Recent runs || View in Spyglass
Result | SUCCESS |
Tests | 14 failed / 209 succeeded |
Started | |
Elapsed | 1h24m |
Revision | |
Builder | b376a18a-ff53-11e9-918b-16773c0c7aed |
Refs |
master:529d5dd4 84655:fe7ad707 |
infra-commit | 289cd3dab |
job-version | v1.18.0-alpha.0.134+07d03325d3a9b3-dirty |
repo | k8s.io/kubernetes |
repo-commit | 07d03325d3a9b3647ef48627adcf16cbec8b1f34 |
repos | {u'k8s.io/kubernetes': u'master:529d5dd4b2ed63e672eb671c3e459d05ce74fb11,84655:fe7ad707a5beb7f89c01e0e6c5d56cd596ad0331', u'k8s.io/cloud-provider-azure': u'master'} |
revision | v1.18.0-alpha.0.134+07d03325d3a9b3-dirty |
go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\scsi\-hostpath\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\smultiVolume\s\[Slow\]\sshould\saccess\sto\stwo\svolumes\swith\sthe\ssame\svolume\smode\sand\sretain\sdata\sacross\spod\srecreation\son\sthe\ssame\snode$'
test/e2e/storage/testsuites/multivolume.go:129 Nov 4 23:30:04.730: Unexpected error: <*errors.errorString | 0xc001aadf70>: { s: "pod \"security-context-32e5a9df-35d4-4d74-9394-deba9a253642\" is not Running: timed out waiting for the condition", } pod "security-context-32e5a9df-35d4-4d74-9394-deba9a253642" is not Running: timed out waiting for the condition occurred test/e2e/storage/testsuites/multivolume.go:360from junit_28.xml
[BeforeEach] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] test/e2e/storage/testsuites/base.go:99 [BeforeEach] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] test/e2e/storage/testsuites/multivolume.go:87 [BeforeEach] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] test/e2e/framework/framework.go:147 �[1mSTEP�[0m: Creating a kubernetes client Nov 4 23:22:59.820: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Building a namespace api object, basename multivolume �[1mSTEP�[0m: Binding the e2e-test-privileged-psp PodSecurityPolicy to the default service account in multivolume-1271 �[1mSTEP�[0m: Waiting for a default service account to be provisioned in namespace [It] should access to two volumes with the same volume mode and retain data across pod recreation on the same node test/e2e/storage/testsuites/multivolume.go:129 �[1mSTEP�[0m: deploying csi-hostpath driver Nov 4 23:23:00.137: INFO: creating *v1.ServiceAccount: multivolume-1271/csi-attacher Nov 4 23:23:00.140: INFO: creating *v1.ClusterRole: external-attacher-runner-multivolume-1271 Nov 4 23:23:00.140: INFO: Define cluster role external-attacher-runner-multivolume-1271 Nov 4 23:23:00.145: INFO: creating *v1.ClusterRoleBinding: csi-attacher-role-multivolume-1271 Nov 4 23:23:00.148: INFO: creating *v1.Role: multivolume-1271/external-attacher-cfg-multivolume-1271 Nov 4 23:23:00.155: INFO: creating *v1.RoleBinding: multivolume-1271/csi-attacher-role-cfg Nov 4 23:23:00.158: INFO: creating *v1.ServiceAccount: multivolume-1271/csi-provisioner Nov 4 23:23:00.162: INFO: creating *v1.ClusterRole: external-provisioner-runner-multivolume-1271 Nov 4 23:23:00.162: INFO: Define cluster role external-provisioner-runner-multivolume-1271 Nov 4 23:23:00.166: INFO: creating *v1.ClusterRoleBinding: csi-provisioner-role-multivolume-1271 Nov 4 23:23:00.169: INFO: creating *v1.Role: multivolume-1271/external-provisioner-cfg-multivolume-1271 Nov 4 23:23:00.185: INFO: creating *v1.RoleBinding: multivolume-1271/csi-provisioner-role-cfg Nov 4 23:23:00.205: INFO: creating *v1.ServiceAccount: multivolume-1271/csi-snapshotter Nov 4 23:23:00.208: INFO: creating *v1.ClusterRole: external-snapshotter-runner-multivolume-1271 Nov 4 23:23:00.208: INFO: Define cluster role external-snapshotter-runner-multivolume-1271 Nov 4 23:23:00.213: INFO: creating *v1.ClusterRoleBinding: csi-snapshotter-role-multivolume-1271 Nov 4 23:23:00.220: INFO: creating *v1.Role: multivolume-1271/external-snapshotter-leaderelection-multivolume-1271 Nov 4 23:23:00.223: INFO: creating *v1.RoleBinding: multivolume-1271/external-snapshotter-leaderelection Nov 4 23:23:00.229: INFO: creating *v1.ServiceAccount: multivolume-1271/csi-resizer Nov 4 23:23:00.237: INFO: creating *v1.ClusterRole: external-resizer-runner-multivolume-1271 Nov 4 23:23:00.237: INFO: Define cluster role external-resizer-runner-multivolume-1271 Nov 4 23:23:00.248: INFO: creating *v1.ClusterRoleBinding: csi-resizer-role-multivolume-1271 Nov 4 23:23:00.251: INFO: creating *v1.Role: multivolume-1271/external-resizer-cfg-multivolume-1271 Nov 4 23:23:00.254: INFO: creating *v1.RoleBinding: multivolume-1271/csi-resizer-role-cfg Nov 4 23:23:00.257: INFO: creating *v1.Service: multivolume-1271/csi-hostpath-attacher Nov 4 23:23:00.281: INFO: creating *v1.StatefulSet: multivolume-1271/csi-hostpath-attacher Nov 4 23:23:00.296: INFO: creating *v1beta1.CSIDriver: csi-hostpath-multivolume-1271 Nov 4 23:23:00.305: INFO: creating *v1.Service: multivolume-1271/csi-hostpathplugin Nov 4 23:23:00.347: INFO: creating *v1.StatefulSet: multivolume-1271/csi-hostpathplugin Nov 4 23:23:00.353: INFO: creating *v1.Service: multivolume-1271/csi-hostpath-provisioner Nov 4 23:23:00.378: INFO: creating *v1.StatefulSet: multivolume-1271/csi-hostpath-provisioner Nov 4 23:23:00.388: INFO: creating *v1.Service: multivolume-1271/csi-hostpath-resizer Nov 4 23:23:00.427: INFO: creating *v1.StatefulSet: multivolume-1271/csi-hostpath-resizer Nov 4 23:23:00.433: INFO: creating *v1.Service: multivolume-1271/csi-snapshotter Nov 4 23:23:00.474: INFO: creating *v1.StatefulSet: multivolume-1271/csi-snapshotter Nov 4 23:23:00.481: INFO: creating *v1.ClusterRoleBinding: psp-csi-hostpath-role-multivolume-1271 Nov 4 23:23:00.502: INFO: Test running for native CSI Driver, not checking metrics Nov 4 23:23:00.502: INFO: Creating resource for dynamic PV Nov 4 23:23:00.502: INFO: Using claimSize:1Mi, test suite supported size:{ 1Mi}, driver(csi-hostpath) supported size:{ 1Mi} �[1mSTEP�[0m: creating a StorageClass multivolume-1271-csi-hostpath-multivolume-1271-scbjgms �[1mSTEP�[0m: creating a claim Nov 4 23:23:00.544: INFO: Waiting up to 5m0s for PersistentVolumeClaims [csi-hostpathx2bq7] to have phase Bound Nov 4 23:23:00.558: INFO: PersistentVolumeClaim csi-hostpathx2bq7 found but phase is Pending instead of Bound. Nov 4 23:23:02.561: INFO: PersistentVolumeClaim csi-hostpathx2bq7 found but phase is Pending instead of Bound. Nov 4 23:23:04.564: INFO: PersistentVolumeClaim csi-hostpathx2bq7 found but phase is Pending instead of Bound. Nov 4 23:23:06.571: INFO: PersistentVolumeClaim csi-hostpathx2bq7 found but phase is Pending instead of Bound. Nov 4 23:23:08.574: INFO: PersistentVolumeClaim csi-hostpathx2bq7 found but phase is Pending instead of Bound. Nov 4 23:23:10.577: INFO: PersistentVolumeClaim csi-hostpathx2bq7 found but phase is Pending instead of Bound. Nov 4 23:23:12.580: INFO: PersistentVolumeClaim csi-hostpathx2bq7 found but phase is Pending instead of Bound. Nov 4 23:23:14.583: INFO: PersistentVolumeClaim csi-hostpathx2bq7 found but phase is Pending instead of Bound. Nov 4 23:23:16.586: INFO: PersistentVolumeClaim csi-hostpathx2bq7 found but phase is Pending instead of Bound. Nov 4 23:23:18.589: INFO: PersistentVolumeClaim csi-hostpathx2bq7 found but phase is Pending instead of Bound. Nov 4 23:23:20.608: INFO: PersistentVolumeClaim csi-hostpathx2bq7 found but phase is Pending instead of Bound. Nov 4 23:23:22.610: INFO: PersistentVolumeClaim csi-hostpathx2bq7 found but phase is Pending instead of Bound. Nov 4 23:23:24.613: INFO: PersistentVolumeClaim csi-hostpathx2bq7 found but phase is Pending instead of Bound. Nov 4 23:23:26.626: INFO: PersistentVolumeClaim csi-hostpathx2bq7 found but phase is Pending instead of Bound. Nov 4 23:23:28.629: INFO: PersistentVolumeClaim csi-hostpathx2bq7 found but phase is Pending instead of Bound. Nov 4 23:23:30.632: INFO: PersistentVolumeClaim csi-hostpathx2bq7 found but phase is Pending instead of Bound. Nov 4 23:23:32.635: INFO: PersistentVolumeClaim csi-hostpathx2bq7 found but phase is Pending instead of Bound. Nov 4 23:23:34.643: INFO: PersistentVolumeClaim csi-hostpathx2bq7 found but phase is Pending instead of Bound. Nov 4 23:23:36.646: INFO: PersistentVolumeClaim csi-hostpathx2bq7 found and phase=Bound (36.101878517s) Nov 4 23:23:36.651: INFO: Creating resource for dynamic PV Nov 4 23:23:36.651: INFO: Using claimSize:1Mi, test suite supported size:{ 1Mi}, driver(csi-hostpath) supported size:{ 1Mi} �[1mSTEP�[0m: creating a StorageClass multivolume-1271-csi-hostpath-multivolume-1271-scjfnq8 �[1mSTEP�[0m: creating a claim Nov 4 23:23:36.659: INFO: Waiting up to 5m0s for PersistentVolumeClaims [csi-hostpathf8m5j] to have phase Bound Nov 4 23:23:36.663: INFO: PersistentVolumeClaim csi-hostpathf8m5j found but phase is Pending instead of Bound. Nov 4 23:23:38.666: INFO: PersistentVolumeClaim csi-hostpathf8m5j found and phase=Bound (2.007316578s) �[1mSTEP�[0m: Creating pod on {Name:k8s-agentpool1-11489250-vmss000000 Selector:map[] Affinity:nil} with multiple volumes �[1mSTEP�[0m: Checking if the volume1 exists as expected volume mode (Block) Nov 4 23:24:18.699: INFO: Running '/usr/local/bin/kubectl --server=https://kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886.westus2.cloudapp.azure.com --kubeconfig=/workspace/aks722706072/kubeconfig/kubeconfig.westus2.json exec --namespace=multivolume-1271 security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60 -- /bin/sh -c test -b /mnt/volume1' Nov 4 23:24:19.713: INFO: stderr: "" Nov 4 23:24:19.713: INFO: stdout: "" Nov 4 23:24:19.713: INFO: Running '/usr/local/bin/kubectl --server=https://kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886.westus2.cloudapp.azure.com --kubeconfig=/workspace/aks722706072/kubeconfig/kubeconfig.westus2.json exec --namespace=multivolume-1271 security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60 -- /bin/sh -c test -d /mnt/volume1' Nov 4 23:24:20.324: INFO: rc: 1 �[1mSTEP�[0m: Checking if write to the volume1 works properly Nov 4 23:24:20.324: INFO: Running '/usr/local/bin/kubectl --server=https://kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886.westus2.cloudapp.azure.com --kubeconfig=/workspace/aks722706072/kubeconfig/kubeconfig.westus2.json exec --namespace=multivolume-1271 security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60 -- /bin/sh -c echo L0yFcWZPGJyqmj7WUTURoPmPyy4+6zXHcLZ6oQKsgP5LQm17ZDgWYStgVaziEbem4kLSMyo/73ZEfRGXSVzqMQ== | base64 -d | sha256sum' Nov 4 23:24:21.291: INFO: stderr: "" Nov 4 23:24:21.291: INFO: stdout: "f929bc6cf74f85cde60671619aea7a7e796e7292bde2e3d96ee5625cdb6e1155 -\n" Nov 4 23:24:21.291: INFO: Running '/usr/local/bin/kubectl --server=https://kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886.westus2.cloudapp.azure.com --kubeconfig=/workspace/aks722706072/kubeconfig/kubeconfig.westus2.json exec --namespace=multivolume-1271 security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60 -- /bin/sh -c echo L0yFcWZPGJyqmj7WUTURoPmPyy4+6zXHcLZ6oQKsgP5LQm17ZDgWYStgVaziEbem4kLSMyo/73ZEfRGXSVzqMQ== | base64 -d | dd of=/mnt/volume1 bs=64 count=1' Nov 4 23:24:22.735: INFO: stderr: "1+0 records in\n1+0 records out\n64 bytes (64B) copied, 0.000037 seconds, 1.6MB/s\n" Nov 4 23:24:22.735: INFO: stdout: "" �[1mSTEP�[0m: Checking if read from the volume1 works properly Nov 4 23:24:22.735: INFO: Running '/usr/local/bin/kubectl --server=https://kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886.westus2.cloudapp.azure.com --kubeconfig=/workspace/aks722706072/kubeconfig/kubeconfig.westus2.json exec --namespace=multivolume-1271 security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60 -- /bin/sh -c dd if=/mnt/volume1 bs=64 count=1 | sha256sum' Nov 4 23:24:25.665: INFO: stderr: "1+0 records in\n1+0 records out\n64 bytes (64B) copied, 0.000041 seconds, 1.5MB/s\n" Nov 4 23:24:25.665: INFO: stdout: "f929bc6cf74f85cde60671619aea7a7e796e7292bde2e3d96ee5625cdb6e1155 -\n" Nov 4 23:24:25.665: INFO: Running '/usr/local/bin/kubectl --server=https://kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886.westus2.cloudapp.azure.com --kubeconfig=/workspace/aks722706072/kubeconfig/kubeconfig.westus2.json exec --namespace=multivolume-1271 security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60 -- /bin/sh -c dd if=/mnt/volume1 bs=64 count=1 | sha256sum | grep -Fq f929bc6cf74f85cde60671619aea7a7e796e7292bde2e3d96ee5625cdb6e1155' Nov 4 23:24:26.709: INFO: stderr: "1+0 records in\n1+0 records out\n64 bytes (64B) copied, 0.000482 seconds, 129.7KB/s\n" Nov 4 23:24:26.709: INFO: stdout: "" �[1mSTEP�[0m: Checking if the volume2 exists as expected volume mode (Block) Nov 4 23:24:26.709: INFO: Running '/usr/local/bin/kubectl --server=https://kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886.westus2.cloudapp.azure.com --kubeconfig=/workspace/aks722706072/kubeconfig/kubeconfig.westus2.json exec --namespace=multivolume-1271 security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60 -- /bin/sh -c test -b /mnt/volume2' Nov 4 23:24:28.727: INFO: stderr: "" Nov 4 23:24:28.727: INFO: stdout: "" Nov 4 23:24:28.727: INFO: Running '/usr/local/bin/kubectl --server=https://kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886.westus2.cloudapp.azure.com --kubeconfig=/workspace/aks722706072/kubeconfig/kubeconfig.westus2.json exec --namespace=multivolume-1271 security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60 -- /bin/sh -c test -d /mnt/volume2' Nov 4 23:24:29.090: INFO: rc: 1 �[1mSTEP�[0m: Checking if write to the volume2 works properly Nov 4 23:24:29.090: INFO: Running '/usr/local/bin/kubectl --server=https://kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886.westus2.cloudapp.azure.com --kubeconfig=/workspace/aks722706072/kubeconfig/kubeconfig.westus2.json exec --namespace=multivolume-1271 security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60 -- /bin/sh -c echo jdUqw9MBl7Sd3XTppsdJCeIB0mUF6KOqGvQIV3zgB5BzvahfLCclMpImp0KHiNGWu7qIgacXsQwiey9ZCFPJSA== | base64 -d | sha256sum' Nov 4 23:24:29.459: INFO: stderr: "" Nov 4 23:24:29.459: INFO: stdout: "a712688da2e351d0a553368dbecbaa16ef44034ab2c62553ed59f3da31a95ad9 -\n" Nov 4 23:24:29.459: INFO: Running '/usr/local/bin/kubectl --server=https://kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886.westus2.cloudapp.azure.com --kubeconfig=/workspace/aks722706072/kubeconfig/kubeconfig.westus2.json exec --namespace=multivolume-1271 security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60 -- /bin/sh -c echo jdUqw9MBl7Sd3XTppsdJCeIB0mUF6KOqGvQIV3zgB5BzvahfLCclMpImp0KHiNGWu7qIgacXsQwiey9ZCFPJSA== | base64 -d | dd of=/mnt/volume2 bs=64 count=1' Nov 4 23:24:30.541: INFO: stderr: "1+0 records in\n1+0 records out\n64 bytes (64B) copied, 0.000046 seconds, 1.3MB/s\n" Nov 4 23:24:30.541: INFO: stdout: "" �[1mSTEP�[0m: Checking if read from the volume2 works properly Nov 4 23:24:30.541: INFO: Running '/usr/local/bin/kubectl --server=https://kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886.westus2.cloudapp.azure.com --kubeconfig=/workspace/aks722706072/kubeconfig/kubeconfig.westus2.json exec --namespace=multivolume-1271 security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60 -- /bin/sh -c dd if=/mnt/volume2 bs=64 count=1 | sha256sum' Nov 4 23:24:31.499: INFO: stderr: "1+0 records in\n1+0 records out\n64 bytes (64B) copied, 0.000050 seconds, 1.2MB/s\n" Nov 4 23:24:31.499: INFO: stdout: "a712688da2e351d0a553368dbecbaa16ef44034ab2c62553ed59f3da31a95ad9 -\n" Nov 4 23:24:31.499: INFO: Running '/usr/local/bin/kubectl --server=https://kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886.westus2.cloudapp.azure.com --kubeconfig=/workspace/aks722706072/kubeconfig/kubeconfig.westus2.json exec --namespace=multivolume-1271 security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60 -- /bin/sh -c dd if=/mnt/volume2 bs=64 count=1 | sha256sum | grep -Fq a712688da2e351d0a553368dbecbaa16ef44034ab2c62553ed59f3da31a95ad9' Nov 4 23:24:32.676: INFO: stderr: "1+0 records in\n1+0 records out\n64 bytes (64B) copied, 0.000060 seconds, 1.0MB/s\n" Nov 4 23:24:32.676: INFO: stdout: "" Nov 4 23:24:32.691: INFO: Deleting pod "security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60" in namespace "multivolume-1271" Nov 4 23:24:32.702: INFO: Wait up to 5m0s for pod "security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60" to be fully deleted WARNING: pod log: security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60/write-pod: pods "security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60" not found �[1mSTEP�[0m: Creating pod on {Name:k8s-agentpool1-11489250-vmss000000 Selector:map[] Affinity:&Affinity{NodeAffinity:&NodeAffinity{RequiredDuringSchedulingIgnoredDuringExecution:&NodeSelector{NodeSelectorTerms:[]NodeSelectorTerm{NodeSelectorTerm{MatchExpressions:[]NodeSelectorRequirement{},MatchFields:[]NodeSelectorRequirement{NodeSelectorRequirement{Key:metadata.name,Operator:In,Values:[k8s-agentpool1-11489250-vmss000000],},},},},},PreferredDuringSchedulingIgnoredDuringExecution:[]PreferredSchedulingTerm{},},PodAffinity:nil,PodAntiAffinity:nil,}} with multiple volumes Nov 4 23:30:04.730: FAIL: Unexpected error: <*errors.errorString | 0xc001aadf70>: { s: "pod \"security-context-32e5a9df-35d4-4d74-9394-deba9a253642\" is not Running: timed out waiting for the condition", } pod "security-context-32e5a9df-35d4-4d74-9394-deba9a253642" is not Running: timed out waiting for the condition occurred Nov 4 23:30:04.730: INFO: Deleting pod "security-context-32e5a9df-35d4-4d74-9394-deba9a253642" in namespace "multivolume-1271" Nov 4 23:30:04.741: INFO: Wait up to 5m0s for pod "security-context-32e5a9df-35d4-4d74-9394-deba9a253642" to be fully deleted WARNING: pod log: security-context-32e5a9df-35d4-4d74-9394-deba9a253642/write-pod: pods "security-context-32e5a9df-35d4-4d74-9394-deba9a253642" not found �[1mSTEP�[0m: Deleting pvc Nov 4 23:30:32.752: INFO: Deleting PersistentVolumeClaim "csi-hostpathx2bq7" Nov 4 23:30:32.755: INFO: Waiting up to 5m0s for PersistentVolume pvc-9ed66ee4-7423-40c4-84c5-8f543f1def58 to get deleted Nov 4 23:30:32.761: INFO: PersistentVolume pvc-9ed66ee4-7423-40c4-84c5-8f543f1def58 found and phase=Bound (5.708544ms) Nov 4 23:30:37.764: INFO: PersistentVolume pvc-9ed66ee4-7423-40c4-84c5-8f543f1def58 was removed �[1mSTEP�[0m: Deleting sc �[1mSTEP�[0m: Deleting pvc Nov 4 23:30:37.770: INFO: Deleting PersistentVolumeClaim "csi-hostpathf8m5j" Nov 4 23:30:37.773: INFO: Waiting up to 5m0s for PersistentVolume pvc-4a5b982d-5149-4071-a6a2-4b3908f45203 to get deleted Nov 4 23:30:37.776: INFO: PersistentVolume pvc-4a5b982d-5149-4071-a6a2-4b3908f45203 found and phase=Bound (2.951024ms) Nov 4 23:30:42.779: INFO: PersistentVolume pvc-4a5b982d-5149-4071-a6a2-4b3908f45203 was removed �[1mSTEP�[0m: Deleting sc �[1mSTEP�[0m: uninstalling csi-hostpath driver Nov 4 23:30:42.783: INFO: deleting *v1.ServiceAccount: multivolume-1271/csi-attacher Nov 4 23:30:42.791: INFO: deleting *v1.ClusterRole: external-attacher-runner-multivolume-1271 Nov 4 23:30:42.802: INFO: deleting *v1.ClusterRoleBinding: csi-attacher-role-multivolume-1271 Nov 4 23:30:42.809: INFO: deleting *v1.Role: multivolume-1271/external-attacher-cfg-multivolume-1271 Nov 4 23:30:42.812: INFO: deleting *v1.RoleBinding: multivolume-1271/csi-attacher-role-cfg Nov 4 23:30:42.816: INFO: deleting *v1.ServiceAccount: multivolume-1271/csi-provisioner Nov 4 23:30:42.827: INFO: deleting *v1.ClusterRole: external-provisioner-runner-multivolume-1271 Nov 4 23:30:42.836: INFO: deleting *v1.ClusterRoleBinding: csi-provisioner-role-multivolume-1271 Nov 4 23:30:42.840: INFO: deleting *v1.Role: multivolume-1271/external-provisioner-cfg-multivolume-1271 Nov 4 23:30:42.844: INFO: deleting *v1.RoleBinding: multivolume-1271/csi-provisioner-role-cfg Nov 4 23:30:42.849: INFO: deleting *v1.ServiceAccount: multivolume-1271/csi-snapshotter Nov 4 23:30:42.854: INFO: deleting *v1.ClusterRole: external-snapshotter-runner-multivolume-1271 Nov 4 23:30:42.861: INFO: deleting *v1.ClusterRoleBinding: csi-snapshotter-role-multivolume-1271 Nov 4 23:30:42.865: INFO: deleting *v1.Role: multivolume-1271/external-snapshotter-leaderelection-multivolume-1271 Nov 4 23:30:42.870: INFO: deleting *v1.RoleBinding: multivolume-1271/external-snapshotter-leaderelection Nov 4 23:30:42.874: INFO: deleting *v1.ServiceAccount: multivolume-1271/csi-resizer Nov 4 23:30:42.887: INFO: deleting *v1.ClusterRole: external-resizer-runner-multivolume-1271 Nov 4 23:30:42.893: INFO: deleting *v1.ClusterRoleBinding: csi-resizer-role-multivolume-1271 Nov 4 23:30:42.899: INFO: deleting *v1.Role: multivolume-1271/external-resizer-cfg-multivolume-1271 Nov 4 23:30:42.917: INFO: deleting *v1.RoleBinding: multivolume-1271/csi-resizer-role-cfg Nov 4 23:30:42.921: INFO: deleting *v1.Service: multivolume-1271/csi-hostpath-attacher Nov 4 23:30:42.939: INFO: deleting *v1.StatefulSet: multivolume-1271/csi-hostpath-attacher Nov 4 23:30:42.950: INFO: deleting *v1beta1.CSIDriver: csi-hostpath-multivolume-1271 Nov 4 23:30:42.960: INFO: deleting *v1.Service: multivolume-1271/csi-hostpathplugin Nov 4 23:30:42.988: INFO: deleting *v1.StatefulSet: multivolume-1271/csi-hostpathplugin Nov 4 23:30:43.010: INFO: deleting *v1.Service: multivolume-1271/csi-hostpath-provisioner Nov 4 23:30:43.040: INFO: deleting *v1.StatefulSet: multivolume-1271/csi-hostpath-provisioner Nov 4 23:30:43.054: INFO: deleting *v1.Service: multivolume-1271/csi-hostpath-resizer Nov 4 23:30:43.079: INFO: deleting *v1.StatefulSet: multivolume-1271/csi-hostpath-resizer Nov 4 23:30:43.089: INFO: deleting *v1.Service: multivolume-1271/csi-snapshotter Nov 4 23:30:43.114: INFO: deleting *v1.StatefulSet: multivolume-1271/csi-snapshotter Nov 4 23:30:43.164: INFO: deleting *v1.ClusterRoleBinding: psp-csi-hostpath-role-multivolume-1271 [AfterEach] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] test/e2e/framework/framework.go:148 �[1mSTEP�[0m: Collecting events from namespace "multivolume-1271". �[1mSTEP�[0m: Found 60 events. Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:00 +0000 UTC - event for csi-hostpath-attacher: {statefulset-controller } SuccessfulCreate: create Pod csi-hostpath-attacher-0 in StatefulSet csi-hostpath-attacher successful Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:00 +0000 UTC - event for csi-hostpath-provisioner: {statefulset-controller } SuccessfulCreate: create Pod csi-hostpath-provisioner-0 in StatefulSet csi-hostpath-provisioner successful Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:00 +0000 UTC - event for csi-hostpath-resizer: {statefulset-controller } SuccessfulCreate: create Pod csi-hostpath-resizer-0 in StatefulSet csi-hostpath-resizer successful Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:00 +0000 UTC - event for csi-hostpathplugin: {statefulset-controller } SuccessfulCreate: create Pod csi-hostpathplugin-0 in StatefulSet csi-hostpathplugin successful Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:00 +0000 UTC - event for csi-hostpathx2bq7: {persistentvolume-controller } ExternalProvisioning: waiting for a volume to be created, either by external provisioner "csi-hostpath-multivolume-1271" or manually created by system administrator Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:00 +0000 UTC - event for csi-snapshotter: {statefulset-controller } SuccessfulCreate: create Pod csi-snapshotter-0 in StatefulSet csi-snapshotter successful Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:03 +0000 UTC - event for csi-hostpath-attacher-0: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "quay.io/k8scsi/csi-attacher:v2.0.0" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:04 +0000 UTC - event for csi-hostpath-provisioner-0: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "quay.io/k8scsi/csi-provisioner:v1.4.0" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:04 +0000 UTC - event for csi-hostpathplugin-0: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "quay.io/k8scsi/csi-node-driver-registrar:v1.2.0" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:05 +0000 UTC - event for csi-snapshotter-0: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:06 +0000 UTC - event for csi-hostpath-resizer-0: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "quay.io/k8scsi/csi-resizer:v0.3.0" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:10 +0000 UTC - event for csi-hostpath-attacher-0: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "quay.io/k8scsi/csi-attacher:v2.0.0" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:11 +0000 UTC - event for csi-hostpath-attacher-0: {kubelet k8s-agentpool1-11489250-vmss000000} Started: Started container csi-attacher Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:11 +0000 UTC - event for csi-hostpath-attacher-0: {kubelet k8s-agentpool1-11489250-vmss000000} Created: Created container csi-attacher Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:11 +0000 UTC - event for csi-hostpath-provisioner-0: {kubelet k8s-agentpool1-11489250-vmss000000} Created: Created container csi-provisioner Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:11 +0000 UTC - event for csi-hostpath-provisioner-0: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "quay.io/k8scsi/csi-provisioner:v1.4.0" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:12 +0000 UTC - event for csi-hostpath-provisioner-0: {kubelet k8s-agentpool1-11489250-vmss000000} Started: Started container csi-provisioner Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:13 +0000 UTC - event for csi-hostpathplugin-0: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "quay.io/k8scsi/csi-node-driver-registrar:v1.2.0" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:14 +0000 UTC - event for csi-hostpathplugin-0: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "quay.io/k8scsi/hostpathplugin:v1.2.0" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:14 +0000 UTC - event for csi-hostpathplugin-0: {kubelet k8s-agentpool1-11489250-vmss000000} Created: Created container node-driver-registrar Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:14 +0000 UTC - event for csi-hostpathplugin-0: {kubelet k8s-agentpool1-11489250-vmss000000} Started: Started container node-driver-registrar Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:14 +0000 UTC - event for csi-snapshotter-0: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:15 +0000 UTC - event for csi-hostpath-resizer-0: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "quay.io/k8scsi/csi-resizer:v0.3.0" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:15 +0000 UTC - event for csi-snapshotter-0: {kubelet k8s-agentpool1-11489250-vmss000000} Created: Created container csi-snapshotter Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:15 +0000 UTC - event for csi-snapshotter-0: {kubelet k8s-agentpool1-11489250-vmss000000} Started: Started container csi-snapshotter Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:16 +0000 UTC - event for csi-hostpath-resizer-0: {kubelet k8s-agentpool1-11489250-vmss000000} Started: Started container csi-resizer Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:16 +0000 UTC - event for csi-hostpath-resizer-0: {kubelet k8s-agentpool1-11489250-vmss000000} Created: Created container csi-resizer Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:23 +0000 UTC - event for csi-hostpathplugin-0: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "quay.io/k8scsi/hostpathplugin:v1.2.0" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:29 +0000 UTC - event for csi-hostpathplugin-0: {kubelet k8s-agentpool1-11489250-vmss000000} Created: Created container hostpath Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:34 +0000 UTC - event for csi-hostpathx2bq7: {csi-hostpath-multivolume-1271_csi-hostpath-provisioner-0_c7348d3a-2157-4ed5-accc-9d85e47b0ccc } Provisioning: External provisioner is provisioning volume for claim "multivolume-1271/csi-hostpathx2bq7" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:35 +0000 UTC - event for csi-hostpathplugin-0: {kubelet k8s-agentpool1-11489250-vmss000000} Started: Started container hostpath Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:35 +0000 UTC - event for csi-hostpathplugin-0: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "quay.io/k8scsi/livenessprobe:v1.1.0" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:36 +0000 UTC - event for csi-hostpathf8m5j: {persistentvolume-controller } ExternalProvisioning: waiting for a volume to be created, either by external provisioner "csi-hostpath-multivolume-1271" or manually created by system administrator Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:36 +0000 UTC - event for csi-hostpathf8m5j: {csi-hostpath-multivolume-1271_csi-hostpath-provisioner-0_c7348d3a-2157-4ed5-accc-9d85e47b0ccc } Provisioning: External provisioner is provisioning volume for claim "multivolume-1271/csi-hostpathf8m5j" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:36 +0000 UTC - event for csi-hostpathx2bq7: {csi-hostpath-multivolume-1271_csi-hostpath-provisioner-0_c7348d3a-2157-4ed5-accc-9d85e47b0ccc } ProvisioningSucceeded: Successfully provisioned volume pvc-9ed66ee4-7423-40c4-84c5-8f543f1def58 Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:37 +0000 UTC - event for csi-hostpathf8m5j: {csi-hostpath-multivolume-1271_csi-hostpath-provisioner-0_c7348d3a-2157-4ed5-accc-9d85e47b0ccc } ProvisioningSucceeded: Successfully provisioned volume pvc-4a5b982d-5149-4071-a6a2-4b3908f45203 Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:38 +0000 UTC - event for security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60: {attachdetach-controller } SuccessfulAttachVolume: AttachVolume.Attach succeeded for volume "pvc-9ed66ee4-7423-40c4-84c5-8f543f1def58" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:38 +0000 UTC - event for security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60: {attachdetach-controller } SuccessfulAttachVolume: AttachVolume.Attach succeeded for volume "pvc-4a5b982d-5149-4071-a6a2-4b3908f45203" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:40 +0000 UTC - event for csi-hostpathplugin-0: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "quay.io/k8scsi/livenessprobe:v1.1.0" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:46 +0000 UTC - event for csi-hostpathplugin-0: {kubelet k8s-agentpool1-11489250-vmss000000} Created: Created container liveness-probe Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:47 +0000 UTC - event for csi-hostpathplugin-0: {kubelet k8s-agentpool1-11489250-vmss000000} Started: Started container liveness-probe Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:48 +0000 UTC - event for security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60: {kubelet k8s-agentpool1-11489250-vmss000000} SuccessfulMountVolume: MapVolume.MapDevice succeeded for volume "pvc-9ed66ee4-7423-40c4-84c5-8f543f1def58" volumeMapPath "/var/lib/kubelet/pods/77f98bfa-63e0-45f7-852f-21de84053f54/volumeDevices/kubernetes.io~csi" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:48 +0000 UTC - event for security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60: {kubelet k8s-agentpool1-11489250-vmss000000} SuccessfulMountVolume: MapVolume.MapDevice succeeded for volume "pvc-9ed66ee4-7423-40c4-84c5-8f543f1def58" globalMapPath "/var/lib/kubelet/plugins/kubernetes.io/csi/volumeDevices/pvc-9ed66ee4-7423-40c4-84c5-8f543f1def58/dev" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:49 +0000 UTC - event for security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60: {kubelet k8s-agentpool1-11489250-vmss000000} SuccessfulMountVolume: MapVolume.MapDevice succeeded for volume "pvc-4a5b982d-5149-4071-a6a2-4b3908f45203" globalMapPath "/var/lib/kubelet/plugins/kubernetes.io/csi/volumeDevices/pvc-4a5b982d-5149-4071-a6a2-4b3908f45203/dev" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:23:49 +0000 UTC - event for security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60: {kubelet k8s-agentpool1-11489250-vmss000000} SuccessfulMountVolume: MapVolume.MapDevice succeeded for volume "pvc-4a5b982d-5149-4071-a6a2-4b3908f45203" volumeMapPath "/var/lib/kubelet/pods/77f98bfa-63e0-45f7-852f-21de84053f54/volumeDevices/kubernetes.io~csi" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:24:03 +0000 UTC - event for security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "docker.io/library/busybox:1.29" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:24:04 +0000 UTC - event for security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "docker.io/library/busybox:1.29" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:24:08 +0000 UTC - event for security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60: {kubelet k8s-agentpool1-11489250-vmss000000} Created: Created container write-pod Nov 4 23:30:43.198: INFO: At 2019-11-04 23:24:09 +0000 UTC - event for security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60: {kubelet k8s-agentpool1-11489250-vmss000000} Started: Started container write-pod Nov 4 23:30:43.198: INFO: At 2019-11-04 23:24:33 +0000 UTC - event for security-context-49c6f7af-84ff-4dd6-af15-f6884ba40a60: {kubelet k8s-agentpool1-11489250-vmss000000} Killing: Stopping container write-pod Nov 4 23:30:43.198: INFO: At 2019-11-04 23:25:04 +0000 UTC - event for security-context-32e5a9df-35d4-4d74-9394-deba9a253642: {attachdetach-controller } SuccessfulAttachVolume: AttachVolume.Attach succeeded for volume "pvc-4a5b982d-5149-4071-a6a2-4b3908f45203" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:25:04 +0000 UTC - event for security-context-32e5a9df-35d4-4d74-9394-deba9a253642: {attachdetach-controller } SuccessfulAttachVolume: AttachVolume.Attach succeeded for volume "pvc-9ed66ee4-7423-40c4-84c5-8f543f1def58" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:25:21 +0000 UTC - event for security-context-32e5a9df-35d4-4d74-9394-deba9a253642: {kubelet k8s-agentpool1-11489250-vmss000000} SuccessfulMountVolume: MapVolume.MapDevice succeeded for volume "pvc-9ed66ee4-7423-40c4-84c5-8f543f1def58" globalMapPath "/var/lib/kubelet/plugins/kubernetes.io/csi/volumeDevices/pvc-9ed66ee4-7423-40c4-84c5-8f543f1def58/dev" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:25:21 +0000 UTC - event for security-context-32e5a9df-35d4-4d74-9394-deba9a253642: {kubelet k8s-agentpool1-11489250-vmss000000} SuccessfulMountVolume: MapVolume.MapDevice succeeded for volume "pvc-9ed66ee4-7423-40c4-84c5-8f543f1def58" volumeMapPath "/var/lib/kubelet/pods/c8bbac75-23c8-4d72-9400-010bfe235977/volumeDevices/kubernetes.io~csi" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:25:21 +0000 UTC - event for security-context-32e5a9df-35d4-4d74-9394-deba9a253642: {kubelet k8s-agentpool1-11489250-vmss000000} SuccessfulMountVolume: MapVolume.MapDevice succeeded for volume "pvc-4a5b982d-5149-4071-a6a2-4b3908f45203" volumeMapPath "/var/lib/kubelet/pods/c8bbac75-23c8-4d72-9400-010bfe235977/volumeDevices/kubernetes.io~csi" Nov 4 23:30:43.198: INFO: At 2019-11-04 23:25:21 +0000 UTC - event for security-context-32e5a9df-35d4-4d74-9394-deba9a253642: {kubelet k8s-agentpool1-11489250-vmss000000} SuccessfulMountVolume: MapVolume.MapDevice succeeded for volume "pvc-4a5b982d-5149-4071-a6a2-4b3908f45203" globalMapPath "/var/lib/kubelet/plugins/kubernetes.io/csi/volumeDevices/pvc-4a5b982d-5149-4071-a6a2-4b3908f45203/dev" Nov 4 23:30:43.199: INFO: At 2019-11-04 23:25:24 +0000 UTC - event for