Recent runs || View in Spyglass
PR | fromanirh: e2e: node: re-enable the device plugin tests |
Result | FAILURE |
Tests | 2 failed / 40 succeeded |
Started | |
Elapsed | 44m53s |
Revision | |
Builder | 42121be0-d360-11ec-9362-4694d2cb70a3 |
Refs |
master:28ab02df 109820:0451ef31 |
infra-commit | 9d9cb80a4 |
job-version | v1.25.0-alpha.0.505+b62ca910f126d9 |
kubetest-version | |
repo | k8s.io/kubernetes |
repo-commit | b62ca910f126d94c11ef90071fa7d05afeae331c |
repos | {u'k8s.io/kubernetes': u'master:28ab02df19148f8b07e40df7eadbb615672640af,109820:0451ef31b6e46d5f4a597ffff8eb0fe18cf6ba88'} |
revision | v1.25.0-alpha.0.505+b62ca910f126d9 |
go run hack/e2e.go -v --test --test_args='--ginkgo.focus=E2eNode\sSuite\s\[sig\-node\]\sDevice\sPlugin\s\[Feature\:DevicePluginProbe\]\[NodeFeature\:DevicePluginProbe\]\[Serial\]\sDevicePlugin\s\[Serial\]\s\[Disruptive\]\sCan\sschedule\sa\spod\sthat\srequires\sa\sdevice$'
test/e2e_node/device_plugin_test.go:183 Expected <int>: 3 to equal <int>: 2 test/e2e_node/device_plugin_test.go:196from junit_ubuntu_01.xml
[BeforeEach] [sig-node] Device Plugin [Feature:DevicePluginProbe][NodeFeature:DevicePluginProbe][Serial] test/e2e/framework/framework.go:186 �[1mSTEP�[0m: Creating a kubernetes client �[1mSTEP�[0m: Building a namespace api object, basename device-plugin-errors May 14 09:08:48.270: INFO: Skipping waiting for service account [BeforeEach] DevicePlugin [Serial] [Disruptive] test/e2e_node/device_plugin_test.go:98 �[1mSTEP�[0m: Wait for node to be ready May 14 09:08:48.272: INFO: >>> >>> filter in node "n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef" �[1mSTEP�[0m: Scheduling a sample device plugin pod May 14 09:08:48.280: INFO: Waiting up to 5m0s for pod "sample-device-plugin" in namespace "device-plugin-errors-7344" to be "running and ready" May 14 09:08:48.281: INFO: Pod "sample-device-plugin": Phase="Pending", Reason="", readiness=false. Elapsed: 1.179561ms May 14 09:08:48.281: INFO: The phase of Pod sample-device-plugin is Pending, waiting for it to be Running (with Ready = true) May 14 09:08:50.285: INFO: Pod "sample-device-plugin": Phase="Running", Reason="", readiness=true. Elapsed: 2.004386992s May 14 09:08:50.285: INFO: The phase of Pod sample-device-plugin is Running (Ready = true) May 14 09:08:50.285: INFO: Pod "sample-device-plugin" satisfied condition "running and ready" �[1mSTEP�[0m: Waiting for devices to become available on the local node May 14 09:08:50.288: INFO: >>> node: "n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef" isSchedulable=true isUntainted=true May 14 09:08:50.289: INFO: >>> >>> filter in node "n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef" May 14 09:08:50.289: INFO: >>> items=1 May 14 09:08:50.289: INFO: >>> GetReadySchedulableNodes -> err=<nil> May 14 09:08:50.289: INFO: Successfully created device plugin pod �[1mSTEP�[0m: Waiting for the resource exported by the sample device plugin to become available on the local node May 14 09:08:50.291: INFO: >>> node: "n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef" isSchedulable=true isUntainted=true May 14 09:08:50.291: INFO: >>> >>> filter in node "n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef" May 14 09:08:50.291: INFO: >>> items=1 May 14 09:08:50.291: INFO: >>> GetReadySchedulableNodes -> err=<nil> May 14 09:08:50.293: INFO: phase for device-plugin-errors-7344/sample-device-plugin: "Running" May 14 09:08:50.304: INFO: logs for device-plugin-errors-7344/sample-device-plugin: I0514 09:08:48.904723 1 sampledeviceplugin.go:82] pluginSocksDir: /var/lib/kubelet/device-plugins/ I0514 09:08:48.905434 1 device_plugin_stub.go:142] Starting to serve on /var/lib/kubelet/device-plugins//dp.1652519328 I0514 09:08:48.905568 1 device_plugin_stub.go:191] Deprecation file not found. Invoke registration I0514 09:08:48.909962 1 device_plugin_stub.go:238] ListAndWatch END logs for device-plugin-errors-7344/sample-device-plugin [It] Can schedule a pod that requires a device test/e2e_node/device_plugin_test.go:183 May 14 09:08:50.309: INFO: Waiting up to 5m0s for pod "device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0" in namespace "device-plugin-errors-7344" to be "running and ready" May 14 09:08:50.311: INFO: Pod "device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0": Phase="Pending", Reason="", readiness=false. Elapsed: 1.991921ms May 14 09:08:50.311: INFO: The phase of Pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 is Pending, waiting for it to be Running (with Ready = true) May 14 09:08:52.322: INFO: Pod "device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0": Phase="Running", Reason="", readiness=true. Elapsed: 2.012804635s May 14 09:08:52.322: INFO: The phase of Pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 is Running (Ready = true) May 14 09:08:52.322: INFO: Pod "device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0" satisfied condition "running and ready" May 14 09:08:52.327: INFO: got pod logs: stub devices: Dev-2 [AfterEach] DevicePlugin [Serial] [Disruptive] test/e2e_node/device_plugin_test.go:145 May 14 09:08:52.331: INFO: phase for device-plugin-errors-7344/sample-device-plugin: "Running" May 14 09:08:52.334: INFO: logs for device-plugin-errors-7344/sample-device-plugin: I0514 09:08:48.904723 1 sampledeviceplugin.go:82] pluginSocksDir: /var/lib/kubelet/device-plugins/ I0514 09:08:48.905434 1 device_plugin_stub.go:142] Starting to serve on /var/lib/kubelet/device-plugins//dp.1652519328 I0514 09:08:48.905568 1 device_plugin_stub.go:191] Deprecation file not found. Invoke registration I0514 09:08:48.909962 1 device_plugin_stub.go:238] ListAndWatch I0514 09:08:50.308367 1 device_plugin_stub.go:272] Allocate, &AllocateRequest{ContainerRequests:[]*ContainerAllocateRequest{&ContainerAllocateRequest{DevicesIDs:[Dev-2],},},} END logs for device-plugin-errors-7344/sample-device-plugin �[1mSTEP�[0m: Deleting the device plugin pod May 14 09:08:52.339: INFO: Waiting for pod sample-device-plugin to disappear May 14 09:08:52.347: INFO: Pod sample-device-plugin still exists May 14 09:08:54.347: INFO: Waiting for pod sample-device-plugin to disappear May 14 09:08:54.350: INFO: Pod sample-device-plugin no longer exists �[1mSTEP�[0m: Deleting any Pods created by the test May 14 09:08:54.352: INFO: Deleting pod: device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 May 14 09:08:54.355: INFO: Waiting for pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 to disappear May 14 09:08:54.360: INFO: Pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 still exists May 14 09:08:56.361: INFO: Waiting for pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 to disappear May 14 09:08:56.364: INFO: Pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 still exists May 14 09:08:58.362: INFO: Waiting for pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 to disappear May 14 09:08:58.366: INFO: Pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 still exists May 14 09:09:00.361: INFO: Waiting for pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 to disappear May 14 09:09:00.364: INFO: Pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 still exists May 14 09:09:02.361: INFO: Waiting for pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 to disappear May 14 09:09:02.364: INFO: Pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 still exists May 14 09:09:04.360: INFO: Waiting for pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 to disappear May 14 09:09:04.363: INFO: Pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 still exists May 14 09:09:06.362: INFO: Waiting for pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 to disappear May 14 09:09:06.365: INFO: Pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 still exists May 14 09:09:08.360: INFO: Waiting for pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 to disappear May 14 09:09:08.365: INFO: Pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 still exists May 14 09:09:10.360: INFO: Waiting for pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 to disappear May 14 09:09:10.363: INFO: Pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 still exists May 14 09:09:12.361: INFO: Waiting for pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 to disappear May 14 09:09:12.366: INFO: Pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 still exists May 14 09:09:14.361: INFO: Waiting for pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 to disappear May 14 09:09:14.363: INFO: Pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 still exists May 14 09:09:16.361: INFO: Waiting for pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 to disappear May 14 09:09:16.364: INFO: Pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 still exists May 14 09:09:18.360: