go run hack/e2e.go -v --test --test_args='--ginkgo.focus=E2eNode\sSuite\s\[It\]\s\[sig\-node\]\sMirrorPodWithGracePeriod\swhen\screate\sa\smirror\spod\s\sand\sthe\scontainer\sruntime\sis\stemporarily\sdown\sduring\spod\stermination\s\[NodeConformance\]\s\[Serial\]\s\[Disruptive\]\sthe\smirror\spod\sshould\sterminate\ssuccessfully$'
[FAILED] Timed out after 5.000s. Expected <string>: KubeletMetrics to match keys: { ."kubelet_desired_pods"[kubelet_desired_pods{static=""}]: Expected <string>: Sample to match fields: { .Value: Expected <model.SampleValue>: 1 to be == <int>: 0 } ."kubelet_working_pods"[kubelet_working_pods{config="desired", lifecycle="terminated", static=""}]: Expected <string>: Sample to match fields: { .Value: Expected <model.SampleValue>: 1 to be == <int>: 0 } } In [It] at: test/e2e_node/mirror_pod_grace_period_test.go:139 @ 03/21/23 13:45:36.561from junit_fedora01.xml
> Enter [BeforeEach] [sig-node] MirrorPodWithGracePeriod - set up framework | framework.go:191 @ 03/21/23 13:45:27.533 STEP: Creating a kubernetes client - test/e2e/framework/framework.go:211 @ 03/21/23 13:45:27.533 STEP: Building a namespace api object, basename mirror-pod-with-grace-period - test/e2e/framework/framework.go:250 @ 03/21/23 13:45:27.534 Mar 21 13:45:27.552: INFO: Skipping waiting for service account < Exit [BeforeEach] [sig-node] MirrorPodWithGracePeriod - set up framework | framework.go:191 @ 03/21/23 13:45:27.552 (18ms) > Enter [BeforeEach] [sig-node] MirrorPodWithGracePeriod - test/e2e/framework/metrics/init/init.go:33 @ 03/21/23 13:45:27.552 < Exit [BeforeEach] [sig-node] MirrorPodWithGracePeriod - test/e2e/framework/metrics/init/init.go:33 @ 03/21/23 13:45:27.552 (0s) > Enter [BeforeEach] when create a mirror pod - test/e2e_node/mirror_pod_grace_period_test.go:44 @ 03/21/23 13:45:27.552 STEP: create the static pod - test/e2e_node/mirror_pod_grace_period_test.go:51 @ 03/21/23 13:45:27.552 Mar 21 13:45:27.552: INFO: has written /tmp/node-e2e-20230321T133524/static-pods3648221698/mirror-pod-with-grace-period-5683-graceful-pod-c1d2abdd-189b-4f0a-9139-55f9fdc50204.yaml STEP: wait for the mirror pod to be running - test/e2e_node/mirror_pod_grace_period_test.go:55 @ 03/21/23 13:45:27.552 < Exit [BeforeEach] when create a mirror pod - test/e2e_node/mirror_pod_grace_period_test.go:44 @ 03/21/23 13:45:31.56 (4.009s) > Enter [It] the mirror pod should terminate successfully - test/e2e_node/mirror_pod_grace_period_test.go:137 @ 03/21/23 13:45:31.56 STEP: verifying the pod is described as syncing in metrics - test/e2e_node/mirror_pod_grace_period_test.go:138 @ 03/21/23 13:45:31.56 STEP: getting Kubelet metrics from the metrics API - test/e2e_node/cpu_manager_metrics_test.go:166 @ 03/21/23 13:45:31.561 STEP: getting Kubelet metrics from the metrics API - test/e2e_node/cpu_manager_metrics_test.go:166 @ 03/21/23 13:45:32.584 STEP: getting Kubelet metrics from the metrics API - test/e2e_node/cpu_manager_metrics_test.go:166 @ 03/21/23 13:45:33.624 STEP: getting Kubelet metrics from the metrics API - test/e2e_node/cpu_manager_metrics_test.go:166 @ 03/21/23 13:45:34.638 STEP: getting Kubelet metrics from the metrics API - test/e2e_node/cpu_manager_metrics_test.go:166 @ 03/21/23 13:45:35.656 [FAILED] Timed out after 5.000s. Expected <string>: KubeletMetrics to match keys: { ."kubelet_desired_pods"[kubelet_desired_pods{static=""}]: Expected <string>: Sample to match fields: { .Value: Expected <model.SampleValue>: 1 to be == <int>: 0 } ."kubelet_working_pods"[kubelet_working_pods{config="desired", lifecycle="terminated", static=""}]: Expected <string>: Sample to match fields: { .Value: Expected <model.SampleValue>: 1 to be == <int>: 0 } } In [It] at: test/e2e_node/mirror_pod_grace_period_test.go:139 @ 03/21/23 13:45:36.561 < Exit [It] the mirror pod should terminate successfully - test/e2e_node/mirror_pod_grace_period_test.go:137 @ 03/21/23 13:45:36.561 (5.001s) > Enter [AfterEach] and the container runtime is temporarily down during pod termination [NodeConformance] [Serial] [Disruptive] - test/e2e_node/mirror_pod_grace_period_test.go:289 @ 03/21/23 13:45:36.561 STEP: starting the container runtime - test/e2e_node/mirror_pod_grace_period_test.go:290 @ 03/21/23 13:45:36.561 STEP: waiting for the container runtime to start - test/e2e_node/mirror_pod_grace_period_test.go:293 @ 03/21/23 13:45:36.578 I0321 13:45:36.579082 2717 remote_runtime.go:74] "Connecting to runtime service" endpoint="unix:///var/run/crio/crio.sock" I0321 13:45:36.579330 2717 remote_runtime.go:119] "Validating the CRI v1 API runtime version" I0321 13:45:36.581627 2717 remote_runtime.go:126] "Validated CRI v1 runtime API" I0321 13:45:36.581856 2717 remote_image.go:47] "Connecting to image service" endpoint="unix:///var/run/crio/crio.sock" I0321 13:45:36.582083 2717 remote_image.go:91] "Validating the CRI v1 API image version" I0321 13:45:36.584950 2717 remote_image.go:98] "Validated CRI v1 image API" < Exit [AfterEach] and the container runtime is temporarily down during pod termination [NodeConformance] [Serial] [Disruptive] - test/e2e_node/mirror_pod_grace_period_test.go:289 @ 03/21/23 13:45:36.585 (23ms) > Enter [AfterEach] when create a mirror pod - test/e2e_node/mirror_pod_grace_period_test.go:304 @ 03/21/23 13:45:36.585 STEP: delete the static pod - test/e2e_node/mirror_pod_grace_period_test.go:305 @ 03/21/23 13:45:36.585 STEP: wait for the mirror pod to disappear - test/e2e_node/mirror_pod_grace_period_test.go:311 @ 03/21/23 13:45:36.585 < Exit [AfterEach] when create a mirror pod - test/e2e_node/mirror_pod_grace_period_test.go:304 @ 03/21/23 13:46:00.611 (24.027s) > Enter [AfterEach] [sig-node] MirrorPodWithGracePeriod - test/e2e/framework/node/init/init.go:33 @ 03/21/23 13:46:00.611 Mar 21 13:46:00.611: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready < Exit [AfterEach] [sig-node] MirrorPodWithGracePeriod - test/e2e/framework/node/init/init.go:33 @ 03/21/23 13:46:00.614 (2ms) > Enter [DeferCleanup (Each)] [sig-node] MirrorPodWithGracePeriod - test/e2e/framework/metrics/init/init.go:35 @ 03/21/23 13:46:00.614 < Exit [DeferCleanup (Each)] [sig-node] MirrorPodWithGracePeriod - test/e2e/framework/metrics/init/init.go:35 @ 03/21/23 13:46:00.614 (0s) > Enter [DeferCleanup (Each)] [sig-node] MirrorPodWithGracePeriod - dump namespaces | framework.go:209 @ 03/21/23 13:46:00.614 STEP: dump namespace information after failure - test/e2e/framework/framework.go:288 @ 03/21/23 13:46:00.614 STEP: Collecting events from namespace "mirror-pod-with-grace-period-5683". - test/e2e/framework/debug/dump.go:42 @ 03/21/23 13:46:00.614 STEP: Found 5 events. - test/e2e/framework/debug/dump.go:46 @ 03/21/23 13:46:00.616 Mar 21 13:46:00.616: INFO: At 2023-03-21 13:45:27 +0000 UTC - event for graceful-pod-c1d2abdd-189b-4f0a-9139-55f9fdc50204-n1-standard-2-fedora-coreos-37-20230218-3-0-gcp-x86-64-1939a42a: {kubelet n1-standard-2-fedora-coreos-37-20230218-3-0-gcp-x86-64-1939a42a} MissingClusterDNS: pod: "graceful-pod-c1d2abdd-189b-4f0a-9139-55f9fdc50204-n1-standard-2-fedora-coreos-37-20230218-3-0-gcp-x86-64-1939a42a_mirror-pod-with-grace-period-5683(b74e89f5c834b7909e3873377963f750)". kubelet does not have ClusterDNS IP configured and cannot create Pod using "ClusterFirst" policy. Falling back to "Default" policy. Mar 21 13:46:00.616: INFO: At 2023-03-21 13:45:28 +0000 UTC - event for graceful-pod-c1d2abdd-189b-4f0a-9139-55f9fdc50204-n1-standard-2-fedora-coreos-37-20230218-3-0-gcp-x86-64-1939a42a: {kubelet n1-standard-2-fedora-coreos-37-20230218-3-0-gcp-x86-64-1939a42a} Pulled: Container image "registry.k8s.io/e2e-test-images/busybox:1.29-4" already present on machine Mar 21 13:46:00.616: INFO: At 2023-03-21 13:45:28 +0000 UTC - event for graceful-pod-c1d2abdd-189b-4f0a-9139-55f9fdc50204-n1-standard-2-fedora-coreos-37-20230218-3-0-gcp-x86-64-1939a42a: {kubelet n1-standard-2-fedora-coreos-37-20230218-3-0-gcp-x86-64-1939a42a} Created: Created container m-test Mar 21 13:46:00.616: INFO: At 2023-03-21 13:45:28 +0000 UTC - event for graceful-pod-c1d2abdd-189b-4f0a-9139-55f9fdc50204-n1-standard-2-fedora-coreos-37-20230218-3-0-gcp-x86-64-1939a42a: {kubelet n1-standard-2-fedora-coreos-37-20230218-3-0-gcp-x86-64-1939a42a} Started: Started container m-test Mar 21 13:46:00.616: INFO: At 2023-03-21 13:45:36 +0000 UTC - event for graceful-pod-c1d2abdd-189b-4f0a-9139-55f9fdc50204-n1-standard-2-fedora-coreos-37-20230218-3-0-gcp-x86-64-1939a42a: {kubelet n1-standard-2-fedora-coreos-37-20230218-3-0-gcp-x86-64-1939a42a} Killing: Stopping container m-test Mar 21 13:46:00.617: INFO: POD NODE PHASE GRACE CONDITIONS Mar 21 13:46:00.617: INFO: Mar 21 13:46:00.619: INFO: Logging node info for node n1-standard-2-fedora-coreos-37-20230218-3-0-gcp-x86-64-1939a42a Mar 21 13:46:00.621: INFO: Node Info: &Node{ObjectMeta:{n1-standard-2-fedora-coreos-37-20230218-3-0-gcp-x86-64-1939a42a 8ed95a1b-946b-4ff4-94b4-cb21167d6828 714 0 2023-03-21 13:37:33 +0000 UTC <nil> <nil> map[beta.kubernetes.io/arch:amd64 beta.kubernetes.io/os:linux kubernetes.io/arch:amd64 kubernetes.io/hostname:n1-standard-2-fedora-coreos-37-20230218-3-0-gcp-x86-64-1939a42a kubernetes.io/os:linux] map[volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] [{kubelet Update v1 2023-03-21 13:37:33 +0000 UTC FieldsV1 {"f:metadata":{"f:annotations":{".":{},"f:volumes.kubernetes.io/controller-managed-attach-detach":{}},"f:labels":{".":{},"f:beta.kubernetes.io/arch":{},"f:beta.kubernetes.io/os":{},"f:kubernetes.io/arch":{},"f:kubernetes.io/hostname":{},"f:kubernetes.io/os":{}}}} } {kubelet Update v1 2023-03-21 13:45:26 +0000 UTC FieldsV1 {"f:status":{"f:allocatable":{"f:ephemeral-storage":{},"f:example.com/resource":{},"f:hugepages-2Mi":{},"f:memory":{}},"f:capacity":{"f:example.com/resource":{},"f:hugepages-2Mi":{}},"f:conditions":{"k:{\"type\":\"DiskPressure\"}":{"f:lastHeartbeatTime":{}},"k:{\"type\":\"MemoryPressure\"}":{"f:lastHeartbeatTime":{}},"k:{\"type\":\"PIDPressure\"}":{"f:lastHeartbeatTime":{}},"k:{\"type\":\"Ready\"}":{"f:lastHeartbeatTime":{},"f:lastTransitionTime":{},"f:message":{},"f:reason":{},"f:status":{}}},"f:images":{}}} status}]},Spec:NodeSpec{PodCIDR:,DoNotUseExternalID:,ProviderID:,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[],},Status:NodeStatus{Capacity:ResourceList{cpu: {{1 0} {<nil>} 1 