security-context-32e5a9df-35d4-4d74-9394-deba9a253642: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "docker.io/library/busybox:1.29" Nov 4 23:30:43.199: INFO: At 2019-11-04 23:29:55 +0000 UTC - event for security-context-32e5a9df-35d4-4d74-9394-deba9a253642: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "docker.io/library/busybox:1.29" Nov 4 23:30:43.199: INFO: At 2019-11-04 23:29:59 +0000 UTC - event for security-context-32e5a9df-35d4-4d74-9394-deba9a253642: {kubelet k8s-agentpool1-11489250-vmss000000} Created: Created container write-pod Nov 4 23:30:43.199: INFO: At 2019-11-04 23:30:03 +0000 UTC - event for security-context-32e5a9df-35d4-4d74-9394-deba9a253642: {kubelet k8s-agentpool1-11489250-vmss000000} Started: Started container write-pod Nov 4 23:30:43.206: INFO: POD NODE PHASE GRACE CONDITIONS Nov 4 23:30:43.206: INFO: csi-hostpath-attacher-0 k8s-agentpool1-11489250-vmss000000 Running [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:23:00 +0000 UTC } {Ready True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:23:12 +0000 UTC } {ContainersReady True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:23:12 +0000 UTC } {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:23:00 +0000 UTC }] Nov 4 23:30:43.206: INFO: csi-hostpath-provisioner-0 k8s-agentpool1-11489250-vmss000000 Running [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:23:01 +0000 UTC } {Ready True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:23:12 +0000 UTC } {ContainersReady True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:23:12 +0000 UTC } {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:23:01 +0000 UTC }] Nov 4 23:30:43.206: INFO: csi-hostpath-resizer-0 k8s-agentpool1-11489250-vmss000000 Running [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:23:01 +0000 UTC } {Ready True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:23:16 +0000 UTC } {ContainersReady True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:23:16 +0000 UTC } {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:23:01 +0000 UTC }] Nov 4 23:30:43.206: INFO: csi-hostpathplugin-0 k8s-agentpool1-11489250-vmss000000 Running [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:23:00 +0000 UTC } {Ready True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:23:54 +0000 UTC } {ContainersReady True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:23:54 +0000 UTC } {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:23:00 +0000 UTC }] Nov 4 23:30:43.206: INFO: csi-snapshotter-0 k8s-agentpool1-11489250-vmss000000 Running [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:23:01 +0000 UTC } {Ready True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:23:15 +0000 UTC } {ContainersReady True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:23:15 +0000 UTC } {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:23:01 +0000 UTC }] Nov 4 23:30:43.206: INFO: Nov 4 23:30:43.212: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:30:43.216: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000000 /api/v1/nodes/k8s-agentpool1-11489250-vmss000000 4d779b63-b743-40ed-9ec9-08ee7dd28ab4 27400 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000000 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000000] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-1271":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-multivolume-5778":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3215":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3527":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-4405":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-7631":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-multivolume-2637":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-2219":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-4772":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-7421":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-8811":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-volumemode-5039":"k8s-agentpool1-11489250-vmss000000","csi-mock-csi-mock-volumes-5459":"csi-mock-csi-mock-volumes-5459"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.2.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/0,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.2.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:30:36 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:30:36 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:30:36 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:30:36 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.4,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000000,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5eb5b251426b48e38a0513ab8a4e5fc0,SystemUUID:CB87A4F7-2661-444E-8AB3-C1A284BA9714,BootID:42192202-1583-496a-b5ff-b9c6d63be18f,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[k8s.gcr.io/kubernetes-dashboard-amd64@sha256:0ae6b69432e78069c5ce2bcde0fe409c5c4d6f0f4d9cd50a17974fea38898747 k8s.gcr.io/kubernetes-dashboard-amd64:v1.10.1],SizeBytes:121711221,},ContainerImage{Names:[gcr.io/kubernetes-helm/tiller@sha256:f6d8f4ab9ba993b5f5b60a6edafe86352eabe474ffeb84cb6c79b8866dce45d1 gcr.io/kubernetes-helm/tiller:v2.11.0],SizeBytes:71821984,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:0efcb424f1dde9b9fb11a1a14f2e48ab47e1c3f08bc3a929990dcfcb1f7ab34f quay.io/k8scsi/csi-provisioner:v1.4.0-rc1],SizeBytes:54431016,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:0aba670b4d9d6b2e720bbf575d733156c676b693ca26501235444490300db838 quay.io/k8scsi/csi-attacher:v1.1.0],SizeBytes:42839085,},ContainerImage{Names:[k8s.gcr.io/coredns@sha256:e83beb5e43f8513fa735e77ffc5859640baea30a882a11cc75c4c3244a737d3c k8s.gcr.io/coredns:1.5.0],SizeBytes:42488424,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[quay.io/k8scsi/mock-driver@sha256:e0eed916b7d970bad2b7d9875f9ad16932f987f0f3d91ec5d86da68b0b5cc9d1 quay.io/k8scsi/mock-driver:v2.1.0],SizeBytes:16226335,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:13daf82fb99e951a4bff8ae5fc7c17c3a8fe7130be6400990d8f6076c32d4599 quay.io/k8scsi/csi-node-driver-registrar:v1.1.0],SizeBytes:15815995,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/google-containers/startup-script@sha256:be96df6845a2af0eb61b17817ed085ce41048e4044c541da7580570b61beff3e gcr.io/google-containers/startup-script:v1],SizeBytes:12528443,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause@sha256:f78411e19d84a252e53bff71a4407a5686c46983a2c2eeed83929b888179acea k8s.gcr.io/pause-amd64:3.1 k8s.gcr.io/pause:3.1],SizeBytes:742472,},},VolumesInUse:[kubernetes.io/csi/csi-hostpath-v0-provisioning-8811^136cf408-ff5b-11e9-bc6f-000d3ac3012d],VolumesAttached:[]AttachedVolume{AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-v0-provisioning-8811^136cf408-ff5b-11e9-bc6f-000d3ac3012d,DevicePath:,},},Config:nil,},} Nov 4 23:30:43.216: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:30:43.221: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000000 Nov 4 23:30:43.263: INFO: kube-proxy-4q46s started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.263: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:30:43.263: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-84tg5 started at 2019-11-04 23:29:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.263: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:30:43.263: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:26:43 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.263: INFO: Container csi-provisioner ready: true, restart count 0 Nov 4 23:30:43.263: INFO: tiller-deploy-7559b6b885-5lm2k started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.263: INFO: Container tiller ready: true, restart count 0 Nov 4 23:30:43.263: INFO: pod-subpath-test-hostpathsymlink-gpm4 started at 2019-11-04 23:30:35 +0000 UTC (1+1 container statuses recorded) Nov 4 23:30:43.263: INFO: Init container init-volume-hostpathsymlink-gpm4 ready: false, restart count 0 Nov 4 23:30:43.263: INFO: Container test-container-subpath-hostpathsymlink-gpm4 ready: false, restart count 0 Nov 4 23:30:43.263: INFO: kubernetes-dashboard-65966766b9-lvtsz started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.263: INFO: Container kubernetes-dashboard ready: true, restart count 0 Nov 4 23:30:43.263: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-tpwjh started at 2019-11-04 23:29:45 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.263: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:30:43.263: INFO: security-context-c5a56bb9-4783-4e96-acd5-c582533b775c started at 2019-11-04 23:30:11 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.263: INFO: Container write-pod ready: true, restart count 0 Nov 4 23:30:43.263: INFO: pod-subpath-test-local-preprovisionedpv-2ddb started at 2019-11-04 23:30:33 +0000 UTC (1+1 container statuses recorded) Nov 4 23:30:43.263: INFO: Init container init-volume-local-preprovisionedpv-2ddb ready: false, restart count 0 Nov 4 23:30:43.263: INFO: Container test-container-subpath-local-preprovisionedpv-2ddb ready: false, restart count 0 Nov 4 23:30:43.263: INFO: blobfuse-flexvol-installer-8shkx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.263: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:30:43.263: INFO: csi-snapshotter-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.263: INFO: Container csi-snapshotter ready: true, restart count 0 Nov 4 23:30:43.263: INFO: security-context-d9a85e53-48f5-4011-b782-8684571f39ba started at 2019-11-04 23:30:22 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.263: INFO: Container write-pod ready: true, restart count 0 Nov 4 23:30:43.263: INFO: keyvault-flexvolume-xzbqt started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.263: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:30:43.263: INFO: pod-subpath-test-local-preprovisionedpv-v5dd started at 2019-11-04 23:30:18 +0000 UTC (1+1 container statuses recorded) Nov 4 23:30:43.263: INFO: Init container init-volume-local-preprovisionedpv-v5dd ready: true, restart count 0 Nov 4 23:30:43.263: INFO: Container test-container-subpath-local-preprovisionedpv-v5dd ready: false, restart count 0 Nov 4 23:30:43.263: INFO: csi-hostpathplugin-0 started at 2019-11-04 23:23:00 +0000 UTC (0+3 container statuses recorded) Nov 4 23:30:43.263: INFO: Container hostpath ready: true, restart count 0 Nov 4 23:30:43.263: INFO: Container liveness-probe ready: true, restart count 0 Nov 4 23:30:43.263: INFO: Container node-driver-registrar ready: true, restart count 0 Nov 4 23:30:43.263: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-flccr started at 2019-11-04 23:29:15 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.263: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:30:43.263: INFO: security-context-de0173e0-6e05-44dc-9f7d-8853f185c3f7 started at 2019-11-04 23:30:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.263: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:30:43.263: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-m9tnz started at 2019-11-04 23:26:17 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.263: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:30:43.263: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:26:41 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.263: INFO: Container csi-attacher ready: true, restart count 0 Nov 4 23:30:43.263: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-rt52w started at 2019-11-04 23:26:46 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.263: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:30:43.263: INFO: hostpath-symlink-prep-provisioning-5576 started at 2019-11-04 23:30:19 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.263: INFO: Container init-volume-provisioning-5576 ready: false, restart