INFO: Waiting for pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 to disappear May 14 09:09:18.364: INFO: Pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 still exists May 14 09:09:20.361: INFO: Waiting for pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 to disappear May 14 09:09:20.366: INFO: Pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 still exists May 14 09:09:22.362: INFO: Waiting for pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 to disappear May 14 09:09:22.365: INFO: Pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 still exists May 14 09:09:24.361: INFO: Waiting for pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 to disappear May 14 09:09:24.364: INFO: Pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 still exists May 14 09:09:26.361: INFO: Waiting for pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 to disappear May 14 09:09:26.364: INFO: Pod device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 no longer exists May 14 09:09:26.381: INFO: Get running kubelet with systemctl: UNIT LOAD ACTIVE SUB DESCRIPTION kubelet-20220514T084641.service loaded active running /tmp/node-e2e-20220514T084641/kubelet --kubeconfig /tmp/node-e2e-20220514T084641/kubeconfig --root-dir /var/lib/kubelet --v 4 --logtostderr --feature-gates NodeSwap=true --hostname-override n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef --container-runtime-endpoint unix:///run/containerd/containerd.sock --config /tmp/node-e2e-20220514T084641/kubelet-config --kernel-memcg-notification=true --feature-gates=DisableKubeletCloudCredentialProviders=true,KubeletCredentialProviders=true --image-credential-provider-config=/tmp/node-e2e-20220514T084641/credential-provider.yaml --image-credential-provider-bin-dir=/tmp/node-e2e-20220514T084641 --cgroups-per-qos=true --cgroup-root=/ --fail-swap-on=false --runtime-cgroups=/system.slice/containerd.service LOAD = Reflects whether the unit definition was properly loaded. ACTIVE = The high-level unit activation state, i.e. generalization of SUB. SUB = The low-level unit activation state, values depend on unit type. 1 loaded units listed. , kubelet-20220514T084641 �[1mSTEP�[0m: Waiting for node to be ready again after the kubelet restart May 14 09:09:26.471: INFO: Waiting up to 5m0s for node n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef condition Ready to be true May 14 09:09:26.480: INFO: Summary of node events during the test: �[1mSTEP�[0m: Waiting for devices to become unavailable on the local node May 14 09:09:26.541: INFO: node "n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef" unschedulable=false ready=true May 14 09:09:26.541: INFO: node "n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef" conditions=[]v1.NodeCondition{v1.NodeCondition{Type:"MemoryPressure", Status:"False", LastHeartbeatTime:time.Date(2022, time.May, 14, 9, 9, 0, 0, time.Local), LastTransitionTime:time.Date(2022, time.May, 14, 8, 47, 56, 0, time.Local), Reason:"KubeletHasSufficientMemory", Message:"kubelet has sufficient memory available"}, v1.NodeCondition{Type:"DiskPressure", Status:"False", LastHeartbeatTime:time.Date(2022, time.May, 14, 9, 9, 0, 0, time.Local), LastTransitionTime:time.Date(2022, time.May, 14, 8, 47, 56, 0, time.Local), Reason:"KubeletHasNoDiskPressure", Message:"kubelet has no disk pressure"}, v1.NodeCondition{Type:"PIDPressure", Status:"False", LastHeartbeatTime:time.Date(2022, time.May, 14, 9, 9, 0, 0, time.Local), LastTransitionTime:time.Date(2022, time.May, 14, 8, 47, 56, 0, time.Local), Reason:"KubeletHasSufficientPID", Message:"kubelet has sufficient PID available"}, v1.NodeCondition{Type:"Ready", Status:"True", LastHeartbeatTime:time.Date(2022, time.May, 14, 9, 9, 0, 0, time.Local), LastTransitionTime:time.Date(2022, time.May, 14, 9, 8, 39, 0, time.Local), Reason:"KubeletReady", Message:"kubelet is posting ready status. AppArmor enabled"}} May 14 09:09:26.541: INFO: node "n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef" numOfSampleResources=2 May 14 09:09:28.544: INFO: Condition Ready of node n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef is false instead of true. Reason: KubeletNotReady, message: PLEG is not healthy: pleg has yet to be successful May 14 09:09:28.544: INFO: node "n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef" unschedulable=false ready=false May 14 09:09:28.544: INFO: node "n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef" conditions=[]v1.NodeCondition{v1.NodeCondition{Type:"MemoryPressure", Status:"False", LastHeartbeatTime:time.Date(2022, time.May, 14, 9, 9, 26, 0, time.Local), LastTransitionTime:time.Date(2022, time.May, 14, 8, 47, 56, 0, time.Local), Reason:"KubeletHasSufficientMemory", Message:"kubelet has sufficient memory available"}, v1.NodeCondition{Type:"DiskPressure", Status:"False", LastHeartbeatTime:time.Date(2022, time.May, 14, 9, 9, 26, 0, time.Local), LastTransitionTime:time.Date(2022, time.May, 14, 8, 47, 56, 0, time.Local), Reason:"KubeletHasNoDiskPressure", Message:"kubelet has no disk pressure"}, v1.NodeCondition{Type:"PIDPressure", Status:"False", LastHeartbeatTime:time.Date(2022, time.May, 14, 9, 9, 26, 0, time.Local), LastTransitionTime:time.Date(2022, time.May, 14, 8, 47, 56, 0, time.Local), Reason:"KubeletHasSufficientPID", Message:"kubelet has sufficient PID available"}, v1.NodeCondition{Type:"Ready", Status:"False", LastHeartbeatTime:time.Date(2022, time.May, 14, 9, 9, 26, 0, time.Local), LastTransitionTime:time.Date(2022, time.May, 14, 9, 9, 26, 0, time.Local), Reason:"KubeletNotReady", Message:"PLEG is not healthy: pleg has yet to be successful"}} May 14 09:09:28.544: INFO: node "n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef" numOfSampleResources=0 �[1mSTEP�[0m: devices now unavailable on the local node [AfterEach] [sig-node] Device Plugin [Feature:DevicePluginProbe][NodeFeature:DevicePluginProbe][Serial] test/e2e/framework/framework.go:187 �[1mSTEP�[0m: Collecting events from namespace "device-plugin-errors-7344". �[1mSTEP�[0m: Found 8 events. May 14 09:09:28.546: INFO: At 2022-05-14 09:08:48 +0000 UTC - event for sample-device-plugin: {kubelet n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef} Started: Started container sample-device-plugin May 14 09:09:28.546: INFO: At 2022-05-14 09:08:48 +0000 UTC - event for sample-device-plugin: {kubelet n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef} Pulled: Container image "k8s.gcr.io/e2e-test-images/sample-device-plugin:1.3" already present on machine May 14 09:09:28.546: INFO: At 2022-05-14 09:08:48 +0000 UTC - event for sample-device-plugin: {kubelet n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef} Created: Created container sample-device-plugin May 14 09:09:28.546: INFO: At 2022-05-14 09:08:50 +0000 UTC - event for device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0: {kubelet n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef} Created: Created container device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 May 14 09:09:28.546: INFO: At 2022-05-14 09:08:50 +0000 UTC - event for device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0: {kubelet n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef} Started: Started container device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 May 14 09:09:28.546: INFO: At 2022-05-14 09:08:50 +0000 UTC - event for device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0: {kubelet n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef} Pulled: Container image "k8s.gcr.io/e2e-test-images/busybox:1.29-2" already present on machine May 14 09:09:28.546: INFO: At 2022-05-14 09:08:52 +0000 UTC - event for sample-device-plugin: {kubelet n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef} Killing: Stopping container sample-device-plugin May 14 09:09:28.546: INFO: At 2022-05-14 09:08:54 +0000 UTC - event for device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0: {kubelet n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef} Killing: Stopping container device-plugin-test-7c3c4aa4-bf48-45fc-bd3e-baca201983d0 May 14 09:09:28.548: INFO: POD NODE PHASE GRACE CONDITIONS May 14 09:09:28.548: INFO: May 14 09:09:28.549: INFO: Logging node info for node n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef May 14 09:09:28.551: INFO: Node Info: &Node{ObjectMeta:{n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef 39892703-f29a-4e3c-be8c-e04857f24157 1547 0 2022-05-14 08:47:56 +0000 UTC <nil> <nil> map[beta.kubernetes.io/arch:amd64 beta.kubernetes.io/os:linux kubernetes.io/arch:amd64 kubernetes.io/hostname:n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef kubernetes.io/os:linux] map[volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] [{kubelet Update v1 2022-05-14 08:47:56 +0000 UTC FieldsV1 {"f:metadata":{"f:annotations":{".":{},"f:volumes.kubernetes.io/controller-managed-attach-detach":{}},"f:labels":{".":{},"f:beta.kubernetes.io/arch":{},"f:beta.kubernetes.io/os":{},"f:kubernetes.io/arch":{},"f:kubernetes.io/hostname":{},"f:kubernetes.io/os":{}}}} } {kubelet Update v1 2022-05-14 08:54:08 +0000 UTC FieldsV1 {"f:status":{"f:allocatable":{"f:cpu":{},"f:ephemeral-storage":{},"f:example.com/resource":{},"f:hugepages-2Mi":{},"f:memory":{}},"f:capacity":{"f:example.com/resource":{},"f:hugepages-2Mi":{}},"f:conditions":{"k:{\"type\":\"DiskPressure\"}":{"f:lastHeartbeatTime":{}},"k:{\"type\":\"MemoryPressure\"}":{"f:lastHeartbeatTime":{}},"k:{\"type\":\"PIDPressure\"}":{"f:lastHeartbeatTime":{}},"k:{\"type\":\"Ready\"}":{"f:lastHeartbeatTime":{},"f:lastTransitionTime":{},"f:message":{},"f:reason":{},"f:status":{}}},"f:images":{}}} status}]},Spec:NodeSpec{PodCIDR:,DoNotUseExternalID:,ProviderID:,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[],},Status:NodeStatus{Capacity:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{20629221376 0} {<nil>} 20145724Ki BinarySI},example.com/resource: {{0 0} {<nil>} 0 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{7812419584 0} {<nil>} 7629316Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{18566299208 0} {<nil>} 18566299208 DecimalSI},example.com/resource: {{0 0} {<nil>} 0 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{7550275584 0} {<nil>} 7373316Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2022-05-14 09:09:26 +0000 UTC,LastTransitionTime:2022-05-14 08:47:56 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2022-05-14 09:09:26 +0000 UTC,LastTransitionTime:2022-05-14 08:47:56 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2022-05-14 09:09:26 +0000 UTC,LastTransitionTime:2022-05-14 08:47:56 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:False,LastHeartbeatTime:2022-05-14 09:09:26 +0000 UTC,LastTransitionTime:2022-05-14 09:09:26 +0000 UTC,Reason:KubeletNotReady,Message:PLEG is not healthy: pleg has yet to be successful,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.138.15.196,},NodeAddress{Type:Hostname,Address:n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:50acf2aca0b544faa0a0eb32221dc299,SystemUUID:50acf2ac-a0b5-44fa-a0a0-eb32221dc299,BootID:4ce3ce9a-c969-4868-83c5-ef6101dc1f32,KernelVersion:5.4.0-1071-gke,OSImage:Ubuntu 20.04.4 LTS,ContainerRuntimeVersion:containerd://1.5.2,KubeletVersion:v1.25.0-alpha.0.505+b62ca910f126d9,KubeProxyVersion:v1.25.0-alpha.0.505+b62ca910f126d9,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8s.gcr.io/e2e-test-images/perl@sha256:c613344cdd31c5055961b078f831ef9d9199fc9111efe6e81bea3f00d78bd979 k8s.gcr.io/e2e-test-images/perl:5.26],SizeBytes:325397679,},ContainerImage{Names:[k8s.gcr.io/e2e-test-images/node-perf/tf-wide-deep@sha256:44d13eac1e70b9494b9ef8eee2932c80863a01812cdcc1dfff5d1d43d97a6816 k8s.gcr.io/e2e-test-images/node-perf/tf-wide-deep:1.2],SizeBytes:212218488,},ContainerImage{Names:[k8s.gcr.io/e2e-test-images/volume/gluster@sha256:033a12fe65438751690b519cebd4135a3485771086bcf437212b7b886bb7956c k8s.gcr.io/e2e-test-images/volume/gluster:1.3],SizeBytes:115217395,},ContainerImage{Names:[k8s.gcr.io/etcd@sha256:13f53ed1d91e2e11aac476ee9a0269fdda6cc4874eba903efd40daf50c55eee5 k8s.gcr.io/etcd:3.5.3-0],SizeBytes:102143581,},ContainerImage{Names:[k8s.gcr.io/e2e-test-images/volume/nfs@sha256:3bda73f2428522b0e342af80a0b9679e8594c2126f2b3cca39ed787589741b9e k8s.gcr.io/e2e-test-images/volume/nfs:1.3],SizeBytes:95836203,},ContainerImage{Names:[quay.io/kubevirt/device-plugin-kvm@sha256:b44bc0fd6ff8987091bbc7ec630e5ee6683be40d151b4e6635e24afb5807b21a quay.io/kubevirt/device-plugin-kvm:latest],SizeBytes:87743847,},ContainerImage{Names:[docker.io/library/debian@sha256:6137c67e2009e881526386c42ba99b3657e4f92f546814a33d35b14e60579777 docker.io/library/debian:latest],SizeBytes:54949468,},ContainerImage{Names:[k8s.gcr.io/e2e-test-images/agnhost@sha256:f5241226198f5a54d22540acf2b3933ea0f49458f90c51fc75833d0c428687b8 k8s.gcr.io/e2e-test-images/agnhost:2.36],SizeBytes:50655495,},ContainerImage{Names:[k8s.gcr.io/node-problem-detector/node-problem-detector@sha256:0ce71ef6d759425d22b10e65b439749fe5d13377a188e2fc060b731cdb4e6901 k8s.gcr.io/node-problem-detector/node-problem-detector:v0.8.7],SizeBytes:47786458,},ContainerImage{Names:[k8s.gcr.io/e2e-test-images/httpd@sha256:1b9d1b2f36cb2dbee1960e82a9344aeb11bd4c4c03abf5e1853e0559c23855e3 k8s.gcr.io/e2e-test-images/httpd:2.4.38-2],SizeBytes:40764680,},ContainerImage{Names:[k8s.gcr.io/e2e-test-images/node-perf/npb-is@sha256:8285539c79625b192a5e33fc3d21edc1a7776fb9afe15fae3b5037a7a8020839 k8s.gcr.io/e2e-test-images/node-perf/npb-is:1.2],SizeBytes:39706325,},ContainerImage{Names:[k8s.gcr.io/e2e-test-images/node-perf/npb-ep@sha256:90b5cfc5451428aad4dd6af9960640f2506804d35aa05e83c11bf0a46ac318c8 k8s.gcr.io/e2e-test-images/node-perf/npb-ep:1.2],SizeBytes:39705373,},ContainerImage{Names:[gcr.io/cadvisor/cadvisor@sha256:89e6137f068ded2e9a3a012ce71260b9afc57a19305842aa1074239841a539a7 gcr.io/cadvisor/cadvisor:v0.43.0],SizeBytes:31056802,},ContainerImage{Names:[k8s.gcr.io/e2e-test-images/nonroot@sha256:b9e2958a3dd879e3cf11142228c6d073d0fc4ea2e857c3be6f4fb0ab5fb2c937 k8s.gcr.io/e2e-test-images/nonroot:1.2],SizeBytes:17748301,},ContainerImage{Names:[docker.io/nfvpe/sriov-device-plugin@sha256:518499ed631ff84b43153b8f7624c1aaacb75a721038857509fe690abdf62ddb docker.io/nfvpe/sriov-device-plugin:v3.1],SizeBytes:12638340,},ContainerImage{Names:[k8s.gcr.io/e2e-test-images/sample-device-plugin@sha256:e84f6ca27c51ddedf812637dd2bcf771ad69fdca1173e5690c372370d0f93c40 k8s.gcr.io/e2e-test-images/sample-device-plugin:1.3],SizeBytes:12410396,},ContainerImage{Names:[k8s.gcr.io/e2e-test-images/nginx@sha256:13616070e3f29de4417eee434a8ef472221c9e51b3d037b5a6b46cef08eb7443 k8s.gcr.io/e2e-test-images/nginx:1.14-2],SizeBytes:6979041,},ContainerImage{Names:[k8s.gcr.io/nvidia-gpu-device-plugin@sha256:4b036e8844920336fa48f36edeb7d4398f426d6a934ba022848deed2edbf09aa],SizeBytes:6819465,},ContainerImage{Names:[k8s.gcr.io/e2e-test-images/ipc-utils@sha256:647d092bada3b46c449d875adf31d71c1dd29c244e9cca6a04fddf9d6bcac136 k8s.gcr.io/e2e-test-images/ipc-utils:1.3],SizeBytes:4013020,},ContainerImage{Names:[k8s.gcr.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac k8s.gcr.io/e2e-test-images/nonewprivs:1.3],SizeBytes:3263463,},ContainerImage{Names:[k8s.gcr.io/stress:v1],SizeBytes:1558004,},ContainerImage{Names:[k8s.gcr.io/e2e-test-images/busybox@sha256:c318242786b139d18676b1c09a0ad7f15fc17f8f16a5b2e625cd0dc8c9703daf k8s.gcr.io/e2e-test-images/busybox:1.29-2],SizeBytes:732424,},ContainerImage{Names:[k8s.gcr.io/busybox@sha256:4bdd623e848417d96127e16037743f0cd8b528c026e9175e22a84f639eca58ff],SizeBytes:676941,},ContainerImage{Names:[k8s.gcr.io/pause@sha256:bb6ed397957e9ca7c65ada0db5c5d1c707c9c8afc80a94acbe69f3ae76988f0c k8s.gcr.io/pause:3.7],SizeBytes:311278,},ContainerImage{Names:[k8s.gcr.io/pause@sha256:1ff6c18fbef2045af6b9c16bf034cc421a29027b800e4f9b68ae9b1cb3e9ae07 k8s.gcr.io/pause:3.5],SizeBytes:301416,},ContainerImage{Names:[docker.io/library/gke-nvidia-installer:fixed],SizeBytes:11599,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} May 14 09:09:28.551: INFO: Logging kubelet events for node n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef May 14 09:09:28.553: INFO: Logging pods the kubelet thinks is on node n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef May 14 09:09:28.579: INFO: Latency metrics for node n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef May 14 09:09:28.579: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready May 14 09:09:28.581: INFO: Condition Ready of node n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef is false instead of true. Reason: KubeletNotReady, message: PLEG is not healthy: pleg has yet to be successful May 14 09:09:30.586: INFO: Condition Ready of node n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef is false instead of true. Reason: KubeletNotReady, message: PLEG is not healthy: pleg has yet to be successful May 14 09:09:32.586: INFO: Condition Ready of node n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef is false instead of true. Reason: KubeletNotReady, message: PLEG is not healthy: pleg has yet to be successful May 14 09:09:34.585: INFO: Condition Ready of node n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef is false instead of true. Reason: KubeletNotReady, message: PLEG is not healthy: pleg has yet to be successful May 14 09:09:36.586: INFO: Condition Ready of node n1-standard-2-ubuntu-gke-2004-1-23-v20220511-95a0d8ef is false instead of true. Reason: KubeletNotReady, message: PLEG is not healthy: pleg has yet to be successful �[1mSTEP�[0m: Destroying namespace "device-plugin-errors-7344" for this suite.
