Recent runs || View in Spyglass
PR | lzhecheng: [e2e] Support dual-stack - ensureloadbalancer & nsg |
Result | FAILURE |
Tests | 2 failed / 44 succeeded |
Started | |
Elapsed | 2h29m |
Revision | eb6c5582d0ff090b672551fef4d209900bed811e |
Refs |
3268 |
go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Cloud\sprovider\sAzure\se2e\ssuite\s\[It\]\sNetwork\ssecurity\sgroup\sshould\sadd\sthe\srule\swhen\sexpose\sa\sservice\s\[NSG\]$'
[FAILED] Security rule for service nsg-test not exists Expected <bool>: false to be true In [It] at: /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:104 @ 02/01/23 10:46:05.701 There were additional failures detected after the initial failure. These are visible in the timelinefrom junit_01.xml
> Enter [BeforeEach] Network security group - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:58 @ 02/01/23 10:41:43.252 Feb 1 10:41:43.252: INFO: Creating a kubernetes client [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:56] Feb 1 10:41:43.252: INFO: Kubernetes configuration file name: /home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:64] Feb 1 10:41:43.359: INFO: Created a test namespace "e2e-tests-nsg-pxh29" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:110] Feb 1 10:41:43.360: INFO: Creating a kubernetes client [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:56] Feb 1 10:41:43.360: INFO: Kubernetes configuration file name: /home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:64] Feb 1 10:41:43.500: INFO: Kubernetes configuration file name: /home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:107] Feb 1 10:41:43.500: INFO: Running '/usr/local/bin/kubectl --kubeconfig=/home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig cluster-info dump | grep service-cluster-ip-range' [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:149] Feb 1 10:41:49.222: INFO: Creating deployment nsg-test [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:69] Feb 1 10:41:49.328: INFO: Waiting for backend pods to be ready [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:74] Feb 1 10:41:49.461: INFO: 5 pods in namespace e2e-tests-nsg-pxh29 are pending [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:87] Feb 1 10:41:59.593: INFO: 0 pods in namespace e2e-tests-nsg-pxh29 are pending [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:87] < Exit [BeforeEach] Network security group - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:58 @ 02/01/23 10:41:59.593 (16.341s) > Enter [It] should add the rule when expose a service - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:91 @ 02/01/23 10:41:59.593 STEP: Creating a service and expose it - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:92 @ 02/01/23 10:41:59.593 Feb 1 10:41:59.593: INFO: Creating service nsg-test in namespace e2e-tests-nsg-pxh29 [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/service_annotations.go:1219] Feb 1 10:41:59.784: INFO: Successfully created LoadBalancer service nsg-test in namespace e2e-tests-nsg-pxh29 [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/service_annotations.go:1223] Feb 1 10:41:59.784: INFO: Waiting service to expose... [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/service_annotations.go:1226] Feb 1 10:41:59.886: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:42:10.008: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:42:19.995: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:42:29.990: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:42:39.998: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:42:49.995: INFO: Exposure successfully, get external ip: [20.166.216.165] [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:189] Feb 1 10:42:49.995: INFO: Creating a hostNetwork Pod exec-agnhost-pod in namespace e2e-tests-nsg-pxh29 to exec [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:159] Feb 1 10:42:49.995: INFO: creating pod exec-agnhost-pod in namespace e2e-tests-nsg-pxh29 [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:152] Feb 1 10:42:50.214: INFO: waiting for the pod status to be Running, current status: Pending [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:317] Feb 1 10:43:00.322: INFO: checking the connectivity of address 20.166.216.165 80 with protocol TCP [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:133] Feb 1 10:43:00.322: INFO: Kubernetes configuration file name: /home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:107] Feb 1 10:43:00.322: INFO: Running '/usr/local/bin/kubectl --kubeconfig=/home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig --namespace=e2e-tests-nsg-pxh29 exec exec-agnhost-pod -- /bin/sh -x -c nc -vz -w 4 20.166.216.165 80' [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:149] Feb 1 10:43:01.440: INFO: stderr: "+ nc -vz -w 4 20.166.216.165 80\nConnection to 20.166.216.165 80 port [tcp/http] succeeded!