This job view page is being replaced by Spyglass soon. Check out the new job view.
PRdims: Remove in-tree openstack cloud provider
ResultFAILURE
Tests 18 failed / 40 succeeded
Started2022-08-09 17:40
Elapsed2h1m
Revision
Builder60a37a8e-180a-11ed-aad2-06341cdbb55e
Refs master:42a5eb48
67782:eca03be6
infra-commitf24e01ae9
job-versionv1.25.0-beta.0.37+ccdc018197ba17
kubetest-versionv20220804-4fa19ea91a
repok8s.io/kubernetes
repo-commitccdc018197ba17f501a36b115b14fb7180c8cedc
repos{u'k8s.io/kubernetes': u'master:42a5eb48184547465ef4be962af2a07422311f82,67782:eca03be673c56d302837b96fc4f4e1f1ce36e949'}
revisionv1.25.0-beta.0.37+ccdc018197ba17

Test Failures


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a mutating webhook should work [Conformance] 5m3s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\spatching\/updating\sa\smutating\swebhook\sshould\swork\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:826
k8s.io/kubernetes/test/e2e/apimachinery.deployWebhookAndService(0xc000d231e0, {0xc002b3c540, 0x2c}, 0xc002d3c690, 0x20fb, 0x20fc)
	test/e2e/apimachinery/webhook.go:826 +0xf12
k8s.io/kubernetes/test/e2e/apimachinery.glob..func27.1()
	test/e2e/apimachinery/webhook.go:101 +0x226
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny attaching pod [Conformance] 25s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sbe\sable\sto\sdeny\sattaching\spod\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:211
k8s.io/kubernetes/test/e2e/apimachinery.glob..func27.5()
	test/e2e/apimachinery/webhook.go:211 +0x59
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny pod and configmap creation [Conformance] 5m2s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sbe\sable\sto\sdeny\spod\sand\sconfigmap\screation\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:826
k8s.io/kubernetes/test/e2e/apimachinery.deployWebhookAndService(0xc000d231e0, {0xc0035ca2d0, 0x2c}, 0xc002aec8c0, 0x20fb, 0x20fc)
	test/e2e/apimachinery/webhook.go:826 +0xf12
k8s.io/kubernetes/test/e2e/apimachinery.glob..func27.1()
	test/e2e/apimachinery/webhook.go:101 +0x226
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-apps] DisruptionController should block an eviction until the PDB is updated to allow it [Conformance] 10m12s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-apps\]\sDisruptionController\sshould\sblock\san\seviction\suntil\sthe\sPDB\sis\supdated\sto\sallow\sit\s\[Conformance\]$'
test/e2e/apps/disruption.go:579
k8s.io/kubernetes/test/e2e/apps.waitForPodsOrDie({0x7b51e18?, 0xc00161dc80}, {0xc0028ca5b0, 0xf}, 0x3)
	test/e2e/apps/disruption.go:579 +0x167
k8s.io/kubernetes/test/e2e/apps.glob..func6.8()
	test/e2e/apps/disruption.go:391 +0x54d
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-auth] ServiceAccounts should mount an API token into pods [Conformance] 5m0s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-auth\]\sServiceAccounts\sshould\smount\san\sAPI\stoken\sinto\spods\s\s\[Conformance\]$'
test/e2e/auth/service_accounts.go:96
k8s.io/kubernetes/test/e2e/auth.glob..func4.2()
	test/e2e/auth/service_accounts.go:96 +0x5b4
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-cli] Kubectl client Kubectl logs should be able to retrieve and filter logs [Conformance] 5m0s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-cli\]\sKubectl\sclient\sKubectl\slogs\sshould\sbe\sable\sto\sretrieve\sand\sfilter\slogs\s\s\[Conformance\]$'
vendor/github.com/onsi/ginkgo/v2/internal/suite.go:596