Filter through log files | View test history on testgrid
error during go run /go/src/k8s.io/kubernetes/test/e2e_node/runner/remote/run_remote.go --cleanup --logtostderr --vmodule=*=4 --ssh-env=gce --results-dir=/workspace/_artifacts --project=k8s-infra-e2e-boskos-099 --zone=us-west1-b --ssh-user=prow --ssh-key=/workspace/.ssh/google_compute_engine --ginkgo-flags=--nodes=1 --focus="\[Serial\]" --skip="\[Flaky\]|\[Slow\]|\[Benchmark\]|\[NodeSpecialFeature:.+\]|\[NodeSpecialFeature\]|\[NodeAlphaFeature:.+\]|\[NodeAlphaFeature\]|\[NodeFeature:Eviction\]" --test_args=--feature-gates=NodeSwap=true --container-runtime-endpoint=unix:///run/containerd/containerd.sock --container-runtime-process-name=/usr/bin/containerd --container-runtime-pid-file= --kubelet-flags="--cgroups-per-qos=true --cgroup-root=/ --fail-swap-on=false --runtime-cgroups=/system.slice/containerd.service" --extra-log="{\"name\": \"containerd.log\", \"journalctl\": [\"-u\", \"containerd*\"]}" --test-timeout=3h0m0s --image-config-file=/workspace/test-infra/jobs/e2e_node/swap/image-config-swap.yaml: exit status 1
from junit_runner.xml
Filter through log files | View test history on testgrid
E2eNode Suite [sig-node] Container Manager Misc [Serial] Validate OOM score adjustments [NodeFeature:OOMScoreAdj] once the node is setup pod infra containers oom-score-adj should be -998 and best effort container's should be 1000
E2eNode Suite [sig-node] Container Manager Misc [Serial] Validate OOM score adjustments [NodeFeature:OOMScoreAdj] once the node is setup Kubelet's oom-score-adj should be -999
E2eNode Suite [sig-node] Container Manager Misc [Serial] Validate OOM score adjustments [NodeFeature:OOMScoreAdj] once the node is setup burstable container's oom-score-adj should be between [2, 1000)
E2eNode Suite [sig-node] Container Manager Misc [Serial] Validate OOM score adjustments [NodeFeature:OOMScoreAdj] once the node is setup container runtime's oom-score-adj should be -999
E2eNode Suite [sig-node] Container Manager Misc [Serial] Validate OOM score adjustments [NodeFeature:OOMScoreAdj] once the node is setup guaranteed container's oom-score-adj should be -998
E2eNode Suite [sig-node] Device Plugin [Feature:DevicePluginProbe][NodeFeature:DevicePluginProbe][Serial] DevicePlugin [Serial] [Disruptive] Keeps device plugin assignments across pod and kubelet restarts
E2eNode Suite [sig-node] Device Plugin [Feature:DevicePluginProbe][NodeFeature:DevicePluginProbe][Serial] DevicePlugin [Serial] [Disruptive] Keeps device plugin assignments after the device plugin has been re-registered
E2eNode Suite [sig-node] Downward API [Serial] [Disruptive] [NodeFeature:DownwardAPIHugePages] Downward API tests for hugepages should provide container's limits.hugepages-<pagesize> and requests.hugepages-<pagesize> as env vars
E2eNode Suite [sig-node] Downward API [Serial] [Disruptive] [NodeFeature:DownwardAPIHugePages] Downward API tests for hugepages should provide default limits.hugepages-<pagesize> from node allocatable
E2eNode Suite [sig-node] GarbageCollect [Serial][NodeFeature:GarbageCollect] Garbage Collection Test: Many Pods with Many Restarting Containers Should eventually garbage collect containers when we exceed the number of dead containers per container
E2eNode Suite [sig-node] GarbageCollect [Serial][NodeFeature:GarbageCollect] Garbage Collection Test: Many Restarting Containers Should eventually garbage collect containers when we exceed the number of dead containers per container
E2eNode Suite [sig-node] GarbageCollect [Serial][NodeFeature:GarbageCollect] Garbage Collection Test: One Non-restarting Container Should eventually garbage collect containers when we exceed the number of dead containers per container
E2eNode Suite [sig-node] GracefulNodeShutdown [Serial] [NodeFeature:GracefulNodeShutdown] [NodeFeature:GracefulNodeShutdownBasedOnPodPriority] when gracefully shutting down after restart dbus, should be able to gracefully shutdown
E2eNode Suite [sig-node] GracefulNodeShutdown [Serial] [NodeFeature:GracefulNodeShutdown] [NodeFeature:GracefulNodeShutdownBasedOnPodPriority] when gracefully shutting down should be able to gracefully shutdown pods with various grace periods
E2eNode Suite [sig-node] GracefulNodeShutdown [Serial] [NodeFeature:GracefulNodeShutdown] [NodeFeature:GracefulNodeShutdownBasedOnPodPriority] when gracefully shutting down should be able to handle a cancelled shutdown
E2eNode Suite [sig-node] GracefulNodeShutdown [Serial] [NodeFeature:GracefulNodeShutdown] [NodeFeature:GracefulNodeShutdownBasedOnPodPriority] when gracefully shutting down with Pod priority should be able to gracefully shutdown pods with various grace periods
E2eNode Suite [sig-node] Memory Manager [Disruptive] [Serial] [Feature:MemoryManager] with none policy should not report any memory data during request to pod resources GetAllocatableResources
E2eNode Suite [sig-node] Memory Manager [Disruptive] [Serial] [Feature:MemoryManager] with none policy should not report any memory data during request to pod resources List
E2eNode Suite [sig-node] Memory Manager [Disruptive] [Serial] [Feature:MemoryManager] with none policy should succeed to start the pod
E2eNode Suite [sig-node] Memory Manager [Disruptive] [Serial] [Feature:MemoryManager] with static policy should report memory data during request to pod resources GetAllocatableResources
E2eNode Suite [sig-node] Memory Manager [Disruptive] [Serial] [Feature:MemoryManager] with static policy when guaranteed pod has init and app containers should succeed to start the pod
E2eNode Suite [sig-node] Memory Manager [Disruptive] [Serial] [Feature:MemoryManager] with static policy when guaranteed pod has only app containers should succeed to start the pod
E2eNode Suite [sig-node] Memory Manager [Disruptive] [Serial] [Feature:MemoryManager] with static policy when multiple guaranteed pods started should report memory data for each guaranteed pod and container during request to pod resources List
E2eNode Suite [sig-node] Memory Manager [Disruptive] [Serial] [Feature:MemoryManager] with static policy when multiple guaranteed pods started should succeed to start all pods
E2eNode Suite [sig-node] Node Container Manager [Serial] Validate Node Allocatable [NodeFeature:NodeAllocatable] sets up the node and runs the test
E2eNode Suite [sig-node] NodeProblemDetector [NodeFeature:NodeProblemDetector] [Serial] SystemLogMonitor should generate node condition and events for corresponding errors
E2eNode Suite [sig-node] POD Resources [Serial] [Feature:PodResources][NodeFeature:PodResources] without SRIOV devices in the system with CPU manager None policy should return the expected responses
E2eNode Suite [sig-node] POD Resources [Serial] [Feature:PodResources][NodeFeature:PodResources] without SRIOV devices in the system with disabled KubeletPodResourcesGetAllocatable feature gate should return the expected error with the feature gate disabled
E2eNode Suite [sig-node] PodPidsLimit [Serial] With config updated with pids limits should set pids.max for Pod
E2eNode Suite [sig-storage] Downward API [Serial] [Disruptive] [Feature:EphemeralStorage] Downward API tests for local ephemeral storage should provide container's limits.ephemeral-storage and requests.ephemeral-storage as env vars
E2eNode Suite [sig-storage] Downward API [Serial] [Disruptive] [Feature:EphemeralStorage] Downward API tests for local ephemeral storage should provide default limits.ephemeral-storage from node allocatable
kubetest Deferred TearDown
kubetest DumpClusterLogs
kubetest GetDeployer
kubetest Prepare
kubetest TearDown
kubetest TearDown Previous
kubetest Timeout
kubetest Up
kubetest test setup
E2eNode Suite [sig-network] Networking Granular Checks: Pods should function for intra-pod communication: http [NodeConformance] [Conformance]
E2eNode Suite [sig-network] Networking Granular Checks: Pods should function for intra-pod communication: sctp [LinuxOnly][Feature:SCTPConnectivity][Disruptive]
E2eNode Suite [sig-network] Networking Granular Checks: Pods should function for intra-pod communication: udp [NodeConformance] [Conformance]
E2eNode Suite [sig-network] Networking Granular Checks: Pods should function for node-pod communication: http [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-network] Networking Granular Checks: Pods should function for node-pod communication: sctp [LinuxOnly][Feature:SCTPConnectivity][Disruptive]
E2eNode Suite [sig-network] Networking Granular Checks: Pods should function for node-pod communication: udp [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-node] AppArmor [Feature:AppArmor][NodeFeature:AppArmor] when running with AppArmor should enforce a permissive profile
E2eNode Suite [sig-node] AppArmor [Feature:AppArmor][NodeFeature:AppArmor] when running with AppArmor should enforce a profile blocking writes
E2eNode Suite [sig-node] AppArmor [Feature:AppArmor][NodeFeature:AppArmor] when running with AppArmor should reject an unloaded profile
E2eNode Suite [sig-node] CPU Manager [Serial] [Feature:CPUManager] With kubeconfig updated with static CPU Manager policy run the CPU Manager tests should assign CPUs as expected based on the Pod spec
E2eNode Suite [sig-node] CPU Manager [Serial] [Feature:CPUManager] With kubeconfig updated with static CPU Manager policy run the CPU Manager tests should assign CPUs as expected with enhanced policy based on strict SMT alignment
E2eNode Suite [sig-node] ConfigMap should be consumable via environment variable [NodeConformance] [Conformance]
E2eNode Suite [sig-node] ConfigMap should be consumable via the environment [NodeConformance] [Conformance]
E2eNode Suite [sig-node] ConfigMap should fail to create ConfigMap with empty key [Conformance]
E2eNode Suite [sig-node] ConfigMap should run through a ConfigMap lifecycle [Conformance]
E2eNode Suite [sig-node] ConfigMap should update ConfigMap successfully
E2eNode Suite [sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart exec hook properly [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart http hook properly [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop exec hook properly [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop http hook properly [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Container Runtime Conformance Test container runtime conformance blackbox test when running a container with a new image should be able to pull from private registry with credential provider [NodeConformance]
