:ClusterSizeAutoscalingScaleDown]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] should correctly scale down after a node is not needed when there is non autoscaled pool[Feature:ClusterSizeAutoscalingScaleDown]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] should disable node pool autoscaling [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pending pods are small [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pending pods are small and one node is broken [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pending pods are small and there is another node pool that is not autoscaled [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pod requesting EmptyDir volume is pending [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pod requesting volume is pending [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pods are pending due to host port conflict [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pods are pending due to pod anti-affinity [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] should scale down when expendable pod is running [Feature:ClusterSizeAutoscalingScaleDown]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] should scale up correct target pool [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] should scale up when non expendable pod is created [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] shouldn't be able to scale down when rescheduling a pod is required, but pdb doesn't allow drain[Feature:ClusterSizeAutoscalingScaleDown]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] shouldn't increase cluster size if pending pod is too large [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] shouldn't scale down when non expendable pod is running [Feature:ClusterSizeAutoscalingScaleDown]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] shouldn't scale up when expendable pod is created [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] shouldn't scale up when expendable pod is preempted [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [It] [sig-autoscaling] Cluster size autoscaling [Slow] shouldn't trigger additional scale-ups during processing scale-up [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [It] [sig-autoscaling] DNS horizontal autoscaling [Serial] [Slow] kube-dns-autoscaler should scale kube-dns pods when cluster size changed
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:ClusterSizeAutoscalingScaleUp] [Slow] Autoscaling Autoscaling a service from 1 pod and 3 nodes to 8 pods and >=4 nodes takes less than 15 minutes
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) CustomResourceDefinition Should scale with a CRD targetRef
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) ReplicationController light Should scale from 1 pod to 2 pods
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) ReplicationController light [Slow] Should scale from 2 pods to 1 pod
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [Serial] [Slow] Deployment (Container Resource) Should scale from 1 pod to 3 pods and then from 3 pods to 5 pods using Average Utilization for aggregation
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [Serial] [Slow] Deployment (Container Resource) Should scale from 1 pod to 3 pods and then from 3 pods to 5 pods using Average Value for aggregation
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [Serial] [Slow] Deployment (Pod Resource) Should scale from 1 pod to 3 pods and then from 3 pods to 5 pods using Average Utilization for aggregation
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [Serial] [Slow] Deployment (Pod Resource) Should scale from 1 pod to 3 pods and then from 3 pods to 5 pods using Average Value for aggregation
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [Serial] [Slow] Deployment (Pod Resource) Should scale from 5 pods to 3 pods and then from 3 pods to 1 pod using Average Utilization for aggregation
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [Serial] [Slow] ReplicaSet Should scale from 1 pod to 3 pods and then from 3 pods to 5 pods
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [Serial] [Slow] ReplicaSet Should scale from 5 pods to 3 pods and then from 3 pods to 1 pod
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [Serial] [Slow] ReplicaSet with idle sidecar (ContainerResource use case) Should not scale up on a busy sidecar with an idle application
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [Serial] [Slow] ReplicaSet with idle sidecar (ContainerResource use case) Should scale from 1 pod to 3 pods and then from 3 pods to 5 pods on a busy application with an idle sidecar container
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [Serial] [Slow] ReplicationController Should scale from 1 pod to 3 pods and then from 3 pods to 5 pods and verify decision stability
