This job view page is being replaced by Spyglass soon. Check out the new job view.
PRjkuruba: feat(components): AWS SageMaker - Changes for updating an existing endpoint
ResultFAILURE
Tests 0 failed / 0 succeeded
Started2020-09-18 21:45
Elapsed31m19s
Revisionf429a765260669b2a9feb39858be6729ffda9538
Refs 4424

No Test Failures!


Error lines from build-log.txt

... skipping 151 lines ...
NAME              LOCATION    MASTER_VERSION  MASTER_IP      MACHINE_TYPE   NODE_VERSION    NUM_NODES  STATUS
e2e-70109f2-5032  us-east1-b  1.15.12-gke.20  35.231.108.40  e2-standard-8  1.15.12-gke.20  2          RUNNING
++ gcloud container clusters get-credentials e2e-70109f2-5032
Fetching cluster endpoint and auth data.
kubeconfig entry generated for e2e-70109f2-5032.
++ kubectl delete namespace kubeflow --wait
Error from server (NotFound): namespaces "kubeflow" not found
++ echo 'No need to delete kubeflow namespace. It doesn'\''t exist.'
No need to delete kubeflow namespace. It doesn't exist.
++ kubectl create namespace kubeflow --dry-run -o yaml
++ kubectl apply -f -
W0918 21:53:50.414150     409 helpers.go:553] --dry-run is deprecated and can be replaced with --dry-run=client.
namespace/kubeflow created
... skipping 53 lines ...
++ retry gcloud projects add-iam-policy-binding ml-pipeline-test --member=serviceAccount:test-argo@ml-pipeline-test.iam.gserviceaccount.com --role=roles/editor
++ local n=1
++ local max=3
++ local delay=2
++ true
++ gcloud projects add-iam-policy-binding ml-pipeline-test --member=serviceAccount:test-argo@ml-pipeline-test.iam.gserviceaccount.com --role=roles/editor
ERROR: (gcloud.projects.add-iam-policy-binding) Resource in project [ml-pipeline-test:setIamPolicy] is the subject of a conflict: There were concurrent policy changes. Please retry the whole read-modify-write with exponential backoff.
++ [[ 1 -lt 3 ]]
++ (( n++ ))
++ echo 'Command failed. Attempt 2/3:'
++ sleep 2
++ true
++ gcloud projects add-iam-policy-binding ml-pipeline-test --member=serviceAccount:test-argo@ml-pipeline-test.iam.gserviceaccount.com --role=roles/editor
Updated IAM policy for project [ml-pipeline-test].
++ break
++ retry bind_gsa_and_ksa test-argo test-runner ml-pipeline-test kubeflow
... skipping 670 lines ...

The following resources will be created or updated to create workload identity bindings between GSAs and KSAs:
* Google service accounts (GSAs)
* Service account IAM policy bindings on these GSAs
* Kubernetes service accounts with annotations in namespace "kubeflow".

Note, this script is designed to be idempotent. If something went wrong, you can safely fix the error and rerun this script.

Env variables set:
* PROJECT_ID=ml-pipeline-test
* RESOURCE_PREFIX=e2e-70109f2-5032
* NAMESPACE=kubeflow
* USE_GCP_MANAGED_STORAGE=false
... skipping 23 lines ...
* Bound KSA ml-pipeline-ui to GSA test-kfp-system
Updated IAM policy for serviceAccount [test-kfp-system@ml-pipeline-test.iam.gserviceaccount.com].
KSA ml-pipeline-visualizationserver already exists
serviceaccount/ml-pipeline-visualizationserver annotated
* Bound KSA ml-pipeline-visualizationserver to GSA test-kfp-system
Updated IAM policy for serviceAccount [test-kfp-system@ml-pipeline-test.iam.gserviceaccount.com].
Error from server (NotFound): serviceaccounts "kubeflow-pipelines-minio-gcs-gateway" not found
serviceaccount/kubeflow-pipelines-minio-gcs-gateway created
KSA kubeflow-pipelines-minio-gcs-gateway created
serviceaccount/kubeflow-pipelines-minio-gcs-gateway annotated
* Bound KSA kubeflow-pipelines-minio-gcs-gateway to GSA test-kfp-system
Updated IAM policy for serviceAccount [test-kfp-system@ml-pipeline-test.iam.gserviceaccount.com].
Error from server (NotFound): serviceaccounts "kubeflow-pipelines-cloudsql-proxy" not found
serviceaccount/kubeflow-pipelines-cloudsql-proxy created
KSA kubeflow-pipelines-cloudsql-proxy created
serviceaccount/kubeflow-pipelines-cloudsql-proxy annotated
* Bound KSA kubeflow-pipelines-cloudsql-proxy to GSA test-kfp-system
Binding each kfp user KSA to test-kfp-user
Updated IAM policy for serviceAccount [test-kfp-user@ml-pipeline-test.iam.gserviceaccount.com].
... skipping 431 lines ...
+ ARGO_WORKFLOW=integration-test-trz9r
+ echo 'test workflow submitted successfully'
test workflow submitted successfully
+ source /home/prow/go/src/github.com/kubeflow/pipelines/test/check-argo-status.sh
++ set -e
++ WORKFLOW_COMPLETE_KEYWORD=completed=true
++ WORKFLOW_FAILED_KEYWORD=phase=Failed
+++ expr 2700 / 20
++ PULL_ARGO_WORKFLOW_STATUS_MAX_ATTEMPT=135
++ workflow_completed=false
++ workflow_failed=false
++ echo 'check status of argo workflow integration-test-trz9r....'
check status of argo workflow integration-test-trz9r....
... skipping 314 lines ...
++ grep completed=true --quiet
++ echo 'Workflow integration-test-trz9r is not finished: NAME                     STATUS    AGE     LABELS
integration-test-trz9r   Running   9m24s   workflows.argoproj.io/phase=Running - Sleep for 20 seconds...'
Workflow integration-test-trz9r is not finished: NAME                     STATUS    AGE     LABELS
integration-test-trz9r   Running   9m24s   workflows.argoproj.io/phase=Running - Sleep for 20 seconds...
++ sleep 20
{"component":"entrypoint","file":"prow/entrypoint/run.go:169","func":"k8s.io/test-infra/prow/entrypoint.Options.ExecuteProcess","level":"error","msg":"Entrypoint received interrupt: terminated","severity":"error","time":"2020-09-18T22:16:47Z"}