E2eNode Suite [sig-node] Container Runtime blackbox test on terminated container should report termination message as empty when pod succeeds and TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Container Runtime blackbox test on terminated container should report termination message from file when pod succeeds and TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Container Runtime blackbox test on terminated container should report termination message from log output if TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Container Runtime blackbox test on terminated container should report termination message if TerminationMessagePath is set [NodeConformance]
E2eNode Suite [sig-node] Container Runtime blackbox test on terminated container should report termination message if TerminationMessagePath is set as non-root user and at a non-default path [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Container Runtime blackbox test when running a container with a new image should be able to pull from private registry with secret [NodeConformance]
E2eNode Suite [sig-node] Container Runtime blackbox test when running a container with a new image should be able to pull image [NodeConformance]
E2eNode Suite [sig-node] Container Runtime blackbox test when running a container with a new image should not be able to pull from private registry without secret [NodeConformance]
E2eNode Suite [sig-node] Container Runtime blackbox test when running a container with a new image should not be able to pull image from invalid registry [NodeConformance]
E2eNode Suite [sig-node] Container Runtime blackbox test when starting a container that exits should run with the expected status [NodeConformance] [Conformance]
E2eNode Suite [sig-node] ContainerLogPath [NodeConformance] Pod with a container printed log to stdout should print log to correct cri log path
E2eNode Suite [sig-node] ContainerLogPath [NodeConformance] Pod with a container printed log to stdout should print log to correct log path
E2eNode Suite [sig-node] ContainerLogRotation [Slow] [Serial] [Disruptive] when a container generates a lot of log should be rotated and limited to a fixed amount of files
E2eNode Suite [sig-node] Containers should be able to override the image's default arguments (container cmd) [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Containers should be able to override the image's default command (container entrypoint) [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Containers should be able to override the image's default command and arguments [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Containers should use the image defaults if command and args are blank [NodeConformance] [Conformance]
E2eNode Suite [sig-node] CriticalPod [Serial] [Disruptive] [NodeFeature:CriticalPod] when we need to admit a critical pod [Flaky] should be able to create and delete a critical pod
E2eNode Suite [sig-node] Density [Serial] [Slow] create a batch of pods latency/resource should be within limit when create 10 pods with 0s interval
E2eNode Suite [sig-node] Density [Serial] [Slow] create a batch of pods latency/resource should be within limit when create 10 pods with 0s interval [Benchmark][NodeSpecialFeature:Benchmark]
E2eNode Suite [sig-node] Density [Serial] [Slow] create a batch of pods latency/resource should be within limit when create 10 pods with 100ms interval [Benchmark][NodeSpecialFeature:Benchmark]
E2eNode Suite [sig-node] Density [Serial] [Slow] create a batch of pods latency/resource should be within limit when create 10 pods with 300ms interval [Benchmark][NodeSpecialFeature:Benchmark]
E2eNode Suite [sig-node] Density [Serial] [Slow] create a batch of pods latency/resource should be within limit when create 35 pods with 0s interval [Benchmark][NodeSpecialFeature:Benchmark]
E2eNode Suite [sig-node] Density [Serial] [Slow] create a batch of pods latency/resource should be within limit when create 35 pods with 100ms interval [Benchmark][NodeSpecialFeature:Benchmark]
E2eNode Suite [sig-node] Density [Serial] [Slow] create a batch of pods latency/resource should be within limit when create 35 pods with 300ms interval [Benchmark][NodeSpecialFeature:Benchmark]
E2eNode Suite [sig-node] Density [Serial] [Slow] create a batch of pods latency/resource should be within limit when create 90 pods with 0s interval [Benchmark][NodeSpecialFeature:Benchmark]
E2eNode Suite [sig-node] Density [Serial] [Slow] create a batch of pods latency/resource should be within limit when create 90 pods with 100ms interval [Benchmark][NodeSpecialFeature:Benchmark]
E2eNode Suite [sig-node] Density [Serial] [Slow] create a batch of pods latency/resource should be within limit when create 90 pods with 300ms interval [Benchmark][NodeSpecialFeature:Benchmark]
E2eNode Suite [sig-node] Density [Serial] [Slow] create a batch of pods with higher API QPS latency/resource should be within limit when create 90 pods with 0s interval (QPS 60) [Benchmark][NodeSpecialFeature:Benchmark]
E2eNode Suite [sig-node] Density [Serial] [Slow] create a batch of pods with higher API QPS latency/resource should be within limit when create 90 pods with 100ms interval (QPS 60) [Benchmark][NodeSpecialFeature:Benchmark]
E2eNode Suite [sig-node] Density [Serial] [Slow] create a batch of pods with higher API QPS latency/resource should be within limit when create 90 pods with 300ms interval (QPS 60) [Benchmark][NodeSpecialFeature:Benchmark]
E2eNode Suite [sig-node] Density [Serial] [Slow] create a sequence of pods latency/resource should be within limit when create 10 pods with 50 background pods
E2eNode Suite [sig-node] Density [Serial] [Slow] create a sequence of pods latency/resource should be within limit when create 10 pods with 50 background pods [Benchmark][NodeSpeicalFeature:Benchmark]
E2eNode Suite [sig-node] Density [Serial] [Slow] create a sequence of pods latency/resource should be within limit when create 30 pods with 50 background pods [Benchmark][NodeSpeicalFeature:Benchmark]
E2eNode Suite [sig-node] Density [Serial] [Slow] create a sequence of pods latency/resource should be within limit when create 50 pods with 50 background pods [Benchmark][NodeSpeicalFeature:Benchmark]
E2eNode Suite [sig-node] Device Manager [Serial] [Feature:DeviceManager][NodeFeature:DeviceManager] With SRIOV devices in the system should be able to recover V1 (aka pre-1.20) checkpoint data and reject pods before device re-registration
E2eNode Suite [sig-node] Device Manager [Serial] [Feature:DeviceManager][NodeFeature:DeviceManager] With SRIOV devices in the system should be able to recover V1 (aka pre-1.20) checkpoint data and update topology info on device re-registration
E2eNode Suite [sig-node] Downward API should provide container's limits.cpu/memory and requests.cpu/memory as env vars [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Downward API should provide default limits.cpu/memory from node allocatable [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Downward API should provide host IP and pod IP as an env var if pod uses host network [LinuxOnly]
E2eNode Suite [sig-node] Downward API should provide host IP as an env var [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Downward API should provide pod UID as env vars [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Downward API should provide pod name, namespace and IP address as env vars [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Ephemeral Containers [NodeFeature:EphemeralContainers] will start an ephemeral container in an existing pod
E2eNode Suite [sig-node] Hostname of Pod [NodeConformance] a pod configured to set FQDN as hostname will remain in Pending state generating FailedCreatePodSandBox events when the FQDN is longer than 64 bytes
E2eNode Suite [sig-node] Hostname of Pod [NodeConformance] a pod with subdomain field has FQDN, hostname is shortname
E2eNode Suite [sig-node] Hostname of Pod [NodeConformance] a pod with subdomain field has FQDN, when setHostnameAsFQDN is set to true, the FQDN is set as hostname
E2eNode Suite [sig-node] Hostname of Pod [NodeConformance] a pod without FQDN is not affected by SetHostnameAsFQDN field
E2eNode Suite [sig-node] Hostname of Pod [NodeConformance] a pod without subdomain field does not have FQDN
E2eNode Suite [sig-node] HugePages [Serial] [Feature:HugePages][NodeSpecialFeature:HugePages] should add resources for new huge page sizes on kubelet restart
E2eNode Suite [sig-node] HugePages [Serial] [Feature:HugePages][NodeSpecialFeature:HugePages] should remove resources for huge page sizes no longer supported
E2eNode Suite [sig-node] HugePages [Serial] [Feature:HugePages][NodeSpecialFeature:HugePages] when start the pod with the resources requests that contain multiple hugepages resources should set correct hugetlb mount and limit under the container cgroup
E2eNode Suite [sig-node] HugePages [Serial] [Feature:HugePages][NodeSpecialFeature:HugePages] when start the pod with the resources requests that contain only one hugepages resource with the backward compatible API should set correct hugetlb mount and limit under the container cgroup
E2eNode Suite [sig-node] HugePages [Serial] [Feature:HugePages][NodeSpecialFeature:HugePages] when start the pod with the resources requests that contain only one hugepages resource with the new API should set correct hugetlb mount and limit under the container cgroup
E2eNode Suite [sig-node] ImageCredentialProvider [Feature:KubeletCredentialProviders] should be able to create pod with image credentials fetched from external credential provider
E2eNode Suite [sig-node] ImageGCNoEviction [Slow] [Serial] [Disruptive][NodeFeature:Eviction] when we run containers that should cause DiskPressure should eventually evict all of the correct pods
E2eNode Suite [sig-node] ImageID [NodeFeature: ImageID] should be set to the manifest digest (from RepoDigests) when available
E2eNode Suite [sig-node] InitContainer [NodeConformance] should invoke init containers on a RestartAlways pod [Conformance]
E2eNode Suite [sig-node] InitContainer [NodeConformance] should invoke init containers on a RestartNever pod [Conformance]
E2eNode Suite [sig-node] InitContainer [NodeConformance] should not start app containers and fail the pod if init containers fail on a RestartNever pod [Conformance]
E2eNode Suite [sig-node] InitContainer [NodeConformance] should not start app containers if init containers fail on a RestartAlways pod [Conformance]
E2eNode Suite [sig-node] InodeEviction [Slow] [Serial] [Disruptive][NodeFeature:Eviction] when we run containers that should cause DiskPressure should eventually evict all of the correct pods
E2eNode Suite [sig-node] Kubelet Cgroup Manager Pod containers [NodeConformance] On scheduling a BestEffort Pod Pod containers should have been created under the BestEffort cgroup