\n" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:176] Feb 1 10:43:01.440: INFO: stdout: "" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:177] Feb 1 10:43:01.441: INFO: Validation succeeded: Service addr 20.166.216.165 and port 80 with protocol TCP [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:210] Feb 1 10:43:01.556: INFO: Deleting pod exec-agnhost-pod in namespace e2e-tests-nsg-pxh29 [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:138] STEP: Validating ip exists in Security Group - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:100 @ 02/01/23 10:43:01.659 Feb 1 10:43:01.659: INFO: Getting virtual network list [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/network_utils.go:211] Feb 1 10:43:02.877: INFO: got sg list, length = 2 [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/network_utils.go:236] Feb 1 10:43:02.877: INFO: Checking security rule "allow_ssh" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:372] Feb 1 10:43:02.877: INFO: Checking security rule "allow_apiserver" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:372] STEP: Cleaning up - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:95 @ 02/01/23 10:43:02.877 Feb 1 10:43:02.877: INFO: Deleting service "nsg-test" in namespace "e2e-tests-nsg-pxh29" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:47] [FAILED] Failure recorded during attempt 1: Security rule for service nsg-test not exists Expected <bool>: false to be true In [It] at: /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:104 @ 02/01/23 10:43:37.19 < Exit [It] should add the rule when expose a service - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:91 @ 02/01/23 10:43:37.19 (1m37.596s) > Enter [AfterEach] Network security group - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:79 @ 02/01/23 10:43:37.19 Feb 1 10:43:37.296: INFO: Deleting namespace e2e-tests-nsg-pxh29 [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:135] < Exit [AfterEach] Network security group - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:79 @ 02/01/23 10:43:43.609 (6.419s) Attempt #1 Failed. Retrying ↺ @ 02/01/23 10:43:43.609 > Enter [BeforeEach] Network security group - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:58 @ 02/01/23 10:43:43.609 Feb 1 10:43:43.609: INFO: Creating a kubernetes client [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:56] Feb 1 10:43:43.609: INFO: Kubernetes configuration file name: /home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:64] Feb 1 10:43:43.717: INFO: Created a test namespace "e2e-tests-nsg-rsgtc" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:110] Feb 1 10:43:43.717: INFO: Creating a kubernetes client [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:56] Feb 1 10:43:43.717: INFO: Kubernetes configuration file name: /home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:64] Feb 1 10:43:43.856: INFO: Kubernetes configuration file name: /home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:107] Feb 1 10:43:43.856: INFO: Running '/usr/local/bin/kubectl --kubeconfig=/home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig cluster-info dump | grep service-cluster-ip-range' [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:149] Feb 1 10:43:49.605: INFO: Creating deployment nsg-test [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:69] Feb 1 10:43:49.711: INFO: Waiting for backend pods to be ready [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:74] Feb 1 10:43:49.843: INFO: 5 pods in namespace e2e-tests-nsg-rsgtc are pending [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:87] Feb 1 10:43:59.982: INFO: 0 pods in namespace e2e-tests-nsg-rsgtc are pending [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:87] < Exit [BeforeEach] Network security group - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:58 @ 02/01/23 10:43:59.982 (16.373s) > Enter [It] should add the rule when expose a service - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:91 @ 02/01/23 10:43:59.982 STEP: Creating a service and expose it - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:92 @ 02/01/23 10:43:59.982 Feb 1 10:43:59.982: INFO: Creating service nsg-test in namespace e2e-tests-nsg-rsgtc [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/service_annotations.go:1219] Feb 1 10:44:00.098: INFO: Successfully created LoadBalancer service nsg-test in namespace e2e-tests-nsg-rsgtc [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/service_annotations.go:1223] Feb 1 10:44:00.098: INFO: Waiting service to expose... [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/service_annotations.go:1226] Feb 1 10:44:00.202: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:44:10.313: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:44:20.305: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:44:30.313: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:44:40.312: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:44:50.314: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:45:00.306: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:45:10.305: INFO: Exposure successfully, get external ip: [20.166.216.225] [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:189] Feb 1 10:45:10.305: INFO: Creating a hostNetwork Pod exec-agnhost-pod in namespace e2e-tests-nsg-rsgtc to exec [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:159] Feb 1 10:45:10.305: INFO: creating pod exec-agnhost-pod in namespace e2e-tests-nsg-rsgtc [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:152] Feb 1 10:45:10.523: INFO: waiting for the pod status to be Running, current status: Pending [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:317] Feb 1 10:45:20.633: INFO: checking the connectivity of address 20.166.216.225 80 with protocol TCP [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:133] Feb 1 10:45:20.633: INFO: Kubernetes configuration file name: /home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:107] Feb 1 10:45:20.633: INFO: Running '/usr/local/bin/kubectl --kubeconfig=/home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig --namespace=e2e-tests-nsg-rsgtc exec exec-agnhost-pod -- /bin/sh -x -c nc -vz -w 4 20.166.216.225 80' [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:149] Feb 1 10:45:21.777: INFO: stderr: "+ nc -vz -w 4 20.166.216.225 80\nConnection to 20.166.216.225 80 port [tcp/http] succeeded!\n" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:176] Feb 1 10:45:21.777: INFO: stdout: "" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:177] Feb 1 10:45:21.777: INFO: Validation succeeded: Service addr 20.166.216.225 and port 80 with protocol TCP [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:210] Feb 1 10:45:21.894: INFO: Deleting pod exec-agnhost-pod in namespace e2e-tests-nsg-rsgtc [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:138] STEP: Validating ip exists in Security Group - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:100 @ 02/01/23 10:45:21.996 Feb 1 10:45:21.996: INFO: Getting virtual network list [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/network_utils.go:211] Feb 1 10:45:23.387: INFO: got sg list, length = 2 [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/network_utils.go:236] Feb 1 10:45:23.387: INFO: Checking security rule "allow_ssh" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:372] Feb 1 10:45:23.387: INFO: Checking security rule "allow_apiserver" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:372] STEP: Cleaning up - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:95 @ 02/01/23 10:45:23.387 Feb 1 10:45:23.387: INFO: Deleting service "nsg-test" in namespace "e2e-tests-nsg-rsgtc" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:47] [FAILED] Security rule for service nsg-test not exists Expected <bool>: false to be true In [It] at: /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:104 @ 02/01/23 10:46:05.701 < Exit [It] should add the rule when expose a service - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:91 @ 02/01/23 10:46:05.701 (2m5.719s) > Enter [AfterEach] Network security group - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:79 @ 02/01/23 10:46:05.701 Feb 1 10:46:05.807: INFO: Deleting namespace e2e-tests-nsg-rsgtc [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:135] < Exit [AfterEach] Network security group - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:79 @ 02/01/23 10:46:12.119 (6.418s)
Filter through log files | View test history on testgrid
go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Cloud\sprovider\sAzure\se2e\ssuite\s\[It\]\sNetwork\ssecurity\sgroup\sshould\ssupport\sservice\sannotation\s\`service\.beta\.kubernetes\.io\/azure\-deny\-all\-except\-load\-balancer\-source\-ranges\`\s\[NSG\]$'
[FAILED] Expected <bool>: false to be true In [It] at: /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:296 @ 02/01/23 10:57:39.754 There were additional failures detected after the initial failure. These are visible in the timelinefrom junit_01.xml
> Enter [BeforeEach] Network security group - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:58 @ 02/01/23 10:51:01.431 Feb 1 10:51:01.431: INFO: Creating a kubernetes client [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:56] Feb 1 10:51:01.431: INFO: Kubernetes configuration file name: /home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:64] Feb 1 10:51:01.557: INFO: Created a test namespace "e2e-tests-nsg-8dr5h" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:110] Feb 1 10:51:01.557: INFO: Creating a kubernetes client [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:56] Feb 1 10:51:01.557: INFO: Kubernetes configuration file name: /home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:64] Feb 1 10:51:01.696: INFO: Kubernetes configuration file name: /home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:107] Feb 1 10:51:01.696: INFO: Running '/usr/local/bin/kubectl --kubeconfig=/home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig cluster-info dump | grep service-cluster-ip-range' [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:149] Feb 1 10:51:07.505: INFO: Creating deployment nsg-test [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:69] Feb 1 10:51:07.612: INFO: Waiting for backend pods to be ready [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:74] Feb 1 10:51:07.748: INFO: 5 pods in namespace e2e-tests-nsg-8dr5h are pending [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:87] Feb 1 10:51:17.879: INFO: 0 pods in namespace e2e-tests-nsg-8dr5h are pending [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:87] < Exit [BeforeEach] Network security group - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:58 @ 02/01/23 10:51:17.879 (16.448s) > Enter [It] should