count 0 Nov 4 23:30:43.263: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.264: INFO: Container csi-provisioner ready: true, restart count 0 Nov 4 23:30:43.264: INFO: csi-hostpathplugin-p7nrj started at 2019-11-04 23:26:42 +0000 UTC (0+2 container statuses recorded) Nov 4 23:30:43.264: INFO: Container driver-registrar ready: true, restart count 0 Nov 4 23:30:43.264: INFO: Container hostpath ready: true, restart count 0 Nov 4 23:30:43.264: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-8wk7z started at 2019-11-04 23:29:22 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.264: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:30:43.264: INFO: pod-subpath-test-csi-hostpath-v0-dynamicpv-z8xc started at 2019-11-04 23:30:27 +0000 UTC (1+2 container statuses recorded) Nov 4 23:30:43.264: INFO: Init container init-volume-csi-hostpath-v0-dynamicpv-z8xc ready: false, restart count 0 Nov 4 23:30:43.264: INFO: Container test-container-subpath-csi-hostpath-v0-dynamicpv-z8xc ready: false, restart count 0 Nov 4 23:30:43.264: INFO: Container test-container-volume-csi-hostpath-v0-dynamicpv-z8xc ready: false, restart count 0 Nov 4 23:30:43.264: INFO: azure-ip-masq-agent-nk6ts started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.264: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:30:43.264: INFO: coredns-87f5d796-n67d4 started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.264: INFO: Container coredns ready: true, restart count 0 Nov 4 23:30:43.264: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-x7m4h started at 2019-11-04 23:26:28 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.264: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:30:43.264: INFO: csi-hostpath-resizer-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.264: INFO: Container csi-resizer ready: true, restart count 0 Nov 4 23:30:43.264: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-f7sh6 started at 2019-11-04 23:26:35 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.264: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:30:43.264: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:23:00 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.264: INFO: Container csi-attacher ready: true, restart count 0 W1104 23:30:43.273391 30406 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:30:43.397: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:30:43.397: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:30:43.399: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000001 /api/v1/nodes/k8s-agentpool1-11489250-vmss000001 2d9f0ab9-c990-46a3-b3bc-7808950553bf 26766 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:1 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000001 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000001] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-3014":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6609":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6697":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-3251":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-4810":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-546":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-6369":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-multivolume-7618":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-2817":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-5016":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-6812":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-855":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumeio-7968":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumemode-6226":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumeio-9022":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumemode-551":"k8s-agentpool1-11489250-vmss000001"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.1.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/1,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.1.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:29:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.5,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000001,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5456dda39b3d435cb066867813114df8,SystemUUID:6D0288FF-6F23-3E4D-916E-D89B5AFE73FD,BootID:eeee8a92-9ca0-4335-88b5-e62705f3f746,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[k8s.gcr.io/metrics-server-amd64@sha256:49a9f12f7067d11f42c803dbe61ed2c1299959ad85cb315b25ff7eef8e6b8892 k8s.gcr.io/metrics-server-amd64:v0.2.1],SizeBytes:42541759,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64@sha256:3b36bd80b97c532a774e7f6246797b8575d97037982f353476c703ba6686c75c gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64:1.0],SizeBytes:19227369,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[nginx@sha256:485b610fefec7ff6c463ced9623314a04ed67e3945b9c08d7e53a47f6d108dc7 nginx:1.14-alpine],SizeBytes:16032814,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:30:43.400: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:30:43.404: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000001 Nov 4 23:30:43.411: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-js48p started at 2019-11-04 23:30:38 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.411: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:30:43.411: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-shzhf started at 2019-11-04 23:29:45 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.411: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:30:43.411: INFO: security-context-20325a00-2847-4d6b-85a9-508b471289ce started at 2019-11-04 23:30:14 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.411: INFO: Container write-pod ready: true, restart count 0 Nov 4 23:30:43.411: INFO: back-off-cap started at 2019-11-04 23:25:56 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.411: INFO: Container back-off-cap ready: false, restart count 5 Nov 4 23:30:43.411: INFO: azure-ip-masq-agent-tdbp9 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.411: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:30:43.411: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-lnsc6 started at 2019-11-04 23:30:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.411: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:30:43.411: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-dx6ms started at 2019-11-04 23:30:24 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.411: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:30:43.411: INFO: pod-subpath-test-local-preprovisionedpv-ttxd started at 2019-11-04 23:29:44 +0000 UTC (1+2 container statuses recorded) Nov 4 23:30:43.411: INFO: Init container init-volume-local-preprovisionedpv-ttxd ready: true, restart count 0 Nov 4 23:30:43.411: INFO: Container test-container-subpath-local-preprovisionedpv-ttxd ready: true, restart count 1 Nov 4 23:30:43.411: INFO: Container test-container-volume-local-preprovisionedpv-ttxd ready: true, restart count 0 Nov 4 23:30:43.411: INFO: nfs-server started at 2019-11-04 23:25:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.411: INFO: Container nfs-server ready: true, restart count 0 Nov 4 23:30:43.411: INFO: kube-proxy-gkpm5 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.411: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:30:43.411: INFO: blobfuse-flexvol-installer-kfjfx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.411: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:30:43.411: INFO: keyvault-flexvolume-b7nvg started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.411: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:30:43.411: INFO: metrics-server-58ff8c5ddf-g2hh5 started at 2019-11-04 23:10:24 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.411: INFO: Container metrics-server ready: true, restart count 0 Nov 4 23:30:43.411: INFO: pod-subpath-test-local-preprovisionedpv-dxx9 started at 2019-11-04 23:29:59 +0000 UTC (1+2 container statuses recorded) Nov 4 23:30:43.411: INFO: Init container init-volume-local-preprovisionedpv-dxx9 ready: true, restart count 0 Nov 4 23:30:43.411: INFO: Container test-container-subpath-local-preprovisionedpv-dxx9 ready: true, restart count 2 Nov 4 23:30:43.411: INFO: Container test-container-volume-local-preprovisionedpv-dxx9 ready: true, restart count 0 Nov 4 23:30:43.411: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-sdnnm started at 2019-11-04 23:29:35 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.411: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:30:43.411: INFO: security-context-478af4c4-0103-49bd-9443-db0740f9ed6f started at 2019-11-04 23:30:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.411: INFO: Container write-pod ready: false, restart count 0 W1104 23:30:43.413976 30406 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:30:43.449: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:30:43.449: INFO: Logging node info for node k8s-master-11489250-0 Nov 4 23:30:43.457: INFO: Node Info: &Node{ObjectMeta:{k8s-master-11489250-0 /api/v1/nodes/k8s-master-11489250-0 c7e8559d-81e4-4401-b9ca-034b4af0cc76 27350 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_DS2_v2 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:0 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:master kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-master-11489250-0 kubernetes.io/os:linux kubernetes.io/role:master node-role.kubernetes.io/master:] map[node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.0.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachines/k8s-master-11489250-0,Unschedulable:false,Taints:[]Taint{Taint{Key:node-role.kubernetes.io/master,Value:true,Effect:NoSchedule,TimeAdded:<nil>,},},ConfigSource:nil,PodCIDRs:[10.244.0.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{7284359168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{6497927168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:30:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:30:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:30:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:30:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.255.5,},NodeAddress{Type:Hostname,Address:k8s-master-11489250-0,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:4b2e1465590843f69a05114d1f1735bd,SystemUUID:885E2CBD-DE7B-DE41-AC15-18FB50C2BFBA,BootID:1ddb5423-95a4-4f58-9386-79ef6bca0f71,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[k8sprowinternal.azurecr.io/azure-cloud-controller-manager@sha256:823d2ccf43dfd34db70b91241aa07ab6579db11ffe31cc07fd0fdd752388497c k8sprowinternal.azurecr.io/azure-cloud-controller-manager:1191484695150333952-3d6cd6ff],SizeBytes:92595467,},ContainerImage{Names:[k8s.gcr.io/kube-addon-manager-amd64@sha256:382c220b3531d9f95bf316a16b7282cc2ef929cd8a89a9dd3f5933edafc41a8e k8s.gcr.io/kube-addon-manager-amd64:v9.0.1],SizeBytes:83076194,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:30:43.457: INFO: Logging kubelet events for node k8s-master-11489250-0 Nov 4 23:30:43.463: INFO: Logging pods the kubelet thinks is on node k8s-master-11489250-0 Nov 4 23:30:43.472: INFO: kube-apiserver-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.472: INFO: Container kube-apiserver ready: true, restart count 0 Nov 4 23:30:43.472: INFO: kube-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.472: INFO: Container kube-controller-manager ready: true, restart count 0 Nov 4 23:30:43.472: INFO: kube-scheduler-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.472: INFO: Container kube-scheduler ready: true, restart count 0 Nov 4 23:30:43.472: INFO: azure-ip-masq-agent-hhzdb started at 2019-11-04 23:10:03 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.472: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:30:43.472: INFO: kube-proxy-knwmt started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.472: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:30:43.472: INFO: cloud-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.472: INFO: Container cloud-controller-manager ready: true, restart count 0 Nov 4 23:30:43.472: INFO: kube-addon-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:43.472: INFO: Container kube-addon-manager ready: true, restart count 0 W1104 23:30:43.478419 30406 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:30:43.495: INFO: Latency metrics for node k8s-master-11489250-0 Nov 4 23:30:43.495: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready �[1mSTEP�[0m: Destroying namespace "multivolume-1271" for this suite.