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-network] DNS should provide DNS for pods for Subdomain [Conformance] 10m45s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-network\]\sDNS\sshould\sprovide\sDNS\sfor\spods\sfor\sSubdomain\s\[Conformance\]$'
test/e2e/network/dns_common.go:455
k8s.io/kubernetes/test/e2e/network.assertFilesContain({0xc002719b80?, 0x8?, 0x8?}, {0x7231335?, 0x7?}, 0xc0016aa000?, {0x7b51e18?, 0xc002b3be00?}, 0x0?, {0x0, ...})
	test/e2e/network/dns_common.go:455 +0x1dc
k8s.io/kubernetes/test/e2e/network.assertFilesExist(...)
	test/e2e/network/dns_common.go:449
k8s.io/kubernetes/test/e2e/network.validateDNSResults(0xc000b7af20, 0xc0016aa000, {0xc002719b80, 0x8, 0x8})
	test/e2e/network/dns_common.go:512 +0x452
k8s.io/kubernetes/test/e2e/network.glob..func2.8()
	test/e2e/network/dns.go:324 +0x965
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-network] DNS should provide DNS for the cluster [Conformance] 10m30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-network\]\sDNS\sshould\sprovide\sDNS\sfor\sthe\scluster\s\s\[Conformance\]$'
test/e2e/network/dns_common.go:455
k8s.io/kubernetes/test/e2e/network.assertFilesContain({0xc002de3d80?, 0x4?, 0x4?}, {0x7231335?, 0x7?}, 0xc001689c00?, {0x7b51e18?, 0xc000857380?}, 0x0?, {0x0, ...})
	test/e2e/network/dns_common.go:455 +0x1dc
k8s.io/kubernetes/test/e2e/network.assertFilesExist(...)
	test/e2e/network/dns_common.go:449
k8s.io/kubernetes/test/e2e/network.validateDNSResults(0xc000b7af20, 0xc001689c00, {0xc002de3d80, 0x4, 0x4})
	test/e2e/network/dns_common.go:512 +0x452
k8s.io/kubernetes/test/e2e/network.glob..func2.1()
	test/e2e/network/dns.go:66 +0x41e
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-network] DNS should resolve DNS of partial qualified names for services [LinuxOnly] [Conformance] 10m58s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-network\]\sDNS\sshould\sresolve\sDNS\sof\spartial\squalified\snames\sfor\sservices\s\[LinuxOnly\]\s\[Conformance\]$'
test/e2e/network/dns_common.go:455
k8s.io/kubernetes/test/e2e/network.assertFilesContain({0xc0021ebb80?, 0x18?, 0x28?}, {0x7231335?, 0x7?}, 0xc0016b4800?, {0x7b51e18?, 0xc001c9d800?}, 0x0?, {0x0, ...})
	test/e2e/network/dns_common.go:455 +0x1dc
k8s.io/kubernetes/test/e2e/network.assertFilesExist(...)
	test/e2e/network/dns_common.go:449
k8s.io/kubernetes/test/e2e/network.validateDNSResults(0xc000b7af20, 0xc0016b4800, {0xc0021ebb80, 0x18, 0x28})
	test/e2e/network/dns_common.go:512 +0x452
k8s.io/kubernetes/test/e2e/network.glob..func2.6()
	test/e2e/network/dns.go:239 +0xc75
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-network] Networking Granular Checks: Pods should function for intra-pod communication: udp [NodeConformance] [Conformance] 5m0s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-network\]\sNetworking\sGranular\sChecks\:\sPods\sshould\sfunction\sfor\sintra\-pod\scommunication\:\sudp\s\[NodeConformance\]\s\[Conformance\]$'
test/e2e/framework/network/utils.go:864
k8s.io/kubernetes/test/e2e/framework/network.(*NetworkingTestConfig).createNetProxyPods(0xc000d168c0, {0x7236ed3, 0x9}, 0xc003b7f0e0)
	test/e2e/framework/network/utils.go:864 +0x1d0
k8s.io/kubernetes/test/e2e/framework/network.(*NetworkingTestConfig).setupCore(0xc000d168c0, 0x47?)
	test/e2e/framework/network/utils.go:761 +0x55
k8s.io/kubernetes/test/e2e/framework/network.NewCoreNetworkingTestConfig(0xc0007706e0, 0x0)
	test/e2e/framework/network/utils.go:142 +0xfb
k8s.io/kubernetes/test/e2e/common/network.glob..func1.1.3()
	test/e2e/common/network/networking.go:94 +0x28
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-network] Services should be able to switch session affinity for NodePort service [LinuxOnly] [Conformance] 9.26s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-network\]\sServices\sshould\sbe\sable\sto\sswitch\ssession\saffinity\sfor\sNodePort\sservice\s\[LinuxOnly\]\s\[Conformance\]$'
test/e2e/network/service.go:3828
k8s.io/kubernetes/test/e2e/network.execAffinityTestForNonLBServiceWithOptionalTransition(0x72a2fca?, {0x7b51e18, 0xc00265c600}, 0xc002855900, 0x1)
	test/e2e/network/service.go:3828 +0x1d0
k8s.io/kubernetes/test/e2e/network.execAffinityTestForNonLBServiceWithTransition(...)
	test/e2e/network/service.go:3809
k8s.io/kubernetes/test/e2e/network.glob..func25.30()
	test/e2e/network/service.go:2240 +0x90
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-network] Services should have session affinity timeout work for NodePort service [LinuxOnly] [Conformance] 2m49s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-network\]\sServices\sshould\shave\ssession\saffinity\stimeout\swork\sfor\sNodePort\sservice\s\[LinuxOnly\]\s\[Conformance\]$'
test/e2e/network/service.go:3745
k8s.io/kubernetes/test/e2e/network.execAffinityTestForSessionAffinityTimeout(0xc000ba31e0, {0x7b51e18, 0xc003594f00}, 0xc003674780)
	test/e2e/network/service.go:3745 +0x316
k8s.io/kubernetes/test/e2e/network.glob..func25.29()
	test/e2e/network/service.go:2224 +0x8b
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop exec hook properly [NodeConformance] [Conformance] 44s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-node\]\sContainer\sLifecycle\sHook\swhen\screate\sa\spod\swith\slifecycle\shook\sshould\sexecute\sprestop\sexec\shook\sproperly\s\[NodeConformance\]\s\[Conformance\]$'
test/e2e/common/node/lifecycle_hook.go:89
k8s.io/kubernetes/test/e2e/common/node.glob..func12.1.2(0xc0018a8800)
	test/e2e/common/node/lifecycle_hook.go:89 +0x326
k8s.io/kubernetes/test/e2e/common/node.glob..func12.1.4()
	test/e2e/common/node/lifecycle_hook.go:123 +0x336