support service annotation `service.beta.kubernetes.io/azure-deny-all-except-load-balancer-source-ranges` - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:227 @ 02/01/23 10:51:17.879 STEP: Creating a test service with the deny rule annotation but without `service.Spec.LoadBalancerSourceRanges` - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:228 @ 02/01/23 10:51:17.879 STEP: Waiting for the service to expose - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:237 @ 02/01/23 10:51:17.994 Feb 1 10:51:18.097: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:51:28.209: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:51:38.209: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:51:48.200: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:51:58.209: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:52:08.204: INFO: Exposure successfully, get external ip: [10.1.0.6] [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:189] Feb 1 10:52:08.204: INFO: Creating a hostNetwork Pod exec-agnhost-pod in namespace e2e-tests-nsg-8dr5h to exec [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:159] Feb 1 10:52:08.205: INFO: creating pod exec-agnhost-pod in namespace e2e-tests-nsg-8dr5h [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:152] Feb 1 10:52:08.418: INFO: waiting for the pod status to be Running, current status: Pending [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:317] Feb 1 10:52:18.529: INFO: checking the connectivity of address 10.1.0.6 80 with protocol TCP [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:133] Feb 1 10:52:18.529: INFO: Kubernetes configuration file name: /home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:107] Feb 1 10:52:18.529: INFO: Running '/usr/local/bin/kubectl --kubeconfig=/home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig --namespace=e2e-tests-nsg-8dr5h exec exec-agnhost-pod -- /bin/sh -x -c nc -vz -w 4 10.1.0.6 80' [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:149] Feb 1 10:52:19.657: INFO: stderr: "+ nc -vz -w 4 10.1.0.6 80\nConnection to 10.1.0.6 80 port [tcp/http] succeeded!\n" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:176] Feb 1 10:52:19.657: INFO: stdout: "" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:177] Feb 1 10:52:19.657: INFO: Validation succeeded: Service addr 10.1.0.6 and port 80 with protocol TCP [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:210] Feb 1 10:52:19.772: INFO: Deleting pod exec-agnhost-pod in namespace e2e-tests-nsg-8dr5h [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:138] STEP: Checking if there is a deny_all rule - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:241 @ 02/01/23 10:52:19.874 Feb 1 10:52:19.874: INFO: Getting virtual network list [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/network_utils.go:211] Feb 1 10:52:21.058: INFO: got sg list, length = 2 [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/network_utils.go:236] Feb 1 10:52:21.058: INFO: Checking security rule "allow_ssh" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:455] Feb 1 10:52:21.058: INFO: Checking security rule "allow_apiserver" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:455] STEP: Deleting the service - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:247 @ 02/01/23 10:52:21.058 Feb 1 10:52:21.058: INFO: Deleting service "nsg-test" in namespace "e2e-tests-nsg-8dr5h" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:47] STEP: Creating a test service with the deny rule annotation and `service.Spec.LoadBalancerSourceRanges` - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:251 @ 02/01/23 10:52:41.37 Feb 1 10:52:41.370: INFO: Creating a hostNetwork Pod exec-agnhost-pod-deny-all-except-lb-range in namespace e2e-tests-nsg-8dr5h to exec [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:159] Feb 1 10:52:41.370: INFO: creating pod exec-agnhost-pod-deny-all-except-lb-range in namespace e2e-tests-nsg-8dr5h [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:152] Feb 1 10:52:41.586: INFO: waiting for the pod status to be Running, current status: Pending [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:317] STEP: Waiting for the service to expose - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:281 @ 02/01/23 10:52:51.917 Feb 1 10:52:52.019: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:53:02.131: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:53:12.122: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:53:22.129: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:53:32.122: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:53:42.129: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:53:52.122: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:54:02.123: INFO: Exposure successfully, get external ip: [10.1.0.6] [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:189] Feb 1 10:54:02.123: INFO: checking the connectivity of addr 10.1.0.6:80 with protocol [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:286] Feb 1 10:54:02.123: INFO: Kubernetes configuration file name: /home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:107] Feb 1 10:54:02.123: INFO: Running '/usr/local/bin/kubectl --kubeconfig=/home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig --namespace=e2e-tests-nsg-8dr5h exec exec-agnhost-pod-deny-all-except-lb-range -- /bin/sh -x -c nc -vz -w 4 10.1.0.6 80' [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:149] Feb 1 10:54:03.274: INFO: stderr: "+ nc -vz -w 4 10.1.0.6 80\nConnection to 10.1.0.6 80 port [tcp/http] succeeded!