Find security-context-32e5a9df-35d4-4d74-9394-deba9a253642 mentions in log files
go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sIn\-tree\sVolumes\s\[Driver\:\shostPathSymlink\]\s\[Testpattern\:\sInline\-volume\s\(default\sfs\)\]\ssubPath\sshould\ssupport\screating\smultiple\ssubpath\sfrom\ssame\svolumes\s\[Slow\]$'
test/e2e/storage/testsuites/subpath.go:289 Nov 4 23:29:59.029: while waiting for hostPath init pod to succeed Unexpected error: <*errors.errorString | 0xc000c4d520>: { s: "Gave up after waiting 5m0s for pod \"hostpath-symlink-prep-provisioning-4995\" to be \"success or failure\"", } Gave up after waiting 5m0s for pod "hostpath-symlink-prep-provisioning-4995" to be "success or failure" occurred test/e2e/storage/drivers/in_tree.go:883from junit_13.xml
[BeforeEach] [Testpattern: Inline-volume (default fs)] subPath test/e2e/storage/testsuites/base.go:99 [BeforeEach] [Testpattern: Inline-volume (default fs)] subPath test/e2e/framework/framework.go:147 �[1mSTEP�[0m: Creating a kubernetes client Nov 4 23:24:58.333: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Building a namespace api object, basename provisioning �[1mSTEP�[0m: Binding the e2e-test-privileged-psp PodSecurityPolicy to the default service account in provisioning-4995 �[1mSTEP�[0m: Waiting for a default service account to be provisioned in namespace [It] should support creating multiple subpath from same volumes [Slow] test/e2e/storage/testsuites/subpath.go:289 Nov 4 23:24:58.478: INFO: Could not find CSI Name for in-tree plugin kubernetes.io/host-path Nov 4 23:24:58.486: INFO: Waiting up to 5m0s for pod "hostpath-symlink-prep-provisioning-4995" in namespace "provisioning-4995" to be "success or failure" Nov 4 23:24:58.495: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 9.405375ms Nov 4 23:25:00.498: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2.012022514s Nov 4 23:25:02.510: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4.023586423s Nov 4 23:25:04.513: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 6.02658686s Nov 4 23:25:06.516: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 8.029834098s Nov 4 23:25:08.519: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 10.03271203s Nov 4 23:25:10.522: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 12.035795362s Nov 4 23:25:12.529: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 14.043280027s Nov 4 23:25:14.532: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 16.046082152s Nov 4 23:25:16.535: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 18.048878874s Nov 4 23:25:18.538: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 20.051520394s Nov 4 23:25:20.541: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 22.054496414s Nov 4 23:25:22.544: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 24.057876035s Nov 4 23:25:24.547: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 26.060875951s Nov 4 23:25:26.550: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 28.063474361s Nov 4 23:25:28.552: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 30.065933068s Nov 4 23:25:30.555: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 32.068790876s Nov 4 23:25:32.558: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 34.071532581s Nov 4 23:25:34.561: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 36.074910589s Nov 4 23:25:36.564: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 38.078250195s Nov 4 23:25:38.567: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 40.081202996s Nov 4 23:25:40.570: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 42.084380496s Nov 4 23:25:42.573: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 44.087148791s Nov 4 23:25:44.576: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 46.090366087s Nov 4 23:25:46.579: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 48.093127278s Nov 4 23:25:48.582: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 50.095951267s Nov 4 23:25:50.585: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 52.099257757s Nov 4 23:25:52.588: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 54.102261444s Nov 4 23:25:54.591: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 56.104724624s Nov 4 23:25:56.594: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 58.108001308s Nov 4 23:25:58.598: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m0.112235598s Nov 4 23:26:00.601: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m2.115347977s Nov 4 23:26:02.604: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m4.118004551s Nov 4 23:26:04.607: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m6.120693123s Nov 4 23:26:06.610: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m8.123594694s Nov 4 23:26:08.613: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m10.126825066s Nov 4 23:26:10.616: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m12.130442839s Nov 4 23:26:12.619: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m14.133259404s Nov 4 23:26:14.622: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m16.135850265s Nov 4 23:26:16.625: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m18.138649726s Nov 4 23:26:18.628: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m20.142023089s Nov 4 23:26:20.631: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m22.14534345s Nov 4 23:26:22.635: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m24.149159413s Nov 4 23:26:24.638: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m26.15243957s Nov 4 23:26:26.641: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m28.155296322s Nov 4 23:26:28.644: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m30.158257472s Nov 4 23:26:30.648: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m32.161704425s Nov 4 23:26:32.651: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m34.165312277s Nov 4 23:26:34.655: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m36.168521023s Nov 4 23:26:36.658: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m38.172272172s Nov 4 23:26:38.662: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m40.175699017s Nov 4 23:26:40.672: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m42.186324617s Nov 4 23:26:42.676: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m44.190213662s Nov 4 23:26:44.679: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m46.193220798s Nov 4 23:26:46.682: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m48.196113431s Nov 4 23:26:48.685: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m50.199035062s Nov 4 23:26:50.688: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m52.201556889s Nov 4 23:26:52.690: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m54.204002213s Nov 4 23:26:54.693: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m56.206597136s Nov 4 23:26:56.695: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 1m58.209260158s Nov 4 23:26:58.704: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m0.217645224s Nov 4 23:27:00.706: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m2.220139241s Nov 4 23:27:02.710: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m4.223524064s Nov 4 23:27:04.712: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m6.226158978s Nov 4 23:27:06.716: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m8.229493897s Nov 4 23:27:08.719: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m10.232826314s Nov 4 23:27:10.722: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m12.235696825s Nov 4 23:27:12.725: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m14.238595135s Nov 4 23:27:14.727: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m16.24107264s Nov 4 23:27:16.730: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m18.243786044s Nov 4 23:27:18.734: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m20.247661257s Nov 4 23:27:20.742: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m22.256178604s Nov 4 23:27:22.745: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m24.258570601s Nov 4 23:27:24.747: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m26.2613541s Nov 4 23:27:26.750: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m28.264132197s Nov 4 23:27:28.753: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m30.266910192s Nov 4 23:27:30.756: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m32.269695185s Nov 4 23:27:32.762: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m34.275681802s Nov 4 23:27:34.765: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m36.278559993s Nov 4 23:27:36.767: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m38.281284781s Nov 4 23:27:38.770: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m40.284099068s Nov 4 23:27:40.775: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m42.288694067s Nov 4 23:27:42.777: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m44.291209449s Nov 4 23:27:44.780: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m46.294370433s Nov 4 23:27:46.784: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m48.298315223s Nov 4 23:27:48.787: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m50.301050901s Nov 4 23:27:50.790: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m52.303649876s Nov 4 23:27:52.792: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m54.306299351s Nov 4 23:27:54.795: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m56.309301826s Nov 4 23:27:56.799: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 2m58.312475501s Nov 4 23:27:58.801: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m0.315151171s Nov 4 23:28:00.803: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m2.317428736s Nov 4 23:28:02.812: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m4.326015849s Nov 4 23:28:04.819: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m6.333084148s Nov 4 23:28:06.822: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m8.336048714s Nov 4 23:28:08.825: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m10.338861976s Nov 4 23:28:10.828: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m12.341704938s Nov 4 23:28:12.830: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m14.344240495s Nov 4 23:28:14.833: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m16.347276155s Nov 4 23:28:16.836: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m18.350143712s Nov 4 23:28:18.839: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m20.352772466s Nov 4 23:28:20.841: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m22.355322817s Nov 4 23:28:22.844: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m24.35826427s Nov 4 23:28:24.847: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m26.361288322s Nov 4 23:28:26.850: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m28.364128571s Nov 4 23:28:28.852: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m30.366448715s Nov 4 