DecimalSI},ephemeral-storage: {{20869787648 0} {<nil>} 20380652Ki BinarySI},example.com/resource: {{0 0} {<nil>} 0 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{7798284288 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{1 0} {<nil>} 1 DecimalSI},ephemeral-storage: {{18782808853 0} {<nil>} 18782808853 DecimalSI},example.com/resource: {{0 0} {<nil>} 0 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{7536140288 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2023-03-21 13:45:26 +0000 UTC,LastTransitionTime:2023-03-21 13:37:33 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2023-03-21 13:45:26 +0000 UTC,LastTransitionTime:2023-03-21 13:37:33 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2023-03-21 13:45:26 +0000 UTC,LastTransitionTime:2023-03-21 13:37:33 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2023-03-21 13:45:26 +0000 UTC,LastTransitionTime:2023-03-21 13:45:26 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.138.15.212,},NodeAddress{Type:Hostname,Address:n1-standard-2-fedora-coreos-37-20230218-3-0-gcp-x86-64-1939a42a,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:250c860c9eee22a043608670436c7b59,SystemUUID:250c860c-9eee-22a0-4360-8670436c7b59,BootID:8a31231b-b016-4164-9a8e-a94c17dd7c30,KernelVersion:6.1.11-200.fc37.x86_64,OSImage:Fedora CoreOS 37.20230218.3.0,ContainerRuntimeVersion:cri-o://1.26.0,KubeletVersion:v1.27.0-beta.0.29+c9ff2866682432,KubeProxyVersion:v1.27.0-beta.0.29+c9ff2866682432,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[registry.k8s.io/e2e-test-images/perl@sha256:c613344cdd31c5055961b078f831ef9d9199fc9111efe6e81bea3f00d78bd979 registry.k8s.io/e2e-test-images/perl@sha256:dd475f8a8c579cb78a13f54342e8569e7f925c8b0ba3a5599dbc55c97a4a76f1 registry.k8s.io/e2e-test-images/perl:5.26],SizeBytes:875791114,},ContainerImage{Names:[registry.k8s.io/e2e-test-images/node-perf/tf-wide-deep@sha256:91ab3b5ee22441c99370944e2e2cb32670db62db433611b4e3780bdee6a8e5a1 registry.k8s.io/e2e-test-images/node-perf/tf-wide-deep@sha256:d7e74e6555abe4b001aadddc248447b472ae35ccbb2c21ca0febace6c4c6d7bb registry.k8s.io/e2e-test-images/node-perf/tf-wide-deep:1.3],SizeBytes:559664987,},ContainerImage{Names:[registry.k8s.io/e2e-test-images/volume/gluster@sha256:033a12fe65438751690b519cebd4135a3485771086bcf437212b7b886bb7956c registry.k8s.io/e2e-test-images/volume/gluster@sha256:c52e01956fec2cf5968b87be8f06ae740ea5d208a3b41fa2c7970b13cc515be5 registry.k8s.io/e2e-test-images/volume/gluster:1.3],SizeBytes:352430719,},ContainerImage{Names:[registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83 registry.k8s.io/etcd@sha256:8ae03c7bbd43d5c301eea33a39ac5eda2964f826050cb2ccf3486f18917590c9 registry.k8s.io/etcd:3.5.7-0],SizeBytes:297083935,},ContainerImage{Names:[registry.k8s.io/e2e-test-images/volume/nfs@sha256:034f77d52166fcacb81d6a6db10a4e24644c241896822e6525925859fec09f47 registry.k8s.io/e2e-test-images/volume/nfs@sha256:3bda73f2428522b0e342af80a0b9679e8594c2126f2b3cca39ed787589741b9e registry.k8s.io/e2e-test-images/volume/nfs:1.3],SizeBytes:272589700,},ContainerImage{Names:[registry.k8s.io/e2e-test-images/agnhost@sha256:16bbf38c463a4223d8cfe4da12bc61010b082a79b4bb003e2d3ba3ece5dd5f9e registry.k8s.io/e2e-test-images/agnhost@sha256:da18b4806cfa370df04f9c3faa7d654a22a80467dc4cab92bd1b22b4abe4d5aa registry.k8s.io/e2e-test-images/agnhost:2.43],SizeBytes:129622797,},ContainerImage{Names:[docker.io/library/debian@sha256:6f1f698e20c8ae73b110eb614a2c6d13fbdb504bbbbcf2965c4d0b80b7bb7fb1 docker.io/library/debian@sha256:f81bf5a8b57d6aa1824e4edb9aea6bd5ef6240bcc7d86f303f197a2eb77c430f docker.io/library/debian:latest],SizeBytes:129335575,},ContainerImage{Names:[registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22 registry.k8s.io/e2e-test-images/httpd@sha256:21e720a020bf8d492b5dd2fe0f31a5205021176f505ecf35b10177f8bfd68980 registry.k8s.io/e2e-test-images/httpd:2.4.38-4],SizeBytes:128894228,},ContainerImage{Names:[registry.k8s.io/node-problem-detector/node-problem-detector@sha256:0ce71ef6d759425d22b10e65b439749fe5d13377a188e2fc060b731cdb4e6901 registry.k8s.io/node-problem-detector/node-problem-detector:v0.8.7],SizeBytes:115035523,},ContainerImage{Names:[registry.k8s.io/e2e-test-images/node-perf/npb-is@sha256:8285539c79625b192a5e33fc3d21edc1a7776fb9afe15fae3b5037a7a8020839 registry.k8s.io/e2e-test-images/node-perf/npb-is@sha256:f941079315f73b182b0f416134253ee87ab51162cbd2e9fcd31bbe726999a977 registry.k8s.io/e2e-test-images/node-perf/npb-is:1.2],SizeBytes:99663088,},ContainerImage{Names:[registry.k8s.io/e2e-test-images/node-perf/npb-ep@sha256:90b5cfc5451428aad4dd6af9960640f2506804d35aa05e83c11bf0a46ac318c8 registry.k8s.io/e2e-test-images/node-perf/npb-ep@sha256:a37ad3a2ccb2b8aa7ced0b7c884888d2cef953cfc9a158e3e8b914d52147091b registry.k8s.io/e2e-test-images/node-perf/npb-ep:1.2],SizeBytes:99661552,},ContainerImage{Names:[gcr.io/cadvisor/cadvisor@sha256:89e6137f068ded2e9a3a012ce71260b9afc57a19305842aa1074239841a539a7 gcr.io/cadvisor/cadvisor:v0.43.0],SizeBytes:87971088,},ContainerImage{Names:[registry.k8s.io/e2e-test-images/nonroot@sha256:dfa235c2d64c29405f40489cf631193b27bec6dcf13cfee9824e449f6ddac051 registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655 registry.k8s.io/e2e-test-images/nonroot:1.4],SizeBytes:43877486,},ContainerImage{Names:[registry.k8s.io/e2e-test-images/sample-device-plugin@sha256:3dd0413e5a78f1c2a6484f168ba3daf23ebb0b1141897237e9559db6c5f7101f registry.k8s.io/e2e-test-images/sample-device-plugin@sha256:e84f6ca27c51ddedf812637dd2bcf771ad69fdca1173e5690c372370d0f93c40 registry.k8s.io/e2e-test-images/sample-device-plugin:1.3],SizeBytes:41740418,},ContainerImage{Names:[docker.io/nfvpe/sriov-device-plugin@sha256:518499ed631ff84b43153b8f7624c1aaacb75a721038857509fe690abdf62ddb docker.io/nfvpe/sriov-device-plugin:v3.1],SizeBytes:25603453,},ContainerImage{Names:[registry.k8s.io/nvidia-gpu-device-plugin@sha256:4b036e8844920336fa48f36edeb7d4398f426d6a934ba022848deed2edbf09aa],SizeBytes:19251111,},ContainerImage{Names:[registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1 registry.k8s.io/e2e-test-images/nginx@sha256:c42b04e8cf71231fac5dbc833366f7ce2ae78ef8b9df4304fcb83edcd495f69f registry.k8s.io/e2e-test-images/nginx:1.14-4],SizeBytes:17244936,},ContainerImage{Names:[registry.k8s.io/e2e-test-images/ipc-utils@sha256:647d092bada3b46c449d875adf31d71c1dd29c244e9cca6a04fddf9d6bcac136 registry.k8s.io/e2e-test-images/ipc-utils@sha256:89fe5eb4c180571eb5c4e4179f1e9bc03497b1f50e45e4f720165617a603d737 registry.k8s.io/e2e-test-images/ipc-utils:1.3],SizeBytes:12251265,},ContainerImage{Names:[registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac registry.k8s.io/e2e-test-images/nonewprivs@sha256:f6b1c4aef11b116c2a065ea60ed071a8f205444f1897bed9aa2e98a5d78cbdae registry.k8s.io/e2e-test-images/nonewprivs:1.3],SizeBytes:7373984,},ContainerImage{Names:[registry.k8s.io/stress@sha256:f00aa1ddc963a3164aef741aab0fc05074ea96de6cd7e0d10077cf98dd72d594 registry.k8s.io/stress:v1],SizeBytes:5502584,},ContainerImage{Names:[registry.k8s.io/e2e-test-images/busybox@sha256:2e0f836850e09b8b7cc937681d6194537a09fbd5f6b9e08f4d646a85128e8937 registry.k8s.io/e2e-test-images/busybox@sha256:4cdffea536d503c58d7e087bab34a43e63a11dcfa4132b5a1b838885f08fb730 registry.k8s.io/e2e-test-images/busybox:1.29-4],SizeBytes:1374155,},ContainerImage{Names:[registry.k8s.io/busybox@sha256:4bdd623e848417d96127e16037743f0cd8b528c026e9175e22a84f639eca58ff],SizeBytes:1319178,},ContainerImage{Names:[registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097 registry.k8s.io/pause@sha256:8d4106c88ec0bd28001e34c975d65175d994072d65341f62a8ab0754b0fafe10 registry.k8s.io/pause:3.9],SizeBytes:750414,},ContainerImage{Names:[registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db registry.k8s.io/pause@sha256:c2280d2f5f56cf9c9a01bb64b2db4651e35efd6d62a54dcfc12049fe6449c5e4 registry.k8s.io/pause:3.6],SizeBytes:690326,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Mar 21 13:46:00.621: INFO: Logging kubelet events for node n1-standard-2-fedora-coreos-37-20230218-3-0-gcp-x86-64-1939a42a Mar 21 13:46:00.623: INFO: Logging pods the kubelet thinks is on node n1-standard-2-fedora-coreos-37-20230218-3-0-gcp-x86-64-1939a42a W0321 13:46:00.630597 2717 metrics_grabber.go:111] Can't find any pods in namespace kube-system to grab metrics from Mar 21 13:46:00.648: INFO: Latency metrics for node n1-standard-2-fedora-coreos-37-20230218-3-0-gcp-x86-64-1939a42a END STEP: dump namespace information after failure - test/e2e/framework/framework.go:288 @ 03/21/23 13:46:00.648 (35ms) < Exit [DeferCleanup (Each)] [sig-node] MirrorPodWithGracePeriod - dump namespaces | framework.go:209 @ 03/21/23 13:46:00.648 (35ms) > Enter [DeferCleanup (Each)] [sig-node] MirrorPodWithGracePeriod - tear down framework | framework.go:206 @ 03/21/23 13:46:00.648 STEP: Destroying namespace "mirror-pod-with-grace-period-5683" for this suite. - test/e2e/framework/framework.go:351 @ 03/21/23 13:46:00.648 < Exit [DeferCleanup (Each)] [sig-node] MirrorPodWithGracePeriod - tear down framework | framework.go:206 @ 03/21/23 13:46:00.651 (3ms)
Filter through log files | View test history on testgrid
error during go run /go/src/k8s.io/kubernetes/test/e2e_node/runner/remote/run_remote.go --cleanup -vmodule=*=4 --ssh-env=gce --results-dir=/workspace/_artifacts --project=k8s-infra-e2e-boskos-061 --zone=us-west1-b --ssh-user=core --ssh-key=/workspace/.ssh/google_compute_engine --ginkgo-flags=--nodes=1 --timeout=4h --focus="\[Serial\]" --skip="\[Flaky\]|\[Benchmark\]|\[NodeSpecialFeature:.+\]|\[NodeSpecialFeature\]|\[NodeAlphaFeature:.+\]|\[NodeAlphaFeature\]|\[NodeFeature:Eviction\]" --test_args=--container-runtime-endpoint=unix:///var/run/crio/crio.sock --container-runtime-process-name=/usr/local/bin/crio --container-runtime-pid-file= --kubelet-flags="--cgroup-driver=systemd --cgroups-per-qos=true --cgroup-root=/ --runtime-cgroups=/system.slice/crio.service --kubelet-cgroups=/system.slice/kubelet.service" --extra-log="{\"name\": \"crio.log\", \"journalctl\": [\"-u\", \"crio\"]}" --test-timeout=4h0m0s --image-config-file=/workspace/test-infra/jobs/e2e_node/crio/latest/image-config-cgrpv1-serial.yaml: exit status 1
from junit_runner.xml
Filter through log files | View test history on testgrid