\n" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:176] Feb 1 10:54:03.274: INFO: stdout: "" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:177] Feb 1 10:54:03.274: INFO: Validation succeeded: Service addr 10.1.0.6 and port 80 with protocol [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:210] Feb 1 10:54:03.274: INFO: Getting virtual network list [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/network_utils.go:211] Feb 1 10:54:04.117: INFO: got sg list, length = 2 [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/network_utils.go:236] STEP: Checking if there is a LoadBalancerSourceRanges rule - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:294 @ 02/01/23 10:54:04.117 Feb 1 10:54:04.117: INFO: Checking security rule "allow_ssh" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:423] Feb 1 10:54:04.117: INFO: Checking security rule "allow_apiserver" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:423] Feb 1 10:54:04.232: INFO: Deleting pod exec-agnhost-pod-deny-all-except-lb-range in namespace e2e-tests-nsg-8dr5h [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:138] [FAILED] Failure recorded during attempt 1: Expected <bool>: false to be true In [It] at: /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:296 @ 02/01/23 10:54:04.335 < Exit [It] should support service annotation `service.beta.kubernetes.io/azure-deny-all-except-load-balancer-source-ranges` - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:227 @ 02/01/23 10:54:04.335 (2m46.456s) > Enter [AfterEach] Network security group - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:79 @ 02/01/23 10:54:04.335 Feb 1 10:54:04.439: INFO: Deleting namespace e2e-tests-nsg-8dr5h [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:135] < Exit [AfterEach] Network security group - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:79 @ 02/01/23 10:54:48.746 (44.412s) Attempt #1 Failed. Retrying ↺ @ 02/01/23 10:54:48.746 > Enter [BeforeEach] Network security group - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:58 @ 02/01/23 10:54:48.747 Feb 1 10:54:48.747: INFO: Creating a kubernetes client [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:56] Feb 1 10:54:48.747: INFO: Kubernetes configuration file name: /home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:64] Feb 1 10:54:48.853: INFO: Created a test namespace "e2e-tests-nsg-wdzsv" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:110] Feb 1 10:54:48.853: INFO: Creating a kubernetes client [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:56] Feb 1 10:54:48.853: INFO: Kubernetes configuration file name: /home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:64] Feb 1 10:54:48.992: INFO: Kubernetes configuration file name: /home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:107] Feb 1 10:54:48.992: INFO: Running '/usr/local/bin/kubectl --kubeconfig=/home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig cluster-info dump | grep service-cluster-ip-range' [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:149] Feb 1 10:54:54.860: INFO: Creating deployment nsg-test [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:69] Feb 1 10:54:54.967: INFO: Waiting for backend pods to be ready [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:74] Feb 1 10:54:55.101: INFO: 5 pods in namespace e2e-tests-nsg-wdzsv are pending [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:87] Feb 1 10:55:05.241: INFO: 0 pods in namespace e2e-tests-nsg-wdzsv are pending [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:87] < Exit [BeforeEach] Network security group - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:58 @ 02/01/23 10:55:05.241 (16.495s) > Enter [It] should support service annotation `service.beta.kubernetes.io/azure-deny-all-except-load-balancer-source-ranges` - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:227 @ 02/01/23 10:55:05.241 STEP: Creating a test service with the deny rule annotation but without `service.Spec.LoadBalancerSourceRanges` - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:228 @ 02/01/23 10:55:05.241 STEP: Waiting for the service to expose - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:237 @ 02/01/23 10:55:05.36 Feb 1 10:55:05.462: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:55:15.565: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:55:25.573: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:55:35.564: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:55:45.572: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:55:55.564: INFO: Exposure successfully, get external ip: [10.1.0.6] [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:189] Feb 1 10:55:55.564: INFO: Creating a hostNetwork Pod exec-agnhost-pod in namespace e2e-tests-nsg-wdzsv to exec [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:159] Feb 1 10:55:55.565: INFO: creating