23:28:30.855: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m32.368740557s Nov 4 23:28:32.864: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m34.378205953s Nov 4 23:28:34.867: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m36.381039096s Nov 4 23:28:36.869: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m38.383431635s Nov 4 23:28:38.872: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m40.385782771s Nov 4 23:28:40.875: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m42.388810711s Nov 4 23:28:42.878: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m44.391620948s Nov 4 23:28:44.881: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m46.394789986s Nov 4 23:28:46.884: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m48.39757502s Nov 4 23:28:48.886: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m50.400112351s Nov 4 23:28:50.889: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m52.40271578s Nov 4 23:28:52.897: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m54.411132254s Nov 4 23:28:54.904: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m56.418339817s Nov 4 23:28:56.915: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 3m58.428832004s Nov 4 23:28:58.918: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m0.431888632s Nov 4 23:29:00.921: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m2.434599955s Nov 4 23:29:02.924: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m4.438218184s Nov 4 23:29:04.927: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m6.440920104s Nov 4 23:29:06.930: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m8.443479022s Nov 4 23:29:08.944: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m10.45765363s Nov 4 23:29:10.946: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m12.460059943s Nov 4 23:29:12.950: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m14.463476364s Nov 4 23:29:14.952: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m16.465844175s Nov 4 23:29:16.955: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m18.469099491s Nov 4 23:29:18.958: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m20.472418106s Nov 4 23:29:20.962: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m22.475854121s Nov 4 23:29:22.965: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m24.479246635s Nov 4 23:29:24.972: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m26.486178675s Nov 4 23:29:26.978: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m28.492130005s Nov 4 23:29:28.982: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m30.495712016s Nov 4 23:29:30.986: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m32.499562828s Nov 4 23:29:32.989: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m34.503044835s Nov 4 23:29:34.993: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m36.506497041s Nov 4 23:29:36.996: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m38.510158947s Nov 4 23:29:38.999: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m40.513354948s Nov 4 23:29:41.002: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m42.516426147s Nov 4 23:29:43.006: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m44.519724046s Nov 4 23:29:45.008: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m46.522170037s Nov 4 23:29:47.012: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m48.525926838s Nov 4 23:29:49.016: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m50.529935239s Nov 4 23:29:51.020: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m52.533550535s Nov 4 23:29:53.022: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m54.536322624s Nov 4 23:29:55.025: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m56.539159712s Nov 4 23:29:57.029: INFO: Pod "hostpath-symlink-prep-provisioning-4995": Phase="Pending", Reason="", readiness=false. Elapsed: 4m58.542910506s Nov 4 23:29:59.029: FAIL: while waiting for hostPath init pod to succeed Unexpected error: <*errors.errorString | 0xc000c4d520>: { s: "Gave up after waiting 5m0s for pod \"hostpath-symlink-prep-provisioning-4995\" to be \"success or failure\"", } Gave up after waiting 5m0s for pod "hostpath-symlink-prep-provisioning-4995" to be "success or failure" occurred [AfterEach] [Testpattern: Inline-volume (default fs)] subPath test/e2e/framework/framework.go:148 �[1mSTEP�[0m: Collecting events from namespace "provisioning-4995". �[1mSTEP�[0m: Found 2 events. Nov 4 23:29:59.034: INFO: At 2019-11-04 23:25:03 +0000 UTC - event for hostpath-symlink-prep-provisioning-4995: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "docker.io/library/busybox:1.29" Nov 4 23:29:59.034: INFO: At 2019-11-04 23:29:53 +0000 UTC - event for hostpath-symlink-prep-provisioning-4995: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "docker.io/library/busybox:1.29" Nov 4 23:29:59.037: INFO: POD NODE PHASE GRACE CONDITIONS Nov 4 23:29:59.037: INFO: hostpath-symlink-prep-provisioning-4995 k8s-agentpool1-11489250-vmss000000 Pending [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:58 +0000 UTC } {Ready False 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:58 +0000 UTC ContainersNotReady containers with unready status: [init-volume-provisioning-4995]} {ContainersReady False 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:58 +0000 UTC ContainersNotReady containers with unready status: [init-volume-provisioning-4995]} {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:58 +0000 UTC }] Nov 4 23:29:59.037: INFO: Nov 4 23:29:59.041: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:59.043: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000000 /api/v1/nodes/k8s-agentpool1-11489250-vmss000000 4d779b63-b743-40ed-9ec9-08ee7dd28ab4 26525 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000000 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000000] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-1271":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-multivolume-5778":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3215":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3527":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-4405":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-7631":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-multivolume-2637":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-2219":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-4772":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-7421":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-volumemode-5039":"k8s-agentpool1-11489250-vmss000000","csi-mock-csi-mock-volumes-5459":"csi-mock-csi-mock-volumes-5459"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.2.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/0,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.2.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.4,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000000,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5eb5b251426b48e38a0513ab8a4e5fc0,SystemUUID:CB87A4F7-2661-444E-8AB3-C1A284BA9714,BootID:42192202-1583-496a-b5ff-b9c6d63be18f,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[k8s.gcr.io/kubernetes-dashboard-amd64@sha256:0ae6b69432e78069c5ce2bcde0fe409c5c4d6f0f4d9cd50a17974fea38898747 k8s.gcr.io/kubernetes-dashboard-amd64:v1.10.1],SizeBytes:121711221,},ContainerImage{Names:[gcr.io/kubernetes-helm/tiller@sha256:f6d8f4ab9ba993b5f5b60a6edafe86352eabe474ffeb84cb6c79b8866dce45d1 gcr.io/kubernetes-helm/tiller:v2.11.0],SizeBytes:71821984,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:0efcb424f1dde9b9fb11a1a14f2e48ab47e1c3f08bc3a929990dcfcb1f7ab34f quay.io/k8scsi/csi-provisioner:v1.4.0-rc1],SizeBytes:54431016,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:0aba670b4d9d6b2e720bbf575d733156c676b693ca26501235444490300db838 quay.io/k8scsi/csi-attacher:v1.1.0],SizeBytes:42839085,},ContainerImage{Names:[k8s.gcr.io/coredns@sha256:e83beb5e43f8513fa735e77ffc5859640baea30a882a11cc75c4c3244a737d3c k8s.gcr.io/coredns:1.5.0],SizeBytes:42488424,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[quay.io/k8scsi/mock-driver@sha256:e0eed916b7d970bad2b7d9875f9ad16932f987f0f3d91ec5d86da68b0b5cc9d1 quay.io/k8scsi/mock-driver:v2.1.0],SizeBytes:16226335,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:13daf82fb99e951a4bff8ae5fc7c17c3a8fe7130be6400990d8f6076c32d4599 quay.io/k8scsi/csi-node-driver-registrar:v1.1.0],SizeBytes:15815995,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/google-containers/startup-script@sha256:be96df6845a2af0eb61b17817ed085ce41048e4044c541da7580570b61beff3e gcr.io/google-containers/startup-script:v1],SizeBytes:12528443,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause@sha256:f78411e19d84a252e53bff71a4407a5686c46983a2c2eeed83929b888179acea k8s.gcr.io/pause-amd64:3.1 k8s.gcr.io/pause:3.1],SizeBytes:742472,},},VolumesInUse:[kubernetes.io/csi/csi-hostpath-multivolume-1271^1f0de69b-ff5a-11e9-a283-9eaad548a827 kubernetes.io/csi/csi-hostpath-multivolume-1271^205df607-ff5a-11e9-a283-9eaad548a827],VolumesAttached:[]AttachedVolume{AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-1271^1f0de69b-ff5a-11e9-a283-9eaad548a827,DevicePath:,},AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-1271^205df607-ff5a-11e9-a283-9eaad548a827,DevicePath:,},},Config:nil,},} Nov 4 23:29:59.044: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:59.048: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:59.063: INFO: pod-subpath-test-hostpathsymlink-kmsd started at 2019-11-04 23:23:19 +0000 UTC (1+2 container statuses recorded) Nov 4 23:29:59.063: INFO: Init container init-volume-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:29:59.063: INFO: Container test-container-subpath-hostpathsymlink-kmsd ready: false, restart count 0 Nov 4 23:29:59.063: INFO: Container test-container-volume-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:29:59.063: INFO: security-context-32e5a9df-35d4-4d74-9394-deba9a253642 started at 2019-11-04 23:25:05 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:29:59.063: INFO: tiller-deploy-7559b6b885-5lm2k started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container tiller ready: true, restart count 0 Nov 4 23:29:59.063: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-pqjdl started at 2019-11-04 23:29:50 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:59.063: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-tpwjh started at 2019-11-04 23:29:45 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:59.063: INFO: kubernetes-dashboard-65966766b9-lvtsz started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container kubernetes-dashboard ready: true, restart count 0 Nov 4 23:29:59.063: INFO: csi-snapshotter-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container csi-snapshotter ready: true, restart count 0 Nov 4 23:29:59.063: INFO: blobfuse-flexvol-installer-8shkx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:29:59.063: INFO: keyvault-flexvolume-xzbqt started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:29:59.063: INFO: csi-hostpathplugin-0 started at 2019-11-04 23:23:00 +0000 UTC (0+3 container statuses recorded) Nov 4 23:29:59.063: INFO: Container hostpath ready: true, restart count 0 Nov 4 23:29:59.063: INFO: Container liveness-probe ready: true, restart count 0 Nov 4 23:29:59.063: INFO: Container node-driver-registrar ready: true, restart count 0 Nov 4 23:29:59.063: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-jv6k6 started at 2019-11-04 23:23:55 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:29:59.063: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:26:41 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container csi-attacher ready: false, restart count 0 Nov 4 23:29:59.063: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-rt52w