E2eNode Suite [It] [sig-node] Container Manager Misc [Serial] Validate OOM score adjustments [NodeFeature:OOMScoreAdj] once the node is setup pod infra containers oom-score-adj should be -998 and best effort container's should be 1000
E2eNode Suite [It] [sig-node] Container Manager Misc [Serial] Validate OOM score adjustments [NodeFeature:OOMScoreAdj] once the node is setup Kubelet's oom-score-adj should be -999
E2eNode Suite [It] [sig-node] Container Manager Misc [Serial] Validate OOM score adjustments [NodeFeature:OOMScoreAdj] once the node is setup burstable container's oom-score-adj should be between [2, 1000)
E2eNode Suite [It] [sig-node] Container Manager Misc [Serial] Validate OOM score adjustments [NodeFeature:OOMScoreAdj] once the node is setup container runtime's oom-score-adj should be -999
E2eNode Suite [It] [sig-node] Container Manager Misc [Serial] Validate OOM score adjustments [NodeFeature:OOMScoreAdj] once the node is setup guaranteed container's oom-score-adj should be -998
E2eNode Suite [It] [sig-node] ContainerLogRotation [Slow] [Serial] [Disruptive] when a container generates a lot of log should be rotated and limited to a fixed amount of files
E2eNode Suite [It] [sig-node] Density [Serial] [Slow] create a batch of pods latency/resource should be within limit when create 10 pods with 0s interval
E2eNode Suite [It] [sig-node] Density [Serial] [Slow] create a sequence of pods latency/resource should be within limit when create 10 pods with 50 background pods
E2eNode Suite [It] [sig-node] Device Plugin [Feature:DevicePluginProbe][NodeFeature:DevicePluginProbe][Serial] DevicePlugin [Serial] [Disruptive] Can schedule a pod that requires a device
E2eNode Suite [It] [sig-node] Device Plugin [Feature:DevicePluginProbe][NodeFeature:DevicePluginProbe][Serial] DevicePlugin [Serial] [Disruptive] Keeps device plugin assignments across pod and kubelet restarts
E2eNode Suite [It] [sig-node] Device Plugin [Feature:DevicePluginProbe][NodeFeature:DevicePluginProbe][Serial] DevicePlugin [Serial] [Disruptive] Keeps device plugin assignments after the device plugin has been re-registered
E2eNode Suite [It] [sig-node] Downward API [Serial] [Disruptive] [NodeFeature:DownwardAPIHugePages] Downward API tests for hugepages should provide container's limits.hugepages-<pagesize> and requests.hugepages-<pagesize> as env vars
E2eNode Suite [It] [sig-node] Downward API [Serial] [Disruptive] [NodeFeature:DownwardAPIHugePages] Downward API tests for hugepages should provide default limits.hugepages-<pagesize> from node allocatable
E2eNode Suite [It] [sig-node] GarbageCollect [Serial][NodeFeature:GarbageCollect] Garbage Collection Test: Many Pods with Many Restarting Containers Should eventually garbage collect containers when we exceed the number of dead containers per container
E2eNode Suite [It] [sig-node] GarbageCollect [Serial][NodeFeature:GarbageCollect] Garbage Collection Test: Many Restarting Containers Should eventually garbage collect containers when we exceed the number of dead containers per container
E2eNode Suite [It] [sig-node] GarbageCollect [Serial][NodeFeature:GarbageCollect] Garbage Collection Test: One Non-restarting Container Should eventually garbage collect containers when we exceed the number of dead containers per container
E2eNode Suite [It] [sig-node] GracefulNodeShutdown [Serial] [NodeFeature:GracefulNodeShutdown] [NodeFeature:GracefulNodeShutdownBasedOnPodPriority] graceful node shutdown when PodDisruptionConditions are enabled [NodeFeature:PodDisruptionConditions] should add the DisruptionTarget pod failure condition to the evicted pods
E2eNode Suite [It] [sig-node] GracefulNodeShutdown [Serial] [NodeFeature:GracefulNodeShutdown] [NodeFeature:GracefulNodeShutdownBasedOnPodPriority] when gracefully shutting down after restart dbus, should be able to gracefully shutdown
E2eNode Suite [It] [sig-node] GracefulNodeShutdown [Serial] [NodeFeature:GracefulNodeShutdown] [NodeFeature:GracefulNodeShutdownBasedOnPodPriority] when gracefully shutting down should be able to gracefully shutdown pods with various grace periods
E2eNode Suite [It] [sig-node] GracefulNodeShutdown [Serial] [NodeFeature:GracefulNodeShutdown] [NodeFeature:GracefulNodeShutdownBasedOnPodPriority] when gracefully shutting down should be able to handle a cancelled shutdown
E2eNode Suite [It] [sig-node] GracefulNodeShutdown [Serial] [NodeFeature:GracefulNodeShutdown] [NodeFeature:GracefulNodeShutdownBasedOnPodPriority] when gracefully shutting down with Pod priority should be able to gracefully shutdown pods with various grace periods
E2eNode Suite [It] [sig-node] LocalStorageCapacityIsolationFSQuotaMonitoring [Slow] [Serial] [Disruptive] [Feature:LocalStorageCapacityIsolationQuota][NodeFeature:LSCIQuotaMonitoring] when we run containers that should cause use quotas for LSCI monitoring (quotas enabled: false) should eventually evict all of the correct pods
E2eNode Suite [It] [sig-node] LocalStorageCapacityIsolationFSQuotaMonitoring [Slow] [Serial] [Disruptive] [Feature:LocalStorageCapacityIsolationQuota][NodeFeature:LSCIQuotaMonitoring] when we run containers that should cause use quotas for LSCI monitoring (quotas enabled: true) should eventually evict all of the correct pods
E2eNode Suite [It] [sig-node] Memory Manager [Disruptive] [Serial] [Feature:MemoryManager] with none policy should not report any memory data during request to pod resources GetAllocatableResources
E2eNode Suite [It] [sig-node] Memory Manager [Disruptive] [Serial] [Feature:MemoryManager] with none policy should not report any memory data during request to pod resources List
E2eNode Suite [It] [sig-node] Memory Manager [Disruptive] [Serial] [Feature:MemoryManager] with none policy should succeed to start the pod
E2eNode Suite [It] [sig-node] Memory Manager [Disruptive] [Serial] [Feature:MemoryManager] with static policy should report memory data during request to pod resources GetAllocatableResources
E2eNode Suite [It] [sig-node] Memory Manager [Disruptive] [Serial] [Feature:MemoryManager] with static policy when guaranteed pod has init and app containers should succeed to start the pod
E2eNode Suite [It] [sig-node] Memory Manager [Disruptive] [Serial] [Feature:MemoryManager] with static policy when guaranteed pod has only app containers should succeed to start the pod
E2eNode Suite [It] [sig-node] Memory Manager [Disruptive] [Serial] [Feature:MemoryManager] with static policy when multiple guaranteed pods started should report memory data for each guaranteed pod and container during request to pod resources List
E2eNode Suite [It] [sig-node] Memory Manager [Disruptive] [Serial] [Feature:MemoryManager] with static policy when multiple guaranteed pods started should succeed to start all pods
E2eNode Suite [It] [sig-node] MirrorPod when recreating a static pod it should launch successfully even if it temporarily failed termination due to volume failing to unmount [NodeConformance] [Serial]
E2eNode Suite [It] [sig-node] NodeProblemDetector [NodeFeature:NodeProblemDetector] [Serial] SystemLogMonitor should generate node condition and events for corresponding errors
E2eNode Suite [It] [sig-node] OSArchLabelReconciliation [Serial] [Slow] [Disruptive] Kubelet should reconcile the OS and Arch labels when restarted
E2eNode Suite [It] [sig-node] OSArchLabelReconciliation [Serial] [Slow] [Disruptive] Kubelet should reconcile the OS and Arch labels when running
E2eNode Suite [It] [sig-node] POD Resources [Serial] [Feature:PodResources][NodeFeature:PodResources] when querying /metrics [NodeConformance] should report the values for the podresources metrics
E2eNode Suite [It] [sig-node] POD Resources [Serial] [Feature:PodResources][NodeFeature:PodResources] with the builtin rate limit values should hit throttling when calling podresources List in a tight loop
E2eNode Suite [It] [sig-node] POD Resources [Serial] [Feature:PodResources][NodeFeature:PodResources] without SRIOV devices in the system with CPU manager None policy should return the expected responses
E2eNode Suite [It] [sig-node] POD Resources [Serial] [Feature:PodResources][NodeFeature:PodResources] without SRIOV devices in the system with disabled KubeletPodResourcesGetAllocatable feature gate should return the expected error with the feature gate disabled
E2eNode Suite [It] [sig-node] Pod conditions managed by Kubelet including PodHasNetwork condition [Serial] [Feature:PodHasNetwork] a pod failing to mount volumes and with init containers should report just the scheduled condition set
E2eNode Suite [It] [sig-node] Pod conditions managed by Kubelet including PodHasNetwork condition [Serial] [Feature:PodHasNetwork] a pod failing to mount volumes and without init containers should report scheduled and initialized conditions set
E2eNode Suite [It] [sig-node] Pod conditions managed by Kubelet including PodHasNetwork condition [Serial] [Feature:PodHasNetwork] a pod with init containers should report all conditions set in expected order after the pod is up
E2eNode Suite [It] [sig-node] Pod conditions managed by Kubelet including PodHasNetwork condition [Serial] [Feature:PodHasNetwork] a pod without init containers should report all conditions set in expected order after the pod is up
E2eNode Suite [It] [sig-node] PodPidsLimit [Serial] With config updated with pids limits should set pids.max for Pod
E2eNode Suite [It] [sig-node] Resource-usage [Serial] [Slow] regular resource usage tracking resource tracking for 10 pods per node
E2eNode Suite [It] [sig-node] Restart [Serial] [Slow] [Disruptive] Container Runtime Network should recover from ip leak
E2eNode Suite [It] [sig-node] Restart [Serial] [Slow] [Disruptive] Dbus should continue to run pods after a restart
E2eNode Suite [It] [sig-node] Restart [Serial] [Slow] [Disruptive] Kubelet should correctly account for terminated pods after restart
E2eNode Suite [It] [sig-node] SeccompDefault [Serial] [Feature:SeccompDefault] [LinuxOnly] with SeccompDefault enabled should use the default seccomp profile when unspecified
E2eNode Suite [It] [sig-node] SeccompDefault [Serial] [Feature:SeccompDefault] [LinuxOnly] with SeccompDefault enabled should use unconfined when specified
E2eNode Suite [It] [sig-node] SystemNodeCriticalPod [Slow] [Serial] [Disruptive] [NodeFeature:SystemNodeCriticalPod] when create a system-node-critical pod should not be evicted upon DiskPressure