E2eNode Suite [sig-node] Kubelet Cgroup Manager Pod containers [NodeConformance] On scheduling a Burstable Pod Pod containers should have been created under the Burstable cgroup
E2eNode Suite [sig-node] Kubelet Cgroup Manager Pod containers [NodeConformance] On scheduling a Guaranteed Pod Pod containers should have been created under the cgroup-root
E2eNode Suite [sig-node] Kubelet Cgroup Manager QOS containers On enabling QOS cgroup hierarchy Top level QoS containers should have been created [NodeConformance]
E2eNode Suite [sig-node] Kubelet PodOverhead handling [LinuxOnly] PodOverhead cgroup accounting On running pod with PodOverhead defined Pod cgroup should be sum of overhead and resource limits
E2eNode Suite [sig-node] Kubelet Volume Manager Volume Manager On termination of pod with memory backed volume should remove the volume from the node [NodeConformance]
E2eNode Suite [sig-node] Kubelet when scheduling a busybox Pod with hostAliases should write entries to /etc/hosts [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Kubelet when scheduling a busybox command in a pod should print the output to logs [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Kubelet when scheduling a busybox command that always fails in a pod should be possible to delete [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Kubelet when scheduling a busybox command that always fails in a pod should have an terminated reason [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Kubelet when scheduling a read only busybox container should not write to root filesystem [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-node] KubeletManagedEtcHosts should test kubelet managed /etc/hosts file [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Lease lease API should be available [Conformance]
E2eNode Suite [sig-node] LocalStorageCapacityIsolationEviction [Slow] [Serial] [Disruptive] [Feature:LocalStorageCapacityIsolation][NodeFeature:Eviction] when we run containers that should cause evictions due to pod local storage violations should eventually evict all of the correct pods
E2eNode Suite [sig-node] LocalStorageCapacityIsolationMemoryBackedVolumeEviction [Slow] [Serial] [Disruptive] [Feature:LocalStorageCapacityIsolation][NodeFeature:Eviction] when we run containers that should cause evictions due to pod local storage violations should eventually evict all of the correct pods
E2eNode Suite [sig-node] LocalStorageCapacityIsolationQuotaMonitoring [Slow] [Serial] [Disruptive] [Feature:LocalStorageCapacityIsolationQuota][NodeFeature:LSCIQuotaMonitoring] when we run containers that should cause use quotas for LSCI monitoring (quotas enabled: false) should eventually evict all of the correct pods
E2eNode Suite [sig-node] LocalStorageCapacityIsolationQuotaMonitoring [Slow] [Serial] [Disruptive] [Feature:LocalStorageCapacityIsolationQuota][NodeFeature:LSCIQuotaMonitoring] when we run containers that should cause use quotas for LSCI monitoring (quotas enabled: true) should eventually evict all of the correct pods
E2eNode Suite [sig-node] LocalStorageEviction [Slow] [Serial] [Disruptive][NodeFeature:Eviction] when we run containers that should cause DiskPressure should eventually evict all of the correct pods
E2eNode Suite [sig-node] LocalStorageSoftEviction [Slow] [Serial] [Disruptive][NodeFeature:Eviction] when we run containers that should cause DiskPressure should eventually evict all of the correct pods
E2eNode Suite [sig-node] Lock contention [Slow] [Disruptive] [NodeSpecialFeature:LockContention] Kubelet should stop when the test acquires the lock on lock file and restart once the lock is released
E2eNode Suite [sig-node] Memory Manager [Disruptive] [Serial] [Feature:MemoryManager] with static policy when guaranteed pod memory request is bigger than free memory on each NUMA node should be rejected
E2eNode Suite [sig-node] MemoryAllocatableEviction [Slow] [Serial] [Disruptive][NodeFeature:Eviction] when we run containers that should cause MemoryPressure should eventually evict all of the correct pods
E2eNode Suite [sig-node] MirrorPod when create a mirror pod should be recreated when mirror pod forcibly deleted [NodeConformance]
E2eNode Suite [sig-node] MirrorPod when create a mirror pod should be recreated when mirror pod gracefully deleted [NodeConformance]
E2eNode Suite [sig-node] MirrorPod when create a mirror pod should be updated when static pod updated [NodeConformance]
E2eNode Suite [sig-node] MirrorPod when create a mirror pod without changes should successfully recreate when file is removed and recreated [NodeConformance]
E2eNode Suite [sig-node] MirrorPodWithGracePeriod when create a mirror pod mirror pod termination should satisfy grace period when static pod is deleted [NodeConformance]
E2eNode Suite [sig-node] MirrorPodWithGracePeriod when create a mirror pod mirror pod termination should satisfy grace period when static pod is updated [NodeConformance]
E2eNode Suite [sig-node] MirrorPodWithGracePeriod when create a mirror pod should update a static pod when the static pod is updated multiple times during the graceful termination period [NodeConformance]
E2eNode Suite [sig-node] Node Performance Testing [Serial] [Slow] Run node performance testing with pre-defined workloads NAS parallel benchmark (NPB) suite - Embarrassingly Parallel (EP) workload
E2eNode Suite [sig-node] Node Performance Testing [Serial] [Slow] Run node performance testing with pre-defined workloads NAS parallel benchmark (NPB) suite - Integer Sort (IS) workload
E2eNode Suite [sig-node] Node Performance Testing [Serial] [Slow] Run node performance testing with pre-defined workloads TensorFlow workload
E2eNode Suite [sig-node] NodeLease NodeLease should have OwnerReferences set
E2eNode Suite [sig-node] NodeLease NodeLease the kubelet should create and update a lease in the kube-node-lease namespace
E2eNode Suite [sig-node] NodeLease NodeLease the kubelet should report node status infrequently
E2eNode Suite [sig-node] OSArchLabelReconciliation [Serial] [Slow] [Disruptive] Kubelet should reconcile the OS and Arch labels when restarted
E2eNode Suite [sig-node] OSArchLabelReconciliation [Serial] [Slow] [Disruptive] Kubelet should reconcile the OS and Arch labels when running
E2eNode Suite [sig-node] POD Resources [Serial] [Feature:PodResources][NodeFeature:PodResources] with KubeVirt device plugin, which reports resources w/o hardware topology with CPU manager Static policy should return proper podresources the same as before the restart of kubelet
E2eNode Suite [sig-node] POD Resources [Serial] [Feature:PodResources][NodeFeature:PodResources] with SRIOV devices in the system with CPU manager None policy should return the expected responses
E2eNode Suite [sig-node] POD Resources [Serial] [Feature:PodResources][NodeFeature:PodResources] with SRIOV devices in the system with CPU manager Static policy should return the expected responses
E2eNode Suite [sig-node] POD Resources [Serial] [Feature:PodResources][NodeFeature:PodResources] without SRIOV devices in the system with CPU manager Static policy should return the expected responses
E2eNode Suite [sig-node] PodOSRejection [NodeConformance] Kubelet should reject pod when the node OS doesn't match pod's OS
E2eNode Suite [sig-node] PodTemplates should delete a collection of pod templates [Conformance]
E2eNode Suite [sig-node] PodTemplates should replace a pod template [Conformance]
E2eNode Suite [sig-node] PodTemplates should run the lifecycle of PodTemplates [Conformance]
E2eNode Suite [sig-node] Pods should allow activeDeadlineSeconds to be updated [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Pods should be submitted and removed [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Pods should be updated [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Pods should cap back-off at MaxContainerBackOff [Slow][NodeConformance]
E2eNode Suite [sig-node] Pods should contain environment variables for services [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Pods should delete a collection of pods [Conformance]
E2eNode Suite [sig-node] Pods should get a host IP [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Pods should have their auto-restart back-off timer reset on image update [Slow][NodeConformance]
E2eNode Suite [sig-node] Pods should run through the lifecycle of Pods and PodStatus [Conformance]
E2eNode Suite [sig-node] Pods should support pod readiness gates [NodeConformance]
E2eNode Suite [sig-node] Pods should support remote command execution over websockets [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Pods should support retrieving logs from the container over websockets [NodeConformance] [Conformance]
E2eNode Suite [sig-node] PriorityLocalStorageEvictionOrdering [Slow] [Serial] [Disruptive][NodeFeature:Eviction] when we run containers that should cause DiskPressure should eventually evict all of the correct pods
E2eNode Suite [sig-node] PriorityMemoryEvictionOrdering [Slow] [Serial] [Disruptive][NodeFeature:Eviction] when we run containers that should cause MemoryPressure should eventually evict all of the correct pods
E2eNode Suite [sig-node] PriorityPidEvictionOrdering [Slow] [Serial] [Disruptive][NodeFeature:Eviction] when we run containers that should cause PIDPressure should eventually evict all of the correct pods
E2eNode Suite [sig-node] PrivilegedPod [NodeConformance] should enable privileged commands [LinuxOnly]
E2eNode Suite [sig-node] Probing container should *not* be restarted by liveness probe because startup probe delays it
E2eNode Suite [sig-node] Probing container should *not* be restarted with a /healthz http liveness probe [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Probing container should *not* be restarted with a GRPC liveness probe [NodeConformance]
E2eNode Suite [sig-node] Probing container should *not* be restarted with a exec "cat /tmp/health" liveness probe [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Probing container should *not* be restarted with a non-local redirect http liveness probe
E2eNode Suite [sig-node] Probing container should *not* be restarted with a tcp:8080 liveness probe [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Probing container should be ready immediately after startupProbe succeeds
E2eNode Suite [sig-node] Probing container should be restarted by liveness probe after startup probe enables it
E2eNode Suite [sig-node] Probing container should be restarted startup probe fails