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [Serial] [Slow] ReplicationController Should scale from 5 pods to 3 pods and then from 3 pods to 1 pod and verify decision stability
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: Memory) [Serial] [Slow] Deployment (Container Resource) Should scale from 1 pod to 3 pods and then from 3 pods to 5 pods using Average Utilization for aggregation
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: Memory) [Serial] [Slow] Deployment (Container Resource) Should scale from 1 pod to 3 pods and then from 3 pods to 5 pods using Average Value for aggregation
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: Memory) [Serial] [Slow] Deployment (Pod Resource) Should scale from 1 pod to 3 pods and then from 3 pods to 5 pods using Average Utilization for aggregation
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: Memory) [Serial] [Slow] Deployment (Pod Resource) Should scale from 1 pod to 3 pods and then from 3 pods to 5 pods using Average Value for aggregation
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] [Serial] [Slow] Horizontal pod autoscaling (non-default behavior) with autoscaling disabled shouldn't scale down
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] [Serial] [Slow] Horizontal pod autoscaling (non-default behavior) with autoscaling disabled shouldn't scale up
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] [Serial] [Slow] Horizontal pod autoscaling (non-default behavior) with both scale up and down controls configured should keep recommendation within the range over two stabilization windows
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] [Serial] [Slow] Horizontal pod autoscaling (non-default behavior) with both scale up and down controls configured should keep recommendation within the range with stabilization window and pod limit rate
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] [Serial] [Slow] Horizontal pod autoscaling (non-default behavior) with long upscale stabilization window should scale up only after the stabilization period
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] [Serial] [Slow] Horizontal pod autoscaling (non-default behavior) with scale limited by number of Pods rate should scale down no more than given number of Pods per minute
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] [Serial] [Slow] Horizontal pod autoscaling (non-default behavior) with scale limited by number of Pods rate should scale up no more than given number of Pods per minute
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] [Serial] [Slow] Horizontal pod autoscaling (non-default behavior) with scale limited by percentage should scale down no more than given percentage of current Pods per minute
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] [Serial] [Slow] Horizontal pod autoscaling (non-default behavior) with scale limited by percentage should scale up no more than given percentage of current Pods per minute
Kubernetes e2e suite [It] [sig-autoscaling] [Feature:HPA] [Serial] [Slow] Horizontal pod autoscaling (non-default behavior) with short downscale stabilization window should scale down soon after the stabilization period
Kubernetes e2e suite [It] [sig-autoscaling] [HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) with Custom Metric of type Object from Stackdriver should scale down
Kubernetes e2e suite [It] [sig-autoscaling] [HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) with Custom Metric of type Object from Stackdriver should scale down to 0
Kubernetes e2e suite [It] [sig-autoscaling] [HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) with Custom Metric of type Pod from Stackdriver should scale down
Kubernetes e2e suite [It] [sig-autoscaling] [HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) with Custom Metric of type Pod from Stackdriver should scale down with Prometheus
Kubernetes e2e suite [It] [sig-autoscaling] [HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) with Custom Metric of type Pod from Stackdriver should scale up with two metrics
Kubernetes e2e suite [It] [sig-autoscaling] [HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) with External Metric from Stackdriver should scale down with target average value
Kubernetes e2e suite [It] [sig-autoscaling] [HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) with External Metric from Stackdriver should scale down with target value
Kubernetes e2e suite [It] [sig-autoscaling] [HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) with External Metric from Stackdriver should scale up with two metrics
Kubernetes e2e suite [It] [sig-autoscaling] [HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) with multiple metrics of different types should not scale down when one metric is missing (Container Resource and External Metrics)