E2eNode Suite [It] [sig-node] Unknown Pods [Serial] [Disruptive] when creating a API pod the api pod should be terminated and cleaned up due to becoming a unknown pod due to being force deleted while kubelet is not running
E2eNode Suite [It] [sig-node] Unknown Pods [Serial] [Disruptive] when creating a mirror pod the static pod should be terminated and cleaned up due to becoming a unknown pod due to being force deleted while kubelet is not running
E2eNode Suite [It] [sig-storage] Downward API [Serial] [Disruptive] [Feature:EphemeralStorage] Downward API tests for local ephemeral storage should provide container's limits.ephemeral-storage and requests.ephemeral-storage as env vars
E2eNode Suite [It] [sig-storage] Downward API [Serial] [Disruptive] [Feature:EphemeralStorage] Downward API tests for local ephemeral storage should provide default limits.ephemeral-storage from node allocatable
E2eNode Suite [SynchronizedAfterSuite]
E2eNode Suite [SynchronizedBeforeSuite]
kubetest Deferred TearDown
kubetest DumpClusterLogs
kubetest GetDeployer
kubetest Prepare
kubetest TearDown
kubetest TearDown Previous
kubetest Timeout
kubetest Up
kubetest test setup
E2eNode Suite [It] [sig-network] Networking Granular Checks: Pods should function for intra-pod communication: http [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-network] Networking Granular Checks: Pods should function for intra-pod communication: sctp [LinuxOnly][Feature:SCTPConnectivity]
E2eNode Suite [It] [sig-network] Networking Granular Checks: Pods should function for intra-pod communication: udp [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-network] Networking Granular Checks: Pods should function for node-pod communication: http [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-network] Networking Granular Checks: Pods should function for node-pod communication: sctp [LinuxOnly][Feature:SCTPConnectivity]
E2eNode Suite [It] [sig-network] Networking Granular Checks: Pods should function for node-pod communication: udp [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] AppArmor [Feature:AppArmor][NodeFeature:AppArmor] when running without AppArmor should reject a pod with an AppArmor profile
E2eNode Suite [It] [sig-node] CPU Manager Metrics [Serial][Feature:CPUManager] when querying /metrics should not report any pinning failures when the cpumanager allocation is expected to succeed
E2eNode Suite [It] [sig-node] CPU Manager Metrics [Serial][Feature:CPUManager] when querying /metrics should report pinning failures when the cpumanager allocation is known to fail
E2eNode Suite [It] [sig-node] CPU Manager Metrics [Serial][Feature:CPUManager] when querying /metrics should report zero pinning counters after a fresh restart
E2eNode Suite [It] [sig-node] CPU Manager [Serial] [Feature:CPUManager] With kubeconfig updated with static CPU Manager policy run the CPU Manager tests should assign CPUs as expected based on the Pod spec
E2eNode Suite [It] [sig-node] CPU Manager [Serial] [Feature:CPUManager] With kubeconfig updated with static CPU Manager policy run the CPU Manager tests should assign CPUs as expected with enhanced policy based on strict SMT alignment
E2eNode Suite [It] [sig-node] Checkpoint Container [NodeFeature:CheckpointContainer] will checkpoint a container out of a pod
E2eNode Suite [It] [sig-node] ConfigMap should be consumable via environment variable [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] ConfigMap should be consumable via the environment [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] ConfigMap should fail to create ConfigMap with empty key [Conformance]
E2eNode Suite [It] [sig-node] ConfigMap should run through a ConfigMap lifecycle [Conformance]
E2eNode Suite [It] [sig-node] ConfigMap should update ConfigMap successfully
E2eNode Suite [It] [sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart exec hook properly [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart http hook properly [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart https hook properly [MinimumKubeletVersion:1.23] [NodeConformance]
E2eNode Suite [It] [sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop exec hook properly [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop http hook properly [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop https hook properly [MinimumKubeletVersion:1.23] [NodeConformance]
E2eNode Suite [It] [sig-node] Container Runtime Conformance Test container runtime conformance blackbox test when running a container with a new image should be able to pull from private registry with credential provider [NodeConformance]
E2eNode Suite [It] [sig-node] Container Runtime blackbox test on terminated container should report termination message as empty when pod succeeds and TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Container Runtime blackbox test on terminated container should report termination message from file when pod succeeds and TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Container Runtime blackbox test on terminated container should report termination message from log output if TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Container Runtime blackbox test on terminated container should report termination message if TerminationMessagePath is set [NodeConformance]
E2eNode Suite [It] [sig-node] Container Runtime blackbox test on terminated container should report termination message if TerminationMessagePath is set as non-root user and at a non-default path [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Container Runtime blackbox test when running a container with a new image should be able to pull from private registry with secret [NodeConformance]
E2eNode Suite [It] [sig-node] Container Runtime blackbox test when running a container with a new image should be able to pull image [NodeConformance]
E2eNode Suite [It] [sig-node] Container Runtime blackbox test when running a container with a new image should not be able to pull from private registry without secret [NodeConformance]
E2eNode Suite [It] [sig-node] Container Runtime blackbox test when running a container with a new image should not be able to pull image from invalid registry [NodeConformance]
E2eNode Suite [It] [sig-node] Container Runtime blackbox test when starting a container that exits should run with the expected status [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] ContainerLogPath [NodeConformance] Pod with a container printed log to stdout should print log to correct cri log path
E2eNode Suite [It] [sig-node] ContainerLogPath [NodeConformance] Pod with a container printed log to stdout should print log to correct log path
E2eNode Suite [It] [sig-node] Containers should be able to override the image's default arguments (container cmd) [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Containers should be able to override the image's default command (container entrypoint) [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Containers should be able to override the image's default command and arguments [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Containers should use the image defaults if command and args are blank [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] CriticalPod [Serial] [Disruptive] [NodeFeature:CriticalPod] when we need to admit a critical pod [Flaky] should be able to create and delete a critical pod
E2eNode Suite [It] [sig-node] Deleted pods handling [NodeConformance] Should transition to Failed phase a deleted pod if non-zero exit codes Restart policy Always
E2eNode Suite [It] [sig-node] Deleted pods handling [NodeConformance] Should transition to Failed phase a deleted pod if non-zero exit codes Restart policy Never
E2eNode Suite [It] [sig-node] Deleted pods handling [NodeConformance] Should transition to Failed phase a deleted pod if non-zero exit codes Restart policy OnFailure
E2eNode Suite [It] [sig-node] Deleted pods handling [NodeConformance] Should transition to Failed phase a pod which is deleted while pending
E2eNode Suite [It] [sig-node] Deleted pods handling [NodeConformance] Should transition to Succeeded phase a deleted pod when containers complete with 0 exit code Restart policy Always
E2eNode Suite [It] [sig-node] Deleted pods handling [NodeConformance] Should transition to Succeeded phase a deleted pod when containers complete with 0 exit code Restart policy Never
E2eNode Suite [It] [sig-node] Deleted pods handling [NodeConformance] Should transition to Succeeded phase a deleted pod when containers complete with 0 exit code Restart policy OnFailure
E2eNode Suite [It] [sig-node] Density [Serial] [Slow] create a batch of pods latency/resource should be within limit when create 10 pods with 0s interval [Benchmark][NodeSpecialFeature:Benchmark]
E2eNode Suite [It] [sig-node] Density [Serial] [Slow] create a batch of pods latency/resource should be within limit when create 10 pods with 100ms interval [Benchmark][NodeSpecialFeature:Benchmark]
E2eNode Suite [It] [sig-node] Density [Serial] [Slow] create a batch of pods latency/resource should be within limit when create 10 pods with 300ms interval [Benchmark][NodeSpecialFeature:Benchmark]
E2eNode Suite [It] [sig-node] Density [Serial] [Slow] create a batch of pods latency/resource should be within limit when create 35 pods with 0s interval [Benchmark][NodeSpecialFeature:Benchmark]
E2eNode Suite [It] [sig-node] Density [Serial] [Slow] create a batch of pods latency/resource should be within limit when create 35 pods with 100ms interval [Benchmark][NodeSpecialFeature:Benchmark]
E2eNode Suite [It] [sig-node] Density [Serial] [Slow] create a batch of pods latency/resource should be within limit when create 35 pods with 300ms interval [Benchmark][NodeSpecialFeature:Benchmark]
E2eNode Suite [It] [sig-node] Density [Serial] [Slow] create a batch of pods latency/resource should be within limit when create 90 pods with 0s interval [Benchmark][NodeSpecialFeature:Benchmark]
E2eNode Suite [It] [sig-node] Density [Serial] [Slow] create a batch of pods latency/resource should be within limit when create 90 pods with 100ms interval [Benchmark][NodeSpecialFeature:Benchmark]