E2eNode Suite [sig-node] Probing container should be restarted with a /healthz http liveness probe [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Probing container should be restarted with a GRPC liveness probe [NodeConformance]
E2eNode Suite [sig-node] Probing container should be restarted with a exec "cat /tmp/health" liveness probe [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Probing container should be restarted with a failing exec liveness probe that took longer than the timeout
E2eNode Suite [sig-node] Probing container should be restarted with a local redirect http liveness probe
E2eNode Suite [sig-node] Probing container should be restarted with an exec liveness probe with timeout [MinimumKubeletVersion:1.20] [NodeConformance]
E2eNode Suite [sig-node] Probing container should have monotonically increasing restart count [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Probing container should not be ready with an exec readiness probe timeout [MinimumKubeletVersion:1.20] [NodeConformance]
E2eNode Suite [sig-node] Probing container should override timeoutGracePeriodSeconds when LivenessProbe field is set [Feature:ProbeTerminationGracePeriod]
E2eNode Suite [sig-node] Probing container should override timeoutGracePeriodSeconds when StartupProbe field is set [Feature:ProbeTerminationGracePeriod]
E2eNode Suite [sig-node] Probing container with readiness probe should not be ready before initial delay and never restart [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Probing container with readiness probe that fails should never be ready and never restart [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Resource-usage [Serial] [Slow] regular resource usage tracking resource tracking for 0 pods per node [Benchmark]
E2eNode Suite [sig-node] Resource-usage [Serial] [Slow] regular resource usage tracking resource tracking for 10 pods per node
E2eNode Suite [sig-node] Resource-usage [Serial] [Slow] regular resource usage tracking resource tracking for 10 pods per node [Benchmark]
E2eNode Suite [sig-node] Resource-usage [Serial] [Slow] regular resource usage tracking resource tracking for 35 pods per node [Benchmark]
E2eNode Suite [sig-node] Resource-usage [Serial] [Slow] regular resource usage tracking resource tracking for 90 pods per node [Benchmark]
E2eNode Suite [sig-node] ResourceMetricsAPI [NodeFeature:ResourceMetrics] when querying /resource/metrics should report resource usage through the resource metrics api
E2eNode Suite [sig-node] Restart [Serial] [Slow] [Disruptive] Container Runtime Network should recover from ip leak
E2eNode Suite [sig-node] Restart [Serial] [Slow] [Disruptive] Kubelet should correctly account for terminated pods after restart
E2eNode Suite [sig-node] RuntimeClass should support RuntimeClasses API operations [Conformance]
E2eNode Suite [sig-node] RuntimeClass should reject a Pod requesting a RuntimeClass with an unconfigured handler [NodeFeature:RuntimeHandler]
E2eNode Suite [sig-node] RuntimeClass should reject a Pod requesting a deleted RuntimeClass [NodeConformance] [Conformance]
E2eNode Suite [sig-node] RuntimeClass should reject a Pod requesting a non-existent RuntimeClass [NodeConformance] [Conformance]
E2eNode Suite [sig-node] RuntimeClass should run a Pod requesting a RuntimeClass with a configured handler [NodeFeature:RuntimeHandler]
E2eNode Suite [sig-node] RuntimeClass should schedule a Pod requesting a RuntimeClass and initialize its Overhead [NodeConformance] [Conformance]
E2eNode Suite [sig-node] RuntimeClass should schedule a Pod requesting a RuntimeClass without PodOverhead [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Secrets should be consumable from pods in env vars [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Secrets should be consumable via the environment [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Secrets should fail to create secret due to empty secret key [Conformance]
E2eNode Suite [sig-node] Secrets should patch a secret [Conformance]
E2eNode Suite [sig-node] Security Context When creating a container with runAsNonRoot should not run with an explicit root user ID [LinuxOnly]
E2eNode Suite [sig-node] Security Context When creating a container with runAsNonRoot should not run without a specified user ID
E2eNode Suite [sig-node] Security Context When creating a container with runAsNonRoot should run with an explicit non-root user ID [LinuxOnly]
E2eNode Suite [sig-node] Security Context When creating a container with runAsNonRoot should run with an image specified user ID
E2eNode Suite [sig-node] Security Context When creating a container with runAsUser should run the container with uid 0 [LinuxOnly] [NodeConformance]
E2eNode Suite [sig-node] Security Context When creating a container with runAsUser should run the container with uid 65534 [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Security Context When creating a pod with privileged should run the container as privileged when true [LinuxOnly] [NodeFeature:HostAccess]
E2eNode Suite [sig-node] Security Context When creating a pod with privileged should run the container as unprivileged when false [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Security Context When creating a pod with readOnlyRootFilesystem should run the container with readonly rootfs when readOnlyRootFilesystem=true [LinuxOnly] [NodeConformance]
E2eNode Suite [sig-node] Security Context When creating a pod with readOnlyRootFilesystem should run the container with writable rootfs when readOnlyRootFilesystem=false [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Security Context [NodeConformance][LinuxOnly] Container PID namespace sharing containers in pods using isolated PID namespaces should all receive PID 1
E2eNode Suite [sig-node] Security Context [NodeConformance][LinuxOnly] Container PID namespace sharing processes in containers sharing a pod namespace should be able to see each other
E2eNode Suite [sig-node] Security Context when creating a pod in the host IPC namespace should not show the shared memory ID in the non-hostIPC containers [NodeFeature:HostAccess]
E2eNode Suite [sig-node] Security Context when creating a pod in the host IPC namespace should show the shared memory ID in the host IPC containers [NodeFeature:HostAccess]
E2eNode Suite [sig-node] Security Context when creating a pod in the host PID namespace should not show its pid in the non-hostpid containers [NodeFeature:HostAccess]
E2eNode Suite [sig-node] Security Context when creating a pod in the host PID namespace should show its pid in the host PID namespace [NodeFeature:HostAccess]
E2eNode Suite [sig-node] Security Context when creating a pod in the host network namespace should listen on same port in the host network containers [NodeFeature:HostAccess]
E2eNode Suite [sig-node] Security Context when creating a pod in the host network namespace shouldn't show the same port in the non-hostnetwork containers [NodeFeature:HostAccess]
E2eNode Suite [sig-node] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when not explicitly set and uid != 0 [LinuxOnly] [NodeConformance]
E2eNode Suite [sig-node] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when true [LinuxOnly] [NodeConformance]
E2eNode Suite [sig-node] Security Context when creating containers with AllowPrivilegeEscalation should not allow privilege escalation when false [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Summary API [NodeConformance] when querying /stats/summary should report resource usage through the stats api
E2eNode Suite [sig-node] Sysctls [LinuxOnly] [NodeConformance] should not launch unsafe, but not explicitly enabled sysctls on the node [MinimumKubeletVersion:1.21]
E2eNode Suite [sig-node] Sysctls [LinuxOnly] [NodeConformance] should reject invalid sysctls [MinimumKubeletVersion:1.21] [Conformance]
E2eNode Suite [sig-node] Sysctls [LinuxOnly] [NodeConformance] should support sysctls [MinimumKubeletVersion:1.21] [Conformance]
E2eNode Suite [sig-node] SystemNodeCriticalPod [Slow] [Serial] [Disruptive] [NodeFeature:SystemNodeCriticalPod] when create a system-node-critical pod should not be evicted upon DiskPressure
E2eNode Suite [sig-node] Topology Manager [Serial] [Feature:TopologyManager][NodeFeature:TopologyManager] With kubeconfig updated to static CPU Manager policy run the Topology Manager tests run Topology Manager node alignment test suite
E2eNode Suite [sig-node] Topology Manager [Serial] [Feature:TopologyManager][NodeFeature:TopologyManager] With kubeconfig updated to static CPU Manager policy run the Topology Manager tests run Topology Manager policy test suite
E2eNode Suite [sig-node] Topology Manager [Serial] [Feature:TopologyManager][NodeFeature:TopologyManager] With kubeconfig updated to static CPU Manager policy run the Topology Manager tests run the Topology Manager pod scope alignment test suite
E2eNode Suite [sig-node] Variable Expansion should allow composing env vars into new env vars [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Variable Expansion should allow substituting values in a container's args [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Variable Expansion should allow substituting values in a container's command [NodeConformance] [Conformance]
E2eNode Suite [sig-node] Variable Expansion should allow substituting values in a volume subpath [Conformance]
E2eNode Suite [sig-node] Variable Expansion should fail substituting values in a volume subpath with absolute path [Slow] [Conformance]
E2eNode Suite [sig-node] Variable Expansion should fail substituting values in a volume subpath with backticks [Slow] [Conformance]
E2eNode Suite [sig-node] Variable Expansion should succeed in writing subpaths in container [Slow] [Conformance]
E2eNode Suite [sig-node] Variable Expansion should verify that a failing subpath expansion can be modified during the lifecycle of a container [Slow] [Conformance]
E2eNode Suite [sig-storage] ConfigMap Should fail non-optional pod creation due to configMap object does not exist [Slow]
E2eNode Suite [sig-storage] ConfigMap Should fail non-optional pod creation due to the key in the configMap object does not exist [Slow]
E2eNode Suite [sig-storage] ConfigMap binary data should be reflected in volume [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] ConfigMap optional updates should be reflected in volume [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] ConfigMap should be consumable from pods in volume [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] ConfigMap should be consumable from pods in volume as non-root [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] ConfigMap should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]