Kubernetes e2e suite [It] [sig-autoscaling] [HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) with multiple metrics of different types should not scale down when one metric is missing (Pod and Object Metrics)
Kubernetes e2e suite [It] [sig-autoscaling] [HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) with multiple metrics of different types should scale up when one metric is missing (Pod and External metrics)
Kubernetes e2e suite [It] [sig-autoscaling] [HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) with multiple metrics of different types should scale up when one metric is missing (Resource and Object metrics)
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl taint [Serial] should remove all the taints with the same key off a node
Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl taint [Serial] should update the taint on a node
Kubernetes e2e suite [It] [sig-cloud-provider-gcp] Downgrade [Feature:Downgrade] cluster downgrade should maintain a functioning cluster [Feature:ClusterDowngrade]
Kubernetes e2e suite [It] [sig-cloud-provider-gcp] GKE node pools [Feature:GKENodePool] should create a cluster with multiple node pools [Feature:GKENodePool]
Kubernetes e2e suite [It] [sig-cloud-provider-gcp] HA-master [Feature:HAMaster] survive addition/removal replicas different zones [Serial][Disruptive]
Kubernetes e2e suite [It] [sig-cloud-provider-gcp] HA-master [Feature:HAMaster] survive addition/removal replicas multizone workers [Serial][Disruptive]
Kubernetes e2e suite [It] [sig-cloud-provider-gcp] HA-master [Feature:HAMaster] survive addition/removal replicas same zone [Serial][Disruptive]
Kubernetes e2e suite [It] [sig-cloud-provider-gcp] Nodes [Disruptive] Resize [Slow] should be able to add nodes
Kubernetes e2e suite [It] [sig-cloud-provider-gcp] Nodes [Disruptive] Resize [Slow] should be able to delete nodes
Kubernetes e2e suite [It] [sig-cloud-provider-gcp] Ports Security Check [Feature:KubeletSecurity] should not be able to proxy to cadvisor port 4194 using proxy subresource
Kubernetes e2e suite [It] [sig-cloud-provider-gcp] Ports Security Check [Feature:KubeletSecurity] should not be able to proxy to the readonly kubelet port 10255 using proxy subresource
Kubernetes e2e suite [It] [sig-cloud-provider-gcp] Ports Security Check [Feature:KubeletSecurity] should not have port 10255 open on its all public IP addresses
Kubernetes e2e suite [It] [sig-cloud-provider-gcp] Ports Security Check [Feature:KubeletSecurity] should not have port 4194 open on its all public IP addresses
Kubernetes e2e suite [It] [sig-cloud-provider-gcp] Reboot [Disruptive] [Feature:Reboot] each node by dropping all inbound packets for a while and ensure they function afterwards
Kubernetes e2e suite [It] [sig-cloud-provider-gcp] Reboot [Disruptive] [Feature:Reboot] each node by dropping all outbound packets for a while and ensure they function afterwards
Kubernetes e2e suite [It] [sig-cloud-provider-gcp] Reboot [Disruptive] [Feature:Reboot] each node by ordering clean reboot and ensure they function upon restart
Kubernetes e2e suite [It] [sig-cloud-provider-gcp] Reboot [Disruptive] [Feature:Reboot] each node by ordering unclean reboot and ensure they function upon restart
Kubernetes e2e suite [It] [sig-cloud-provider-gcp] Reboot [Disruptive] [Feature:Reboot] each node by switching off the network interface and ensure they function upon switch on
Kubernetes e2e suite [It] [sig-cloud-provider-gcp] Reboot [Disruptive] [Feature:Reboot] each node by triggering kernel panic and ensure they function upon restart
Kubernetes e2e suite [It] [sig-cloud-provider-gcp] Recreate [Feature:Recreate] recreate nodes and ensure they function upon restart
Kubernetes e2e suite [It] [sig-cloud-provider-gcp] Restart [Disruptive] should restart all nodes and ensure all nodes and pods recover
Kubernetes e2e suite [It] [sig-cloud-provider-gcp] Upgrade [Feature:Upgrade] cluster upgrade should maintain a functioning cluster [Feature:ClusterUpgrade]
Kubernetes e2e suite [It] [sig-cloud-provider-gcp] Upgrade [Feature:Upgrade] master upgrade should maintain a functioning cluster [Feature:MasterUpgrade]
Kubernetes e2e suite [It] [sig-cloud-provider-gcp] [Disruptive]NodeLease NodeLease deletion node lease should be deleted when corresponding node is deleted
Kubernetes e2e suite [It] [sig-cloud-provider] [Feature:CloudProvider][Disruptive] Nodes should be deleted on API server if it doesn't exist in the cloud provider
Kubernetes e2e suite [It] [sig-cluster-lifecycle] [Feature:BootstrapTokens] should delete the signed bootstrap tokens from clusterInfo ConfigMap when bootstrap token is deleted
Kubernetes e2e suite [It] [sig-cluster-lifecycle] [Feature:BootstrapTokens] should delete the token secret when the secret expired