E2eNode Suite [It] [sig-node] Density [Serial] [Slow] create a batch of pods latency/resource should be within limit when create 90 pods with 300ms interval [Benchmark][NodeSpecialFeature:Benchmark]
E2eNode Suite [It] [sig-node] Density [Serial] [Slow] create a batch of pods with higher API QPS latency/resource should be within limit when create 90 pods with 0s interval (QPS 60) [Benchmark][NodeSpecialFeature:Benchmark]
E2eNode Suite [It] [sig-node] Density [Serial] [Slow] create a batch of pods with higher API QPS latency/resource should be within limit when create 90 pods with 100ms interval (QPS 60) [Benchmark][NodeSpecialFeature:Benchmark]
E2eNode Suite [It] [sig-node] Density [Serial] [Slow] create a batch of pods with higher API QPS latency/resource should be within limit when create 90 pods with 300ms interval (QPS 60) [Benchmark][NodeSpecialFeature:Benchmark]
E2eNode Suite [It] [sig-node] Density [Serial] [Slow] create a sequence of pods latency/resource should be within limit when create 10 pods with 50 background pods [Benchmark][NodeSpeicalFeature:Benchmark]
E2eNode Suite [It] [sig-node] Density [Serial] [Slow] create a sequence of pods latency/resource should be within limit when create 30 pods with 50 background pods [Benchmark][NodeSpeicalFeature:Benchmark]
E2eNode Suite [It] [sig-node] Density [Serial] [Slow] create a sequence of pods latency/resource should be within limit when create 50 pods with 50 background pods [Benchmark][NodeSpeicalFeature:Benchmark]
E2eNode Suite [It] [sig-node] Device Manager [Serial] [Feature:DeviceManager][NodeFeature:DeviceManager] With SRIOV devices in the system should be able to recover V1 (aka pre-1.20) checkpoint data and reject pods before device re-registration
E2eNode Suite [It] [sig-node] Device Manager [Serial] [Feature:DeviceManager][NodeFeature:DeviceManager] With SRIOV devices in the system should be able to recover V1 (aka pre-1.20) checkpoint data and update topology info on device re-registration
E2eNode Suite [It] [sig-node] Downward API should provide container's limits.cpu/memory and requests.cpu/memory as env vars [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Downward API should provide default limits.cpu/memory from node allocatable [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Downward API should provide host IP and pod IP as an env var if pod uses host network [LinuxOnly]
E2eNode Suite [It] [sig-node] Downward API should provide host IP as an env var [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Downward API should provide pod UID as env vars [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Downward API should provide pod name, namespace and IP address as env vars [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Ephemeral Containers [NodeConformance] will start an ephemeral container in an existing pod [Conformance]
E2eNode Suite [It] [sig-node] Hostname of Pod [NodeConformance] a pod configured to set FQDN as hostname will remain in Pending state generating FailedCreatePodSandBox events when the FQDN is longer than 64 bytes
E2eNode Suite [It] [sig-node] Hostname of Pod [NodeConformance] a pod with subdomain field has FQDN, hostname is shortname
E2eNode Suite [It] [sig-node] Hostname of Pod [NodeConformance] a pod with subdomain field has FQDN, when setHostnameAsFQDN is set to true, the FQDN is set as hostname
E2eNode Suite [It] [sig-node] Hostname of Pod [NodeConformance] a pod without FQDN is not affected by SetHostnameAsFQDN field
E2eNode Suite [It] [sig-node] Hostname of Pod [NodeConformance] a pod without subdomain field does not have FQDN
E2eNode Suite [It] [sig-node] HugePages [Serial] [Feature:HugePages][NodeSpecialFeature:HugePages] should add resources for new huge page sizes on kubelet restart
E2eNode Suite [It] [sig-node] HugePages [Serial] [Feature:HugePages][NodeSpecialFeature:HugePages] should remove resources for huge page sizes no longer supported
E2eNode Suite [It] [sig-node] HugePages [Serial] [Feature:HugePages][NodeSpecialFeature:HugePages] when start the pod with the resources requests that contain multiple hugepages resources should set correct hugetlb mount and limit under the container cgroup
E2eNode Suite [It] [sig-node] HugePages [Serial] [Feature:HugePages][NodeSpecialFeature:HugePages] when start the pod with the resources requests that contain only one hugepages resource with the backward compatible API should set correct hugetlb mount and limit under the container cgroup
E2eNode Suite [It] [sig-node] HugePages [Serial] [Feature:HugePages][NodeSpecialFeature:HugePages] when start the pod with the resources requests that contain only one hugepages resource with the new API should set correct hugetlb mount and limit under the container cgroup
E2eNode Suite [It] [sig-node] ImageCredentialProvider [Feature:KubeletCredentialProviders] should be able to create pod with image credentials fetched from external credential provider
E2eNode Suite [It] [sig-node] ImageGCNoEviction [Slow] [Serial] [Disruptive][NodeFeature:Eviction] when we run containers that should cause DiskPressure should eventually evict all of the correct pods
E2eNode Suite [It] [sig-node] ImageID [NodeFeature: ImageID] should be set to the manifest digest (from RepoDigests) when available
E2eNode Suite [It] [sig-node] InitContainer [NodeConformance] should invoke init containers on a RestartAlways pod [Conformance]
E2eNode Suite [It] [sig-node] InitContainer [NodeConformance] should invoke init containers on a RestartNever pod [Conformance]
E2eNode Suite [It] [sig-node] InitContainer [NodeConformance] should not start app containers and fail the pod if init containers fail on a RestartNever pod [Conformance]
E2eNode Suite [It] [sig-node] InitContainer [NodeConformance] should not start app containers if init containers fail on a RestartAlways pod [Conformance]
E2eNode Suite [It] [sig-node] InodeEviction [Slow] [Serial] [Disruptive][NodeFeature:Eviction] when we run containers that should cause DiskPressure should eventually evict all of the correct pods
E2eNode Suite [It] [sig-node] Kubelet Cgroup Manager Pod containers [NodeConformance] On scheduling a BestEffort Pod Pod containers should have been created under the BestEffort cgroup
E2eNode Suite [It] [sig-node] Kubelet Cgroup Manager Pod containers [NodeConformance] On scheduling a Burstable Pod Pod containers should have been created under the Burstable cgroup
E2eNode Suite [It] [sig-node] Kubelet Cgroup Manager Pod containers [NodeConformance] On scheduling a Guaranteed Pod Pod containers should have been created under the cgroup-root
E2eNode Suite [It] [sig-node] Kubelet Cgroup Manager QOS containers On enabling QOS cgroup hierarchy Top level QoS containers should have been created [NodeConformance]
E2eNode Suite [It] [sig-node] Kubelet PodOverhead handling [LinuxOnly] PodOverhead cgroup accounting On running pod with PodOverhead defined Pod cgroup should be sum of overhead and resource limits
E2eNode Suite [It] [sig-node] Kubelet Volume Manager Volume Manager On termination of pod with memory backed volume should remove the volume from the node [NodeConformance]
E2eNode Suite [It] [sig-node] Kubelet when scheduling a busybox command in a pod should print the output to logs [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Kubelet when scheduling a busybox command that always fails in a pod should be possible to delete [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Kubelet when scheduling a busybox command that always fails in a pod should have an terminated reason [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Kubelet when scheduling a read only busybox container should not write to root filesystem [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Kubelet when scheduling an agnhost Pod with hostAliases should write entries to /etc/hosts [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] KubeletManagedEtcHosts should test kubelet managed /etc/hosts file [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Lease lease API should be available [Conformance]
E2eNode Suite [It] [sig-node] LocalStorageCapacityIsolationEviction [Slow] [Serial] [Disruptive] [Feature:LocalStorageCapacityIsolation][NodeFeature:Eviction] when we run containers that should cause evictions due to pod local storage violations should eventually evict all of the correct pods
E2eNode Suite [It] [sig-node] LocalStorageCapacityIsolationMemoryBackedVolumeEviction [Slow] [Serial] [Disruptive] [Feature:LocalStorageCapacityIsolation][NodeFeature:Eviction] when we run containers that should cause evictions due to pod local storage violations should eventually evict all of the correct pods
E2eNode Suite [It] [sig-node] LocalStorageEviction [Slow] [Serial] [Disruptive][NodeFeature:Eviction] when we run containers that should cause DiskPressure should eventually evict all of the correct pods
E2eNode Suite [It] [sig-node] LocalStorageSoftEviction [Slow] [Serial] [Disruptive][NodeFeature:Eviction] when we run containers that should cause DiskPressure should eventually evict all of the correct pods
E2eNode Suite [It] [sig-node] Lock contention [Slow] [Disruptive] [NodeSpecialFeature:LockContention] Kubelet should stop when the test acquires the lock on lock file and restart once the lock is released
E2eNode Suite [It] [sig-node] Memory Manager [Disruptive] [Serial] [Feature:MemoryManager] with static policy when guaranteed pod memory request is bigger than free memory on each NUMA node should be rejected
E2eNode Suite [It] [sig-node] MemoryAllocatableEviction [Slow] [Serial] [Disruptive][NodeFeature:Eviction] when we run containers that should cause MemoryPressure should eventually evict all of the correct pods
E2eNode Suite [It] [sig-node] MirrorPod when create a mirror pod should be recreated when mirror pod forcibly deleted [NodeConformance]
E2eNode Suite [It] [sig-node] MirrorPod when create a mirror pod should be recreated when mirror pod gracefully deleted [NodeConformance]
E2eNode Suite [It] [sig-node] MirrorPod when create a mirror pod should be updated when static pod updated [NodeConformance]
E2eNode Suite [It] [sig-node] MirrorPod when create a mirror pod without changes should successfully recreate when file is removed and recreated [NodeConformance]
E2eNode Suite [It] [sig-node] MirrorPodWithGracePeriod when create a mirror pod mirror pod termination should satisfy grace period when static pod is deleted [NodeConformance]