pod exec-agnhost-pod in namespace e2e-tests-nsg-wdzsv [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:152] Feb 1 10:55:55.778: INFO: waiting for the pod status to be Running, current status: Pending [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:317] Feb 1 10:56:05.888: INFO: checking the connectivity of address 10.1.0.6 80 with protocol TCP [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:133] Feb 1 10:56:05.888: INFO: Kubernetes configuration file name: /home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:107] Feb 1 10:56:05.888: INFO: Running '/usr/local/bin/kubectl --kubeconfig=/home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig --namespace=e2e-tests-nsg-wdzsv exec exec-agnhost-pod -- /bin/sh -x -c nc -vz -w 4 10.1.0.6 80' [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:149] Feb 1 10:56:07.025: INFO: stderr: "+ nc -vz -w 4 10.1.0.6 80\nConnection to 10.1.0.6 80 port [tcp/http] succeeded!\n" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:176] Feb 1 10:56:07.025: INFO: stdout: "" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:177] Feb 1 10:56:07.025: INFO: Validation succeeded: Service addr 10.1.0.6 and port 80 with protocol TCP [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:210] Feb 1 10:56:07.147: INFO: Deleting pod exec-agnhost-pod in namespace e2e-tests-nsg-wdzsv [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:138] STEP: Checking if there is a deny_all rule - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:241 @ 02/01/23 10:56:07.248 Feb 1 10:56:07.248: INFO: Getting virtual network list [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/network_utils.go:211] Feb 1 10:56:08.478: INFO: got sg list, length = 2 [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/network_utils.go:236] Feb 1 10:56:08.478: INFO: Checking security rule "allow_ssh" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:455] Feb 1 10:56:08.478: INFO: Checking security rule "allow_apiserver" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:455] STEP: Deleting the service - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:247 @ 02/01/23 10:56:08.478 Feb 1 10:56:08.478: INFO: Deleting service "nsg-test" in namespace "e2e-tests-nsg-wdzsv" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:47] STEP: Creating a test service with the deny rule annotation and `service.Spec.LoadBalancerSourceRanges` - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:251 @ 02/01/23 10:56:36.789 Feb 1 10:56:36.789: INFO: Creating a hostNetwork Pod exec-agnhost-pod-deny-all-except-lb-range in namespace e2e-tests-nsg-wdzsv to exec [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:159] Feb 1 10:56:36.789: INFO: creating pod exec-agnhost-pod-deny-all-except-lb-range in namespace e2e-tests-nsg-wdzsv [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:152] Feb 1 10:56:37.003: INFO: waiting for the pod status to be Running, current status: Pending [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:317] STEP: Waiting for the service to expose - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:281 @ 02/01/23 10:56:47.331 Feb 1 10:56:47.433: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:56:57.537: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:57:07.539: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:57:17.541: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:57:27.545: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:169] Feb 1 10:57:37.537: INFO: Exposure successfully, get external ip: [10.1.0.6] [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:189] Feb 1 10:57:37.537: INFO: checking the connectivity of addr 10.1.0.6:80 with protocol [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:286] Feb 1 10:57:37.537: INFO: Kubernetes configuration file name: /home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:107] Feb 1 10:57:37.537: INFO: Running '/usr/local/bin/kubectl --kubeconfig=/home/prow/go/src/sigs.k8s.io/cluster-api-provider-azure/kubeconfig --namespace=e2e-tests-nsg-wdzsv exec exec-agnhost-pod-deny-all-except-lb-range -- /bin/sh -x -c nc -vz -w 4 10.1.0.6 80' [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:149] Feb 1 10:57:38.688: INFO: stderr: "+ nc -vz -w 4 10.1.0.6 80\nConnection to 10.1.0.6 80 port [tcp/http] succeeded!\n" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:176] Feb 1 10:57:38.688: INFO: stdout: "" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/kubectl.go:177] Feb 1 10:57:38.688: INFO: Validation succeeded: Service addr 10.1.0.6 and port 80 with protocol [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:210] Feb 1 10:57:38.688: INFO: Getting virtual network list [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/network_utils.go:211] Feb 1 10:57:39.537: INFO: got sg list, length = 2 [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/network_utils.go:236] STEP: Checking if there is a LoadBalancerSourceRanges rule - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:294 @ 02/01/23 10:57:39.537 Feb 1 10:57:39.537: INFO: Checking security rule "allow_ssh" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:423] Feb 1 10:57:39.537: INFO: Checking security rule "allow_apiserver" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:423] Feb 1 10:57:39.652: INFO: Deleting pod exec-agnhost-pod-deny-all-except-lb-range in namespace e2e-tests-nsg-wdzsv [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/pod_utils.go:138] [FAILED] Expected <bool>: false to be true In [It] at: /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:296 @ 02/01/23 10:57:39.754 < Exit [It] should support service annotation `service.beta.kubernetes.io/azure-deny-all-except-load-balancer-source-ranges` - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:227 @ 02/01/23 10:57:39.754 (2m34.513s) > Enter [AfterEach] Network security group - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:79 @ 02/01/23 10:57:39.754 Feb 1 10:57:39.859: INFO: Deleting namespace e2e-tests-nsg-wdzsv [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:135] < Exit [AfterEach] Network security group - /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/network_security_group.go:79 @ 02/01/23 10:58:24.169 (44.414s)
Filter through log files | View test history on testgrid
Cloud provider Azure e2e suite [It] Azure Credential Provider should be able to pull private images from acr without docker secrets set explicitly [Credential]
Cloud provider Azure e2e suite [It] Azure node resources should set correct private IP address for every node [Node]
Cloud provider Azure e2e suite [It] Azure node resources should set node provider id correctly [Node]
Cloud provider Azure e2e suite [It] Azure node resources should set route table correctly when the cluster is enabled by kubenet [Node, Kubenet]
Cloud provider Azure e2e suite [It] Ensure LoadBalancer should support BYO public IP [LB]
Cloud provider Azure e2e suite [It] Ensure LoadBalancer should support assigning to specific IP when updating public service [LB]
Cloud provider Azure e2e suite [It] Ensure LoadBalancer should support disabling floating IP in load balancer rule with kubernetes service annotations [LB]
Cloud provider Azure e2e suite [It] Ensure LoadBalancer should support mixed protocol services [LB]
Cloud provider Azure e2e suite [It] Ensure LoadBalancer should support multiple external services sharing one newly created public IP addresses [LB]
Cloud provider Azure e2e suite [It] Ensure LoadBalancer should support multiple external services sharing preset public IP addresses [LB]
Cloud provider Azure e2e suite [It] Ensure LoadBalancer should support multiple internal services sharing IP addresses [LB]
Cloud provider Azure e2e suite [It] Ensure LoadBalancer should support updating an internal service to a public service with assigned IP [LB]
Cloud provider Azure e2e suite [It] Ensure LoadBalancer should support updating internal IP when updating internal service [LB]
Cloud provider Azure e2e suite [It] EnsureLoadBalancer should not update any resources when service config is not changed should respect internal service with various configurations [LB]
Cloud provider Azure e2e suite [It] EnsureLoadBalancer should not update any resources when service config is not changed should respect service with BYO public IP prefix with various configurations [LB]
Cloud provider Azure e2e suite [It] EnsureLoadBalancer should not update any resources when service config is not changed should respect service with BYO public IP with various configurations [LB]
Cloud provider Azure e2e suite [It] EnsureLoadBalancer should not update any resources when service config is not changed should respect service with various configurations [LB]
Cloud provider Azure e2e suite [It] Multi-ports service When ExternalTrafficPolicy is updated Should not have error occurred [Multi-Ports]
Cloud provider Azure e2e suite [It] Network security group can set source IP prefixes automatically according to corresponding service tag [NSG]
Cloud provider Azure e2e suite [It] Network security group should support service annotation `service.beta.kubernetes.io/azure-disable-load-balancer-floating-ip` [NSG]
Cloud provider Azure e2e suite [It] Network security group should support service annotation `service.beta.kubernetes.io/azure-shared-securityrule` [NSG]
Cloud provider Azure e2e suite [It] Private link service should support multiple internal services sharing one private link service [PLS]
Cloud provider Azure e2e suite [It] Private link service should support service annotation 'service.beta.kubernetes.io/azure-pls-auto-approval' [PLS]
Cloud provider Azure e2e suite [It] Private link service should support service annotation 'service.beta.kubernetes.io/azure-pls-create' [PLS]
Cloud provider Azure e2e suite [It] Private link service should support service annotation 'service.beta.kubernetes.io/azure-pls-fqdns' [PLS]
Cloud provider Azure e2e suite [It] Private link service should support service annotation 'service.beta.kubernetes.io/azure-pls-ip-configuration-ip-address' [PLS]
Cloud provider Azure e2e suite [It] Private link service should support service annotation 'service.beta.kubernetes.io/azure-pls-ip-configuration-ip-address-count' [PLS]
Cloud provider Azure e2e suite [It] Private link service should support service annotation 'service.beta.kubernetes.io/azure-pls-ip-configuration-subnet' [PLS]