Kubernetes e2e suite [It] [sig-cluster-lifecycle] [Feature:BootstrapTokens] should not delete the token secret when the secret is not expired
Kubernetes e2e suite [It] [sig-cluster-lifecycle] [Feature:BootstrapTokens] should resign the bootstrap tokens when the clusterInfo ConfigMap updated [Serial][Disruptive]
Kubernetes e2e suite [It] [sig-cluster-lifecycle] [Feature:BootstrapTokens] should sign the new added bootstrap tokens
Kubernetes e2e suite [It] [sig-instrumentation] Logging soak [Performance] [Slow] [Disruptive] should survive logging 1KB every 1s seconds, for a duration of 2m0s
Kubernetes e2e suite [It] [sig-instrumentation] Stackdriver Monitoring should have accelerator metrics [Feature:StackdriverAcceleratorMonitoring]
Kubernetes e2e suite [It] [sig-instrumentation] Stackdriver Monitoring should have cluster metrics [Feature:StackdriverMonitoring]
Kubernetes e2e suite [It] [sig-instrumentation] Stackdriver Monitoring should run Custom Metrics - Stackdriver Adapter for external metrics [Feature:StackdriverExternalMetrics]
Kubernetes e2e suite [It] [sig-instrumentation] Stackdriver Monitoring should run Custom Metrics - Stackdriver Adapter for new resource model [Feature:StackdriverCustomMetrics]
Kubernetes e2e suite [It] [sig-instrumentation] Stackdriver Monitoring should run Custom Metrics - Stackdriver Adapter for old resource model [Feature:StackdriverCustomMetrics]
Kubernetes e2e suite [It] [sig-instrumentation] Stackdriver Monitoring should run Stackdriver Metadata Agent [Feature:StackdriverMetadataAgent]
Kubernetes e2e suite [It] [sig-network] ClusterDns [Feature:Example] should create pod that uses dns
Kubernetes e2e suite [It] [sig-network] DNS configMap nameserver Change stubDomain should be able to change stubDomain configuration [Slow][Serial]
Kubernetes e2e suite [It] [sig-network] DNS configMap nameserver Forward PTR lookup should forward PTR records lookup to upstream nameserver [Slow][Serial]
Kubernetes e2e suite [It] [sig-network] DNS configMap nameserver Forward external name lookup should forward externalname lookup to upstream nameserver [Slow][Serial]
Kubernetes e2e suite [It] [sig-network] Firewall rule [Slow] [Serial] should create valid firewall rules for LoadBalancer type service
Kubernetes e2e suite [It] [sig-network] IngressClass [Feature:Ingress] should allow IngressClass to have Namespace-scoped parameters [Serial]
Kubernetes e2e suite [It] [sig-network] IngressClass [Feature:Ingress] should choose the one with the later CreationTimestamp, if equal the one with the lower name when two ingressClasses are marked as default[Serial]
Kubernetes e2e suite [It] [sig-network] IngressClass [Feature:Ingress] should not set default value if no default IngressClass [Serial]
Kubernetes e2e suite [It] [sig-network] IngressClass [Feature:Ingress] should set default value on new IngressClass [Serial]
Kubernetes e2e suite [It] [sig-network] LoadBalancers should not have connectivity disruption during rolling update with externalTrafficPolicy=Cluster [Slow]
Kubernetes e2e suite [It] [sig-network] LoadBalancers should not have connectivity disruption during rolling update with externalTrafficPolicy=Local [Slow]
Kubernetes e2e suite [It] [sig-network] LoadBalancers should reconcile LB health check interval [Slow][Serial][Disruptive]
Kubernetes e2e suite [It] [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:Ingress] should conform to Ingress spec
Kubernetes e2e suite [It] [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] rolling update backend pods should not cause service disruption
Kubernetes e2e suite [It] [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] should be able to create a ClusterIP service
Kubernetes e2e suite [It] [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] should be able to switch between IG and NEG modes
Kubernetes e2e suite [It] [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] should conform to Ingress spec
Kubernetes e2e suite [It] [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] should create NEGs for all ports with the Ingress annotation, and NEGs for the standalone annotation otherwise
Kubernetes e2e suite [It] [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] should sync endpoints for both Ingress-referenced NEG and standalone NEG
Kubernetes e2e suite [It] [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] should sync endpoints to NEG
Kubernetes e2e suite [It] [sig-network] Loadbalancing: L7 Scalability GCE [Slow] [Serial] [Feature:IngressScale] Creating and updating ingresses should happen promptly with small/medium/large amount of ingresses
Kubernetes e2e suite [It] [sig-network] Netpol API should support creating NetworkPolicy with Status subresource [Feature:Net