E2eNode Suite [It] [sig-node] MirrorPodWithGracePeriod when create a mirror pod mirror pod termination should satisfy grace period when static pod is updated [NodeConformance]
E2eNode Suite [It] [sig-node] MirrorPodWithGracePeriod when create a mirror pod should update a static pod when the static pod is updated multiple times during the graceful termination period [NodeConformance]
E2eNode Suite [It] [sig-node] Node Container Manager [Serial] Validate Node Allocatable [NodeFeature:NodeAllocatable] sets up the node and runs the test
E2eNode Suite [It] [sig-node] Node Performance Testing [Serial] [Slow] Run node performance testing with pre-defined workloads NAS parallel benchmark (NPB) suite - Embarrassingly Parallel (EP) workload
E2eNode Suite [It] [sig-node] Node Performance Testing [Serial] [Slow] Run node performance testing with pre-defined workloads NAS parallel benchmark (NPB) suite - Integer Sort (IS) workload
E2eNode Suite [It] [sig-node] Node Performance Testing [Serial] [Slow] Run node performance testing with pre-defined workloads TensorFlow workload
E2eNode Suite [It] [sig-node] NodeLease NodeLease should have OwnerReferences set
E2eNode Suite [It] [sig-node] NodeLease NodeLease the kubelet should create and update a lease in the kube-node-lease namespace
E2eNode Suite [It] [sig-node] NodeLease NodeLease the kubelet should report node status infrequently
E2eNode Suite [It] [sig-node] OOMKiller [LinuxOnly] [NodeConformance] The containers terminated by OOM killer should have the reason set to OOMKilled
E2eNode Suite [It] [sig-node] POD Resources [Serial] [Feature:PodResources][NodeFeature:PodResources] with SRIOV devices in the system with CPU manager None policy should return the expected responses
E2eNode Suite [It] [sig-node] POD Resources [Serial] [Feature:PodResources][NodeFeature:PodResources] with SRIOV devices in the system with CPU manager Static policy should return the expected responses
E2eNode Suite [It] [sig-node] POD Resources [Serial] [Feature:PodResources][NodeFeature:PodResources] with a topology-unaware device plugin, which reports resources w/o hardware topology with CPU manager Static policy should return proper podresources the same as before the restart of kubelet
E2eNode Suite [It] [sig-node] POD Resources [Serial] [Feature:PodResources][NodeFeature:PodResources] without SRIOV devices in the system with CPU manager Static policy should return the expected responses
E2eNode Suite [It] [sig-node] Pod conditions managed by Kubelet without PodHasNetwork condition a pod failing to mount volumes and with init containers should report just the scheduled condition set
E2eNode Suite [It] [sig-node] Pod conditions managed by Kubelet without PodHasNetwork condition a pod failing to mount volumes and without init containers should report scheduled and initialized conditions set
E2eNode Suite [It] [sig-node] Pod conditions managed by Kubelet without PodHasNetwork condition a pod with init containers should report all conditions set in expected order after the pod is up
E2eNode Suite [It] [sig-node] Pod conditions managed by Kubelet without PodHasNetwork condition a pod without init containers should report all conditions set in expected order after the pod is up
E2eNode Suite [It] [sig-node] PodOSRejection [NodeConformance] Kubelet should reject pod when the node OS doesn't match pod's OS
E2eNode Suite [It] [sig-node] PodTemplates should delete a collection of pod templates [Conformance]
E2eNode Suite [It] [sig-node] PodTemplates should replace a pod template [Conformance]
E2eNode Suite [It] [sig-node] PodTemplates should run the lifecycle of PodTemplates [Conformance]
E2eNode Suite [It] [sig-node] Pods should allow activeDeadlineSeconds to be updated [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Pods should be submitted and removed [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Pods should be updated [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Pods should cap back-off at MaxContainerBackOff [Slow][NodeConformance]
E2eNode Suite [It] [sig-node] Pods should contain environment variables for services [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Pods should delete a collection of pods [Conformance]
E2eNode Suite [It] [sig-node] Pods should get a host IP [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Pods should have their auto-restart back-off timer reset on image update [Slow][NodeConformance]
E2eNode Suite [It] [sig-node] Pods should patch a pod status [Conformance]
E2eNode Suite [It] [sig-node] Pods should run through the lifecycle of Pods and PodStatus [Conformance]
E2eNode Suite [It] [sig-node] Pods should support pod readiness gates [NodeConformance]
E2eNode Suite [It] [sig-node] Pods should support remote command execution over websockets [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Pods should support retrieving logs from the container over websockets [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] PriorityLocalStorageEvictionOrdering [Slow] [Serial] [Disruptive][NodeFeature:Eviction] when we run containers that should cause DiskPressure should eventually evict all of the correct pods
E2eNode Suite [It] [sig-node] PriorityMemoryEvictionOrdering [Slow] [Serial] [Disruptive][NodeFeature:Eviction] when we run containers that should cause MemoryPressure should eventually evict all of the correct pods
E2eNode Suite [It] [sig-node] PriorityPidEvictionOrdering [Slow] [Serial] [Disruptive][NodeFeature:Eviction] when we run containers that should cause PIDPressure should eventually evict all of the correct pods
E2eNode Suite [It] [sig-node] PriorityPidEvictionOrdering [Slow] [Serial] [Disruptive][NodeFeature:Eviction] when we run containers that should cause PIDPressure; PodDisruptionConditions enabled [NodeFeature:PodDisruptionConditions] should eventually evict all of the correct pods
E2eNode Suite [It] [sig-node] PrivilegedPod [NodeConformance] should enable privileged commands [LinuxOnly]
E2eNode Suite [It] [sig-node] Probing container should *not* be restarted by liveness probe because startup probe delays it
E2eNode Suite [It] [sig-node] Probing container should *not* be restarted with a /healthz http liveness probe [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Probing container should *not* be restarted with a GRPC liveness probe [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Probing container should *not* be restarted with a exec "cat /tmp/health" liveness probe [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Probing container should *not* be restarted with a non-local redirect http liveness probe
E2eNode Suite [It] [sig-node] Probing container should *not* be restarted with a tcp:8080 liveness probe [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Probing container should be ready immediately after startupProbe succeeds
E2eNode Suite [It] [sig-node] Probing container should be restarted by liveness probe after startup probe enables it
E2eNode Suite [It] [sig-node] Probing container should be restarted startup probe fails
E2eNode Suite [It] [sig-node] Probing container should be restarted with a /healthz http liveness probe [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Probing container should be restarted with a GRPC liveness probe [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Probing container should be restarted with a exec "cat /tmp/health" liveness probe [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Probing container should be restarted with a failing exec liveness probe that took longer than the timeout
E2eNode Suite [It] [sig-node] Probing container should be restarted with a local redirect http liveness probe
E2eNode Suite [It] [sig-node] Probing container should be restarted with an exec liveness probe with timeout [MinimumKubeletVersion:1.20] [NodeConformance]
E2eNode Suite [It] [sig-node] Probing container should have monotonically increasing restart count [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Probing container should mark readiness on pods to false and disable liveness probes while pod is in progress of terminating
E2eNode Suite [It] [sig-node] Probing container should mark readiness on pods to false while pod is in progress of terminating when a pod has a readiness probe
E2eNode Suite [It] [sig-node] Probing container should not be ready with an exec readiness probe timeout [MinimumKubeletVersion:1.20] [NodeConformance]
E2eNode Suite [It] [sig-node] Probing container should override timeoutGracePeriodSeconds when LivenessProbe field is set [Feature:ProbeTerminationGracePeriod]
E2eNode Suite [It] [sig-node] Probing container should override timeoutGracePeriodSeconds when StartupProbe field is set [Feature:ProbeTerminationGracePeriod]
E2eNode Suite [It] [sig-node] Probing container with readiness probe should not be ready before initial delay and never restart [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Probing container with readiness probe that fails should never be ready and never restart [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Resource-usage [Serial] [Slow] regular resource usage tracking resource tracking for 0 pods per node [Benchmark]
E2eNode Suite [It] [sig-node] Resource-usage [Serial] [Slow] regular resource usage tracking resource tracking for 10 pods per node [Benchmark]
E2eNode Suite [It] [sig-node] Resource-usage [Serial] [Slow] regular resource usage tracking resource tracking for 35 pods per node [Benchmark]
E2eNode Suite [It] [sig-node] Resource-usage [Serial] [Slow] regular resource usage tracking resource tracking for 90 pods per node [Benchmark]
E2eNode Suite [It] [sig-node] ResourceMetricsAPI [NodeFeature:ResourceMetrics] when querying /resource/metrics should report resource usage through the resource metrics api
E2eNode Suite [It] [sig-node] RuntimeClass should support RuntimeClasses API operations [Conformance]
E2eNode Suite [It] [sig-node] RuntimeClass should reject a Pod requesting a RuntimeClass with an unconfigured handler [NodeFeature:RuntimeHandler]
