Recent runs || View in Spyglass
PR | mborsz: Migrate prometheus manifests to embed FS |
Result | ABORTED |
Tests | 0 failed / 0 succeeded |
Started | |
Elapsed | 17m15s |
Revision | 54a77111a1812bf644ffc0515b2669edfcdad1aa |
Refs |
2201 |
... skipping 266 lines ... are created. As an example, you can allow all internal traffic between instances as well as SSH, RDP, and ICMP by running: $ gcloud compute firewall-rules create <FIREWALL_NAME> --network e2e-2201-62db2 --allow tcp,udp,icmp --source-ranges <IP_RANGE> $ gcloud compute firewall-rules create <FIREWALL_NAME> --network e2e-2201-62db2 --allow tcp:22,tcp:3389,icmp {"component":"entrypoint","file":"k8s.io/test-infra/prow/entrypoint/run.go:168","func":"k8s.io/test-infra/prow/entrypoint.Options.ExecuteProcess","level":"error","msg":"Entrypoint received interrupt: terminated","severity":"error","time":"2022-11-18T15:19:00Z"} ++ early_exit_handler ++ '[' -n 28 ']' ++ kill -TERM 28 ++ cleanup_dind ++ [[ false == \t\r\u\e ]] ++ early_exit_handler ... skipping 7 lines ...