This job view page is being replaced by Spyglass soon. Check out the new job view.
PRsarveshr7: Enhance NodeIPAM to support multiple ClusterCIDRs
ResultFAILURE
Tests 7 failed / 24 succeeded
Started2022-08-03 02:18
Elapsed2h1m
Revision
Builder8f8b8c00-12d2-11ed-b7e1-76974c431cda
Refs master:cb41d500
109090:40b0bc93
infra-commitb8beefbe3
job-versionv1.25.0-alpha.3.486+504585e726c3e3
kubetest-version
repok8s.io/kubernetes
repo-commit504585e726c3e3e9c66df7cd59118e7c81ff41f4
repos{u'k8s.io/kubernetes': u'master:cb41d5002ccde5f457989f157dd9e047e5bacdb6,109090:40b0bc9353780e5e393fe48cbf81805a85e88c2b'}
revisionv1.25.0-alpha.3.486+504585e726c3e3

Test Failures


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny custom resource creation, update and deletion [Conformance] 47s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sbe\sable\sto\sdeny\scustom\sresource\screation\,\supdate\sand\sdeletion\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:1731
k8s.io/kubernetes/test/e2e/apimachinery.registerWebhookForCustomResource(0xc00089ac60, {0xc0030504e0, 0xb}, 0xc000c7a190, 0xc0030cf540, 0x20fb?)
	test/e2e/apimachinery/webhook.go:1731 +0x871
k8s.io/kubernetes/test/e2e/apimachinery.glob..func27.6()
	test/e2e/apimachinery/webhook.go:226 +0xad
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl describe should check if kubectl describe prints relevant information for rc and pods [Conformance] 5.14s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-cli\]\sKubectl\sclient\sKubectl\sdescribe\sshould\scheck\sif\skubectl\sdescribe\sprints\srelevant\sinformation\sfor\src\sand\spods\s\s\[Conformance\]$'
test/e2e/kubectl/kubectl.go:1301
k8s.io/kubernetes/test/e2e/kubectl.glob..func1.19.1.1({{{0x0, 0x0}, {0x0, 0x0}}, {{0xc0030d6720, 0x15}, {0xc001fccf50, 0x10}, {0xc001fccf60, 0xc}, ...}, ...})
	test/e2e/kubectl/kubectl.go:1301 +0x565
k8s.io/kubernetes/test/e2e/framework.(*ClusterVerification).ForEach(0x10?, 0xc00107c5d0)
	test/e2e/framework/framework.go:816 +0x202
k8s.io/kubernetes/test/e2e/kubectl.glob..func1.2(0x1?)
	test/e2e/kubectl/kubectl.go:268 +0x2c
k8s.io/kubernetes/test/e2e/kubectl.glob..func1.19.1()
	test/e2e/kubectl/kubectl.go:1285 +0x284
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-node] Probing container should *not* be restarted with a exec "cat /tmp/health" liveness probe [NodeConformance] [Conformance] 4m4s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-node\]\sProbing\scontainer\sshould\s\*not\*\sbe\srestarted\swith\sa\sexec\s\"cat\s\/tmp\/health\"\sliveness\sprobe\s\[NodeConformance\]\s\[Conformance\]$'
test/e2e/common/node/container_probe.go:157
k8s.io/kubernetes/test/e2e/common/node.glob..func2.5()
	test/e2e/common/node/container_probe.go:157 +0x165
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-node] Secrets should be consumable via the environment [NodeConformance] [Conformance] 6.10s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-node\]\sSecrets\sshould\sbe\sconsumable\svia\sthe\senvironment\s\[NodeConformance\]\s\[Conformance\]$'
test/e2e/framework/util.go:770
k8s.io/kubernetes/test/e2e/framework.(*Framework).testContainerOutputMatcher(0x732246e?, {0x733f905?, 0xc001873ef8?}, 0xc00151c800, 0x0, {0xc001873f28, 0x6, 0x6}, 0x0?)
	test/e2e/framework/util.go:770 +0x176
k8s.io/kubernetes/test/e2e/framework.(*Framework).TestContainerOutput(...)
	test/e2e/framework/framework.go:581
k8s.io/kubernetes/test/e2e/common/node.glob..func20.2()
	test/e2e/common/node/secrets.go:128 +0x9eb
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-node] Security Context When creating a pod with privileged should run the container as unprivileged when false [LinuxOnly] [NodeConformance] [Conformance] 6.11s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-node\]\sSecurity\sContext\sWhen\screating\sa\spod\swith\sprivileged\sshould\srun\sthe\scontainer\sas\sunprivileged\swhen\sfalse\s\[LinuxOnly\]\s\[NodeConformance\]\s\[Conformance\]$'
test/e2e/framework/pods.go:240
k8s.io/kubernetes/test/e2e/framework.(*PodClient).WaitForSuccess(0xc000ab3758?, {0xc001687a00, 0x3d}, 0x2e?)
	test/e2e/framework/pods.go:240 +0x1f1
k8s.io/kubernetes/test/e2e/common/node.glob..func21.5.2(0x0)
	test/e2e/common/node/security_context.go:262 +0x172
k8s.io/kubernetes/test/e2e/common/node.glob..func21.5.3()
	test/e2e/common/node/security_context.go:272 +0x3a
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


kubetest Test 1h24m

error during ./hack/ginkgo-e2e.sh --ginkgo.focus=\[Conformance\] --ginkgo.skip=Serial|should.have.at.least.two.untainted --report-dir=/workspace/_artifacts --disable-log-dump=true (interrupted): exit status 1
				from junit_runner.xml

Filter through log files | View test history on testgrid


kubetest Timeout 2h0m

kubetest --timeout triggered
				from junit_runner.xml

Filter through log files | View test history on testgrid


Show 24 Passed Tests

Show 7045 Skipped Tests