E2eNode Suite [It] [sig-node] RuntimeClass should reject a Pod requesting a deleted RuntimeClass [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] RuntimeClass should reject a Pod requesting a non-existent RuntimeClass [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] RuntimeClass should run a Pod requesting a RuntimeClass with a configured handler [NodeFeature:RuntimeHandler]
E2eNode Suite [It] [sig-node] RuntimeClass should schedule a Pod requesting a RuntimeClass and initialize its Overhead [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] RuntimeClass should schedule a Pod requesting a RuntimeClass without PodOverhead [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Secrets should be consumable from pods in env vars [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Secrets should be consumable via the environment [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Secrets should fail to create secret due to empty secret key [Conformance]
E2eNode Suite [It] [sig-node] Secrets should patch a secret [Conformance]
E2eNode Suite [It] [sig-node] Security Context When creating a container with runAsNonRoot should not run with an explicit root user ID [LinuxOnly]
E2eNode Suite [It] [sig-node] Security Context When creating a container with runAsNonRoot should not run without a specified user ID
E2eNode Suite [It] [sig-node] Security Context When creating a container with runAsNonRoot should run with an explicit non-root user ID [LinuxOnly]
E2eNode Suite [It] [sig-node] Security Context When creating a container with runAsNonRoot should run with an image specified user ID
E2eNode Suite [It] [sig-node] Security Context When creating a container with runAsUser should run the container with uid 0 [LinuxOnly] [NodeConformance]
E2eNode Suite [It] [sig-node] Security Context When creating a container with runAsUser should run the container with uid 65534 [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Security Context When creating a pod with HostUsers must create the user namespace if set to false [LinuxOnly] [Feature:UserNamespacesStatelessPodsSupport]
E2eNode Suite [It] [sig-node] Security Context When creating a pod with HostUsers must not create the user namespace if set to true [LinuxOnly] [Feature:UserNamespacesStatelessPodsSupport]
E2eNode Suite [It] [sig-node] Security Context When creating a pod with HostUsers should mount all volumes with proper permissions with hostUsers=false [LinuxOnly] [Feature:UserNamespacesStatelessPodsSupport]
E2eNode Suite [It] [sig-node] Security Context When creating a pod with HostUsers should set FSGroup to user inside the container with hostUsers=false [LinuxOnly] [Feature:UserNamespacesStatelessPodsSupport]
E2eNode Suite [It] [sig-node] Security Context When creating a pod with privileged should run the container as privileged when true [LinuxOnly] [NodeFeature:HostAccess]
E2eNode Suite [It] [sig-node] Security Context When creating a pod with privileged should run the container as unprivileged when false [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Security Context When creating a pod with readOnlyRootFilesystem should run the container with readonly rootfs when readOnlyRootFilesystem=true [LinuxOnly] [NodeConformance]
E2eNode Suite [It] [sig-node] Security Context When creating a pod with readOnlyRootFilesystem should run the container with writable rootfs when readOnlyRootFilesystem=false [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Security Context [NodeConformance][LinuxOnly] Container PID namespace sharing containers in pods using isolated PID namespaces should all receive PID 1
E2eNode Suite [It] [sig-node] Security Context [NodeConformance][LinuxOnly] Container PID namespace sharing processes in containers sharing a pod namespace should be able to see each other
E2eNode Suite [It] [sig-node] Security Context when creating a pod in the host IPC namespace should not show the shared memory ID in the non-hostIPC containers [NodeFeature:HostAccess]
E2eNode Suite [It] [sig-node] Security Context when creating a pod in the host IPC namespace should show the shared memory ID in the host IPC containers [NodeFeature:HostAccess]
E2eNode Suite [It] [sig-node] Security Context when creating a pod in the host PID namespace should not show its pid in the non-hostpid containers [NodeFeature:HostAccess]
E2eNode Suite [It] [sig-node] Security Context when creating a pod in the host PID namespace should show its pid in the host PID namespace [NodeFeature:HostAccess]
E2eNode Suite [It] [sig-node] Security Context when creating a pod in the host network namespace should listen on same port in the host network containers [NodeFeature:HostAccess]
E2eNode Suite [It] [sig-node] Security Context when creating a pod in the host network namespace shouldn't show the same port in the non-hostnetwork containers [NodeFeature:HostAccess]
E2eNode Suite [It] [sig-node] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when not explicitly set and uid != 0 [LinuxOnly] [NodeConformance]
E2eNode Suite [It] [sig-node] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when true [LinuxOnly] [NodeConformance]
E2eNode Suite [It] [sig-node] Security Context when creating containers with AllowPrivilegeEscalation should not allow privilege escalation when false [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Summary API [NodeConformance] when querying /stats/summary should report resource usage through the stats api
E2eNode Suite [It] [sig-node] Sysctls [LinuxOnly] [NodeConformance] should not launch unsafe, but not explicitly enabled sysctls on the node [MinimumKubeletVersion:1.21]
E2eNode Suite [It] [sig-node] Sysctls [LinuxOnly] [NodeConformance] should reject invalid sysctls [MinimumKubeletVersion:1.21] [Conformance]
E2eNode Suite [It] [sig-node] Sysctls [LinuxOnly] [NodeConformance] should support sysctls [MinimumKubeletVersion:1.21] [Conformance]
E2eNode Suite [It] [sig-node] Sysctls [LinuxOnly] [NodeConformance] should support sysctls with slashes as separator [MinimumKubeletVersion:1.23]
E2eNode Suite [It] [sig-node] Topology Manager Metrics [Serial][NodeFeature:TopologyManager] when querying /metrics should not report any admission failures when the topology manager alignment is expected to succeed
E2eNode Suite [It] [sig-node] Topology Manager Metrics [Serial][NodeFeature:TopologyManager] when querying /metrics should report admission failures when the topology manager alignment is known to fail
E2eNode Suite [It] [sig-node] Topology Manager Metrics [Serial][NodeFeature:TopologyManager] when querying /metrics should report zero admission counters after a fresh restart
E2eNode Suite [It] [sig-node] Topology Manager [Serial] [NodeFeature:TopologyManager] With kubeconfig updated to static CPU Manager policy run the Topology Manager tests run Topology Manager node alignment test suite
E2eNode Suite [It] [sig-node] Topology Manager [Serial] [NodeFeature:TopologyManager] With kubeconfig updated to static CPU Manager policy run the Topology Manager tests run Topology Manager policy test suite
E2eNode Suite [It] [sig-node] Topology Manager [Serial] [NodeFeature:TopologyManager] With kubeconfig updated to static CPU Manager policy run the Topology Manager tests run the Topology Manager pod scope alignment test suite
E2eNode Suite [It] [sig-node] Variable Expansion should allow composing env vars into new env vars [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Variable Expansion should allow substituting values in a container's args [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Variable Expansion should allow substituting values in a container's command [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-node] Variable Expansion should allow substituting values in a volume subpath [Conformance]
E2eNode Suite [It] [sig-node] Variable Expansion should fail substituting values in a volume subpath with absolute path [Slow] [Conformance]
E2eNode Suite [It] [sig-node] Variable Expansion should fail substituting values in a volume subpath with backticks [Slow] [Conformance]
E2eNode Suite [It] [sig-node] Variable Expansion should succeed in writing subpaths in container [Slow] [Conformance]
E2eNode Suite [It] [sig-node] Variable Expansion should verify that a failing subpath expansion can be modified during the lifecycle of a container [Slow] [Conformance]
E2eNode Suite [It] [sig-node] [Feature:StandaloneMode] when creating a static pod the pod should be running
E2eNode Suite [It] [sig-node] [NodeConformance] Containers Lifecycle should launch init container serially before a regular container
E2eNode Suite [It] [sig-node] [NodeConformance] Containers Lifecycle should not launch regular containers if an init container fails
E2eNode Suite [It] [sig-node] [NodeConformance] Containers Lifecycle should not launch second container before PostStart of the first container completed
E2eNode Suite [It] [sig-node] [NodeConformance] Containers Lifecycle should restart failing container when pod restartPolicy is Always
E2eNode Suite [It] [sig-node] [NodeConformance] Containers Lifecycle should run Init container to completion before call to PostStart of regular container
E2eNode Suite [It] [sig-storage] ConfigMap Should fail non-optional pod creation due to configMap object does not exist [Slow]
E2eNode Suite [It] [sig-storage] ConfigMap Should fail non-optional pod creation due to the key in the configMap object does not exist [Slow]
E2eNode Suite [It] [sig-storage] ConfigMap binary data should be reflected in volume [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] ConfigMap optional updates should be reflected in volume [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] ConfigMap should be consumable from pods in volume [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] ConfigMap should be consumable from pods in volume as non-root [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] ConfigMap should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]
E2eNode Suite [It] [sig-storage] ConfigMap should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeFeature:FSGroup]
E2eNode Suite [It] [sig-storage] ConfigMap should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] ConfigMap should be consumable from pods in volume with mappings [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] ConfigMap should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] ConfigMap should be consumable from pods in volume with mappings as non-root [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] ConfigMap should be consumable from pods in volume with mappings as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]