Cloud provider Azure e2e suite [It] Private link service should support service annotation 'service.beta.kubernetes.io/azure-pls-name' [PLS]
Cloud provider Azure e2e suite [It] Private link service should support service annotation 'service.beta.kubernetes.io/azure-pls-proxy-protocol' [PLS]
Cloud provider Azure e2e suite [It] Private link service should support service annotation 'service.beta.kubernetes.io/azure-pls-visibility' [PLS]
Cloud provider Azure e2e suite [It] Service with annotation should generate health probe configs in multi-port scenario [ServiceAnnotation]
Cloud provider Azure e2e suite [It] Service with annotation should support service annotation 'service.beta.kubernetes.io/azure-dns-label-name' [ServiceAnnotation]
Cloud provider Azure e2e suite [It] Service with annotation should support service annotation 'service.beta.kubernetes.io/azure-load-balancer-enable-high-availability-ports' [ServiceAnnotation]
Cloud provider Azure e2e suite [It] Service with annotation should support service annotation 'service.beta.kubernetes.io/azure-load-balancer-health-probe-num-of-probe', 'service.beta.kubernetes.io/azure-load-balancer-health-probe-interval', 'service.beta.kubernetes.io/azure-load-balancer-health-probe-protocol' and port specific configs [ServiceAnnotation]
Cloud provider Azure e2e suite [It] Service with annotation should support service annotation 'service.beta.kubernetes.io/azure-load-balancer-internal' [ServiceAnnotation]
Cloud provider Azure e2e suite [It] Service with annotation should support service annotation 'service.beta.kubernetes.io/azure-load-balancer-internal-subnet' [ServiceAnnotation]
Cloud provider Azure e2e suite [It] Service with annotation should support service annotation 'service.beta.kubernetes.io/azure-load-balancer-ip' [ServiceAnnotation]
Cloud provider Azure e2e suite [It] Service with annotation should support service annotation 'service.beta.kubernetes.io/azure-load-balancer-tcp-idle-timeout' [ServiceAnnotation]
Cloud provider Azure e2e suite [It] Service with annotation should support service annotation `service.beta.kubernetes.io/azure-additional-public-ips` [ServiceAnnotation]
Cloud provider Azure e2e suite [It] Service with annotation should support service annotation `service.beta.kubernetes.io/azure-pip-name` [ServiceAnnotation]
Cloud provider Azure e2e suite [It] Service with annotation should support service annotation `service.beta.kubernetes.io/azure-pip-prefix-id` [ServiceAnnotation]
Cloud provider Azure e2e suite [It] Service with annotation should support service annotation `service.beta.kubernetes.io/azure-pip-tags` [ServiceAnnotation]
Cloud provider Azure e2e suite [It] [StandardLoadBalancer] Standard load balancer should add all nodes in different agent pools to backends [Multi-Nodepool]
Cloud provider Azure e2e suite [It] Azure nodes should expose zones correctly after created [VMSS, Serial, Slow]
Cloud provider Azure e2e suite [It] Azure nodes should support crossing resource groups [Multi-Group, AvailabilitySet]
Cloud provider Azure e2e suite [It] Cluster size autoscaler should balance the sizes of multiple node group if the `--balance-node-groups` is set to true [Feature:Autoscaling, Serial, Slow, Multi-Nodepool]
Cloud provider Azure e2e suite [It] Cluster size autoscaler should scale up or down if deployment replicas leave nodes busy or idle [Feature:Autoscaling, Serial, Slow]
Cloud provider Azure e2e suite [It] Cluster size autoscaler should scale up, deploy a statefulset with disks attached, scale down, and certain pods + disks should be evicted to a new node [Feature:Autoscaling, Serial, Slow]
Cloud provider Azure e2e suite [It] Cluster size autoscaler should support multiple node pools with quick scaling [Feature:Autoscaling, Serial, Slow, Multi-Nodepool]
Cloud provider Azure e2e suite [It] Cluster size autoscaler should support one node pool with slow scaling [Feature:Autoscaling, Serial, Slow, Single-Nodepool]
Cloud provider Azure e2e suite [It] Cluster size autoscaler should support scaling up or down Azure Spot VM [Feature:Autoscaling, Serial, Slow, VMSS, Spot-VM]
Cloud provider Azure e2e suite [It] Cluster size autoscaler should support scaling up or down due to the consuming of GPU resource [Feature:Autoscaling, Serial, Slow]
Cloud provider Azure e2e suite [It] Ensure LoadBalancer should have no operation since no change in service when update [LB, Slow]
Cloud provider Azure e2e suite [It] Ensure LoadBalancer should support node label `node.kubernetes.io/exclude-from-external-load-balancers` [LB]
Cloud provider Azure e2e suite [It] Lifecycle of VMSS should add node object when VMSS instance allocated [VMSS, VMSS-Scale]
Cloud provider Azure e2e suite [It] Lifecycle of VMSS should delete node object when VMSS instance deallocated [VMSS, VMSS-Scale]
Cloud provider Azure e2e suite [It] Multiple VMSS should support service annotation `service.beta.kubernetes.io/azure-load-balancer-mode` [Multi-Nodepool, VMSS]
Cloud provider Azure e2e suite [It] Service with annotation should support service annotation 'service.beta.kubernetes.io/azure-load-balancer-resource-group' [ServiceAnnotation]
Cloud provider Azure e2e suite [It] [StandardLoadBalancer] Standard load balancer should make outbound IP of pod same as in SLB's outbound rules [SLBOutbound]