This job view page is being replaced by Spyglass soon. Check out the new job view.
PRsmarterclayton: Prevent pods from defaulting to zero second grace periods
ResultFAILURE
Tests 3 failed / 463 succeeded
Started2021-07-13 14:50
Elapsed1h36m
Revisionc2c00459146d1d5b5e6a06998b4b107badaaf887
Refs 102025
job-versionv1.22.0-beta.1.157+73d345364ea258
kubetest-version
master_os_imageubuntu-2004-focal-v20200423
node_os_imageubuntu-2004-focal-v20200423
revisionv1.22.0-beta.1.157+73d345364ea258

Test Failures


Kubernetes e2e suite [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] 1m12s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-network\]\sNetpol\sNetworkPolicy\sbetween\sserver\sand\sclient\sshould\sallow\singress\saccess\son\sone\snamed\sport\s\[Feature\:NetworkPolicy\]$'
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/network/netpol/network_policy.go:124
Jul 13 15:58:05.885: unable to initialize resources
Unexpected error:
    <*fmt.wrapError | 0xc00330a220>: {
        msg: "unable to wait for pod netpol-7807-x/c: pod ran to completion",
        err: {
            s: "pod ran to completion",
        },
    }
    unable to wait for pod netpol-7807-x/c: pod ran to completion
occurred
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/network/netpol/network_policy.go:1373
				
				Click to see stdout/stderrfrom junit_13.xml

Find netpol-7807-x/c mentions in log files | View test history on testgrid


Kubernetes e2e suite [sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should allow ingress access from updated namespace [Feature:NetworkPolicy] 1m19s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-network\]\sNetworkPolicyLegacy\s\[LinuxOnly\]\sNetworkPolicy\sbetween\sserver\sand\sclient\sshould\sallow\singress\saccess\sfrom\supdated\snamespace\s\[Feature\:NetworkPolicy\]$'
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/network/netpol/network_legacy.go:830
Jul 13 15:37:48.337: Pod client-a-8tdzw should not be able to connect to service svc-server, but was able to connect.
Pod logs:


 Current NetworkPolicies:
	[{{ } {allow-ns-b-via-namespace-selector  network-policy-9286  99aed5cf-a8a1-4e4b-8e6f-90e94e58c620 15018 1 2021-07-13 15:37:44 +0000 UTC <nil> <nil> map[] map[] [] []  [{e2e.test Update networking.k8s.io/v1 2021-07-13 15:37:44 +0000 UTC FieldsV1 {"f:spec":{"f:ingress":{},"f:podSelector":{},"f:policyTypes":{}}} }]} {{map[pod-name:server] []} [{[] [{nil &LabelSelector{MatchLabels:map[string]string{ns-name: network-policy-b-updated,},MatchExpressions:[]LabelSelectorRequirement{},} nil}]}] [] [Ingress]}}]

 Pods:
	 [Pod: server-n5dbc, Status: &PodStatus{Phase:Running,Conditions:[]PodCondition{PodCondition{Type:Initialized,Status:True,LastProbeTime:0001-01-01 00:00:00 +0000 UTC,LastTransitionTime:2021-07-13 15:36:53 +0000 UTC,Reason:,Message:,},PodCondition{Type:Ready,Status:True,LastProbeTime:0001-01-01 00:00:00 +0000 UTC,LastTransitionTime:2021-07-13 15:37:38 +0000 UTC,Reason:,Message:,},PodCondition{Type:ContainersReady,Status:True,LastProbeTime:0001-01-01 00:00:00 +0000 UTC,LastTransitionTime:2021-07-13 15:37:38 +0000 UTC,Reason:,Message:,},PodCondition{Type:PodScheduled,Status:True,LastProbeTime:0001-01-01 00:00:00 +0000 UTC,LastTransitionTime:2021-07-13 15:36:53 +0000 UTC,Reason:,Message:,},},Message:,Reason:,HostIP:10.40.0.3,PodIP:10.64.2.220,StartTime:2021-07-13 15:36:53 +0000 UTC,ContainerStatuses:[]ContainerStatus{ContainerStatus{Name:server-container-80,State:ContainerState{Waiting:nil,Running:&ContainerStateRunning{StartedAt:2021-07-13 15:37:16 +0000 UTC,},Terminated:nil,},LastTerminationState:ContainerState{Waiting:nil,Running:nil,Terminated:nil,},Ready:true,RestartCount:0,Image:k8s.gcr.io/e2e-test-images/agnhost:2.32,ImageID:k8s.gcr.io/e2e-test-images/agnhost@sha256:758db666ac7028534dba72e7e9bb1e57bb81b8196f976f7a5cc351ef8b3529e1,ContainerID:containerd://85f7c8fd63475ab584bcaa3cfee2aabf8184c428d2b3731eb3ef92b01c533e66,Started:*true,},ContainerStatus{Name:server-container-81,State:ContainerState{Waiting:nil,Running:&ContainerStateRunning{StartedAt:2021-07-13 15:37:23 +0000 UTC,},Terminated:nil,},LastTerminationState:ContainerState{Waiting:nil,Running:nil,Terminated:nil,},Ready:true,RestartCount:0,Image:k8s.gcr.io/e2e-test-images/agnhost:2.32,ImageID:k8s.gcr.io/e2e-test-images/agnhost@sha256:758db666ac7028534dba72e7e9bb1e57bb81b8196f976f7a5cc351ef8b3529e1,ContainerID:containerd://459dc5cb7158a586256eaa7ba52efa5caa87bd9418d31129dbfffd765e672d6e,Started:*true,},},QOSClass:BestEffort,InitContainerStatuses:[]ContainerStatus{},NominatedNodeName:,PodIPs:[]PodIP{PodIP{IP:10.64.2.220,},},EphemeralContainerStatuses:[]ContainerStatus{},}
]


/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/network/netpol/network_legacy.go:1921
				
				Click to see stdout/stderrfrom junit_06.xml

Filter through log files | View test history on testgrid


kubetest Test 59m18s

error during ./hack/ginkgo-e2e.sh --ginkgo.focus=\[sig-network\]|\[Conformance\]|\[Feature:NetworkPolicy\]|\[Feature:NetworkPolicyEndPort\] --ginkgo.skip=\[Feature:(Networking-IPv6|Example|Federation|PerformanceDNS|KubeProxyDaemonSetMigration|SCTP)\]|DualStack|GCE|Disruptive|Serial|SNAT|LoadBalancer|ESIPP --report-dir=/logs/artifacts --disable-log-dump=true --cluster-ip-range=10.64.0.0/14: exit status 1
				from junit_runner.xml

Filter through log files | View test history on testgrid


Show 463 Passed Tests

Show 5982 Skipped Tests