E2eNode Suite [It] [sig-storage] ConfigMap should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] ConfigMap should be immutable if `immutable` field is set [Conformance]
E2eNode Suite [It] [sig-storage] ConfigMap updates should be reflected in volume [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Downward API volume should provide container's cpu limit [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Downward API volume should provide container's cpu request [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Downward API volume should provide container's memory limit [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Downward API volume should provide container's memory request [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Downward API volume should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Downward API volume should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Downward API volume should provide podname as non-root with fsgroup [LinuxOnly] [NodeFeature:FSGroup]
E2eNode Suite [It] [sig-storage] Downward API volume should provide podname as non-root with fsgroup and defaultMode [LinuxOnly] [NodeFeature:FSGroup]
E2eNode Suite [It] [sig-storage] Downward API volume should provide podname only [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Downward API volume should set DefaultMode on files [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Downward API volume should set mode on item file [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Downward API volume should update annotations on modification [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Downward API volume should update labels on modification [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] EmptyDir volumes pod should support memory backed volumes of specified size
E2eNode Suite [It] [sig-storage] EmptyDir volumes pod should support shared volumes between containers [Conformance]
E2eNode Suite [It] [sig-storage] EmptyDir volumes should support (non-root,0644,default) [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] EmptyDir volumes should support (non-root,0644,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] EmptyDir volumes should support (non-root,0666,default) [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] EmptyDir volumes should support (non-root,0666,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] EmptyDir volumes should support (non-root,0777,default) [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] EmptyDir volumes should support (non-root,0777,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] EmptyDir volumes should support (root,0644,default) [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] EmptyDir volumes should support (root,0644,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] EmptyDir volumes should support (root,0666,default) [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] EmptyDir volumes should support (root,0666,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] EmptyDir volumes should support (root,0777,default) [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] EmptyDir volumes should support (root,0777,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] EmptyDir volumes volume on default medium should have the correct mode [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] EmptyDir volumes volume on tmpfs should have the correct mode [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] files with FSGroup ownership should support (root,0644,tmpfs)
E2eNode Suite [It] [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] new files should be created with FSGroup ownership when container is non-root
E2eNode Suite [It] [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] new files should be created with FSGroup ownership when container is root
E2eNode Suite [It] [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] nonexistent volume subPath should have the correct mode and owner using FSGroup
E2eNode Suite [It] [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] volume on default medium should have the correct mode using FSGroup
E2eNode Suite [It] [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] volume on tmpfs should have the correct mode using FSGroup
E2eNode Suite [It] [sig-storage] HostPath should give a volume the correct mode [LinuxOnly] [NodeConformance]
E2eNode Suite [It] [sig-storage] HostPath should support r/w [NodeConformance]
E2eNode Suite [It] [sig-storage] HostPath should support subPath [NodeConformance]
E2eNode Suite [It] [sig-storage] Projected combined should project all components that make up the projection API [Projection][NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected configMap Should fail non-optional pod creation due to configMap object does not exist [Slow]
E2eNode Suite [It] [sig-storage] Projected configMap Should fail non-optional pod creation due to the key in the configMap object does not exist [Slow]
E2eNode Suite [It] [sig-storage] Projected configMap optional updates should be reflected in volume [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected configMap should be consumable from pods in volume [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected configMap should be consumable from pods in volume as non-root [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected configMap should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]
E2eNode Suite [It] [sig-storage] Projected configMap should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeFeature:FSGroup]
E2eNode Suite [It] [sig-storage] Projected configMap should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected configMap should be consumable from pods in volume with mappings [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected configMap should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected configMap should be consumable from pods in volume with mappings as non-root [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected configMap should be consumable from pods in volume with mappings as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]
E2eNode Suite [It] [sig-storage] Projected configMap should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected configMap updates should be reflected in volume [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected downwardAPI should provide container's cpu limit [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected downwardAPI should provide container's cpu request [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected downwardAPI should provide container's memory limit [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected downwardAPI should provide container's memory request [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected downwardAPI should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected downwardAPI should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected downwardAPI should provide podname as non-root with fsgroup [LinuxOnly] [NodeFeature:FSGroup]
E2eNode Suite [It] [sig-storage] Projected downwardAPI should provide podname as non-root with fsgroup and defaultMode [LinuxOnly] [NodeFeature:FSGroup]
E2eNode Suite [It] [sig-storage] Projected downwardAPI should provide podname only [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected downwardAPI should set DefaultMode on files [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected downwardAPI should set mode on item file [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected downwardAPI should update annotations on modification [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected downwardAPI should update labels on modification [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected secret Should fail non-optional pod creation due to secret object does not exist [Slow]
E2eNode Suite [It] [sig-storage] Projected secret Should fail non-optional pod creation due to the key in the secret object does not exist [Slow]
E2eNode Suite [It] [sig-storage] Projected secret optional updates should be reflected in volume [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected secret should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance]
E2eNode Suite [It] [sig-storage] Projected secret should be consumable from pods in volume [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected secret should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected secret should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected secret should be consumable from pods in volume with mappings [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected secret should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Projected secret should be consumable in multiple volumes in a pod [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Secrets Should fail non-optional pod creation due to secret object does not exist [Slow]
E2eNode Suite [It] [sig-storage] Secrets Should fail non-optional pod creation due to the key in the secret object does not exist [Slow]
E2eNode Suite [It] [sig-storage] Secrets optional updates should be reflected in volume [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Secrets should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Secrets should be consumable from pods in volume [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Secrets should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Secrets should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Secrets should be consumable from pods in volume with mappings [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Secrets should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Secrets should be consumable in multiple volumes in a pod [NodeConformance] [Conformance]
E2eNode Suite [It] [sig-storage] Secrets should be immutable if `immutable` field is set [Conformance]
E2eNode Suite [It] [sig-storage] Volumes NFSv3 should be mountable for NFSv3
E2eNode Suite [It] [sig-storage] Volumes NFSv4 should be mountable for NFSv4