E2eNode Suite [sig-storage] ConfigMap should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeFeature:FSGroup]
E2eNode Suite [sig-storage] ConfigMap should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] ConfigMap should be consumable from pods in volume with mappings [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] ConfigMap should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] ConfigMap should be consumable from pods in volume with mappings as non-root [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] ConfigMap should be consumable from pods in volume with mappings as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]
E2eNode Suite [sig-storage] ConfigMap should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] ConfigMap should be immutable if `immutable` field is set [Conformance]
E2eNode Suite [sig-storage] ConfigMap updates should be reflected in volume [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Downward API volume should provide container's cpu limit [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Downward API volume should provide container's cpu request [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Downward API volume should provide container's memory limit [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Downward API volume should provide container's memory request [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Downward API volume should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Downward API volume should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Downward API volume should provide podname as non-root with fsgroup [LinuxOnly] [NodeFeature:FSGroup]
E2eNode Suite [sig-storage] Downward API volume should provide podname as non-root with fsgroup and defaultMode [LinuxOnly] [NodeFeature:FSGroup]
E2eNode Suite [sig-storage] Downward API volume should provide podname only [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Downward API volume should set DefaultMode on files [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Downward API volume should set mode on item file [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Downward API volume should update annotations on modification [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Downward API volume should update labels on modification [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] EmptyDir volumes pod should support memory backed volumes of specified size
E2eNode Suite [sig-storage] EmptyDir volumes pod should support shared volumes between containers [Conformance]
E2eNode Suite [sig-storage] EmptyDir volumes should support (non-root,0644,default) [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] EmptyDir volumes should support (non-root,0644,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] EmptyDir volumes should support (non-root,0666,default) [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] EmptyDir volumes should support (non-root,0666,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] EmptyDir volumes should support (non-root,0777,default) [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] EmptyDir volumes should support (non-root,0777,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] EmptyDir volumes should support (root,0644,default) [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] EmptyDir volumes should support (root,0644,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] EmptyDir volumes should support (root,0666,default) [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] EmptyDir volumes should support (root,0666,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] EmptyDir volumes should support (root,0777,default) [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] EmptyDir volumes should support (root,0777,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] EmptyDir volumes volume on default medium should have the correct mode [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] EmptyDir volumes volume on tmpfs should have the correct mode [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] files with FSGroup ownership should support (root,0644,tmpfs)
E2eNode Suite [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] new files should be created with FSGroup ownership when container is non-root
E2eNode Suite [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] new files should be created with FSGroup ownership when container is root
E2eNode Suite [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] nonexistent volume subPath should have the correct mode and owner using FSGroup
E2eNode Suite [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] volume on default medium should have the correct mode using FSGroup
E2eNode Suite [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] volume on tmpfs should have the correct mode using FSGroup
E2eNode Suite [sig-storage] HostPath should give a volume the correct mode [LinuxOnly] [NodeConformance]
E2eNode Suite [sig-storage] HostPath should support r/w [NodeConformance]
E2eNode Suite [sig-storage] HostPath should support subPath [NodeConformance]
E2eNode Suite [sig-storage] Projected combined should project all components that make up the projection API [Projection][NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected configMap Should fail non-optional pod creation due to configMap object does not exist [Slow]
E2eNode Suite [sig-storage] Projected configMap Should fail non-optional pod creation due to the key in the configMap object does not exist [Slow]
E2eNode Suite [sig-storage] Projected configMap optional updates should be reflected in volume [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected configMap should be consumable from pods in volume [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected configMap should be consumable from pods in volume as non-root [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected configMap should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]
E2eNode Suite [sig-storage] Projected configMap should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeFeature:FSGroup]
E2eNode Suite [sig-storage] Projected configMap should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected configMap should be consumable from pods in volume with mappings [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected configMap should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected configMap should be consumable from pods in volume with mappings as non-root [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected configMap should be consumable from pods in volume with mappings as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]
E2eNode Suite [sig-storage] Projected configMap should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected configMap updates should be reflected in volume [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected downwardAPI should provide container's cpu limit [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected downwardAPI should provide container's cpu request [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected downwardAPI should provide container's memory limit [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected downwardAPI should provide container's memory request [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected downwardAPI should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected downwardAPI should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected downwardAPI should provide podname as non-root with fsgroup [LinuxOnly] [NodeFeature:FSGroup]
E2eNode Suite [sig-storage] Projected downwardAPI should provide podname as non-root with fsgroup and defaultMode [LinuxOnly] [NodeFeature:FSGroup]
E2eNode Suite [sig-storage] Projected downwardAPI should provide podname only [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected downwardAPI should set DefaultMode on files [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected downwardAPI should set mode on item file [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected downwardAPI should update annotations on modification [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected downwardAPI should update labels on modification [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected secret Should fail non-optional pod creation due to secret object does not exist [Slow]
E2eNode Suite [sig-storage] Projected secret Should fail non-optional pod creation due to the key in the secret object does not exist [Slow]
E2eNode Suite [sig-storage] Projected secret optional updates should be reflected in volume [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected secret should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance]
E2eNode Suite [sig-storage] Projected secret should be consumable from pods in volume [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected secret should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected secret should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected secret should be consumable from pods in volume with mappings [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected secret should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Projected secret should be consumable in multiple volumes in a pod [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Secrets Should fail non-optional pod creation due to secret object does not exist [Slow]
E2eNode Suite [sig-storage] Secrets Should fail non-optional pod creation due to the key in the secret object does not exist [Slow]
E2eNode Suite [sig-storage] Secrets optional updates should be reflected in volume [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Secrets should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Secrets should be consumable from pods in volume [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Secrets should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Secrets should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Secrets should be consumable from pods in volume with mappings [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Secrets should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Secrets should be consumable in multiple volumes in a pod [NodeConformance] [Conformance]
E2eNode Suite [sig-storage] Secrets should be immutable if `immutable` field is set [Conformance]
E2eNode Suite [sig-storage] Volumes GlusterFS should be mountable
E2eNode Suite [sig-storage] Volumes NFSv3 should be mountable for NFSv3
E2eNode Suite [sig-storage] Volumes NFSv4 should be mountable for NFSv4