started at 2019-11-04 23:26:46 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:59.063: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-flccr started at 2019-11-04 23:29:15 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:59.063: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-m9tnz started at 2019-11-04 23:26:17 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:59.063: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container csi-provisioner ready: true, restart count 0 Nov 4 23:29:59.063: INFO: csi-hostpathplugin-p7nrj started at 2019-11-04 23:26:42 +0000 UTC (0+2 container statuses recorded) Nov 4 23:29:59.063: INFO: Container driver-registrar ready: false, restart count 0 Nov 4 23:29:59.063: INFO: Container hostpath ready: false, restart count 0 Nov 4 23:29:59.063: INFO: hostpath-symlink-prep-provisioning-4995 started at 2019-11-04 23:24:58 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container init-volume-provisioning-4995 ready: false, restart count 0 Nov 4 23:29:59.063: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-8wk7z started at 2019-11-04 23:29:22 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:59.063: INFO: coredns-87f5d796-n67d4 started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container coredns ready: true, restart count 0 Nov 4 23:29:59.063: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-x7m4h started at 2019-11-04 23:26:28 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:59.063: INFO: azure-ip-masq-agent-nk6ts started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:29:59.063: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-f7sh6 started at 2019-11-04 23:26:35 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:59.063: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:23:00 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container csi-attacher ready: true, restart count 0 Nov 4 23:29:59.063: INFO: csi-hostpath-resizer-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container csi-resizer ready: true, restart count 0 Nov 4 23:29:59.063: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-84tg5 started at 2019-11-04 23:29:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:59.063: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:26:43 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container csi-provisioner ready: false, restart count 0 Nov 4 23:29:59.063: INFO: kube-proxy-4q46s started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.063: INFO: Container kube-proxy ready: true, restart count 0 W1104 23:29:59.066653 30422 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:29:59.520: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:59.520: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:59.523: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000001 /api/v1/nodes/k8s-agentpool1-11489250-vmss000001 2d9f0ab9-c990-46a3-b3bc-7808950553bf 26766 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:1 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000001 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000001] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-3014":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6609":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6697":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-3251":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-4810":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-546":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-6369":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-multivolume-7618":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-2817":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-5016":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-6812":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-855":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumeio-7968":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumemode-6226":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumeio-9022":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumemode-551":"k8s-agentpool1-11489250-vmss000001"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.1.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/1,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.1.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:29:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.5,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000001,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5456dda39b3d435cb066867813114df8,SystemUUID:6D0288FF-6F23-3E4D-916E-D89B5AFE73FD,BootID:eeee8a92-9ca0-4335-88b5-e62705f3f746,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[k8s.gcr.io/metrics-server-amd64@sha256:49a9f12f7067d11f42c803dbe61ed2c1299959ad85cb315b25ff7eef8e6b8892 k8s.gcr.io/metrics-server-amd64:v0.2.1],SizeBytes:42541759,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64@sha256:3b36bd80b97c532a774e7f6246797b8575d97037982f353476c703ba6686c75c gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64:1.0],SizeBytes:19227369,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[nginx@sha256:485b610fefec7ff6c463ced9623314a04ed67e3945b9c08d7e53a47f6d108dc7 nginx:1.14-alpine],SizeBytes:16032814,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:29:59.524: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:59.534: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:59.545: INFO: azure-ip-masq-agent-tdbp9 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.545: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:29:59.545: INFO: pod-subpath-test-local-preprovisionedpv-ttxd started at 2019-11-04 23:29:44 +0000 UTC (1+2 container statuses recorded) Nov 4 23:29:59.545: INFO: Init container init-volume-local-preprovisionedpv-ttxd ready: true, restart count 0 Nov 4 23:29:59.545: INFO: Container test-container-subpath-local-preprovisionedpv-ttxd ready: true, restart count 0 Nov 4 23:29:59.545: INFO: Container test-container-volume-local-preprovisionedpv-ttxd ready: true, restart count 0 Nov 4 23:29:59.545: INFO: nfs-server started at 2019-11-04 23:25:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.545: INFO: Container nfs-server ready: true, restart count 0 Nov 4 23:29:59.545: INFO: kube-proxy-gkpm5 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.545: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:29:59.545: INFO: blobfuse-flexvol-installer-kfjfx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.545: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:29:59.545: INFO: keyvault-flexvolume-b7nvg started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.545: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:29:59.545: INFO: metrics-server-58ff8c5ddf-g2hh5 started at 2019-11-04 23:10:24 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.545: INFO: Container metrics-server ready: true, restart count 0 Nov 4 23:29:59.545: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-sdnnm started at 2019-11-04 23:29:35 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.545: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:29:59.545: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-shzhf started at 2019-11-04 23:29:45 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.545: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:29:59.545: INFO: back-off-cap started at 2019-11-04 23:25:56 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.545: INFO: Container back-off-cap ready: false, restart count 5 W1104 23:29:59.557826 30422 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:29:59.609: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:59.609: INFO: Logging node info for node k8s-master-11489250-0 Nov 4 23:29:59.613: INFO: Node Info: &Node{ObjectMeta:{k8s-master-11489250-0 /api/v1/nodes/k8s-master-11489250-0 c7e8559d-81e4-4401-b9ca-034b4af0cc76 26678 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_DS2_v2 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:0 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:master kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-master-11489250-0 kubernetes.io/os:linux kubernetes.io/role:master node-role.kubernetes.io/master:] map[node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.0.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachines/k8s-master-11489250-0,Unschedulable:false,Taints:[]Taint{Taint{Key:node-role.kubernetes.io/master,Value:true,Effect:NoSchedule,TimeAdded:<nil>,},},ConfigSource:nil,PodCIDRs:[10.244.0.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{7284359168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{6497927168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:29:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.255.5,},NodeAddress{Type:Hostname,Address:k8s-master-11489250-0,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:4b2e1465590843f69a05114d1f1735bd,SystemUUID:885E2CBD-DE7B-DE41-AC15-18FB50C2BFBA,BootID:1ddb5423-95a4-4f58-9386-79ef6bca0f71,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[k8sprowinternal.azurecr.io/azure-cloud-controller-manager@sha256:823d2ccf43dfd34db70b91241aa07ab6579db11ffe31cc07fd0fdd752388497c k8sprowinternal.azurecr.io/azure-cloud-controller-manager:1191484695150333952-3d6cd6ff],SizeBytes:92595467,},ContainerImage{Names:[k8s.gcr.io/kube-addon-manager-amd64@sha256:382c220b3531d9f95bf316a16b7282cc2ef929cd8a89a9dd3f5933edafc41a8e k8s.gcr.io/kube-addon-manager-amd64:v9.0.1],SizeBytes:83076194,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:29:59.613: INFO: Logging kubelet events for node k8s-master-11489250-0 Nov 4 23:29:59.622: INFO: Logging pods the kubelet thinks is on node k8s-master-11489250-0 Nov 4 23:29:59.633: INFO: kube-apiserver-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.633: INFO: Container kube-apiserver ready: true, restart count 0 Nov 4 23:29:59.633: INFO: kube-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.633: INFO: Container kube-controller-manager ready: true, restart count 0 Nov 4 23:29:59.633: INFO: kube-scheduler-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.633: INFO: Container kube-scheduler ready: true, restart count 0 Nov 4 23:29:59.633: INFO: azure-ip-masq-agent-hhzdb started at 2019-11-04 23:10:03 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.633: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:29:59.633: INFO: kube-proxy-knwmt started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.633: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:29:59.633: INFO: cloud-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.633: INFO: Container cloud-controller-manager ready: true, restart count 0 Nov 4 23:29:59.633: INFO: kube-addon-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:59.633: INFO: Container kube-addon-manager ready: true, restart count 0 W1104 23:29:59.640989 30422 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:29:59.669: INFO: Latency metrics for node k8s-master-11489250-0 Nov 4 23:29:59.669: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready �[1mSTEP�[0m: Destroying namespace "provisioning-4995" for this suite.
Find to mentions in log files
go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sIn\-tree\sVolumes\s\[Driver\:\shostPathSymlink\]\s\[Testpattern\:\sInline\-volume\s\(default\sfs\)\]\ssubPath\sshould\ssupport\srestarting\scontainers\susing\sdirectory\sas\ssubpath\s\[Slow\]$'
test/e2e/storage/testsuites/subpath.go:315 Nov 4 23:26:22.377: while waiting for container to restart Unexpected error: <*errors.errorString | 0xc000158370>: { s: "timed out waiting for the condition", } timed out waiting for the condition occurred test/e2e/storage/testsuites/subpath.go:845from junit_18.xml
[BeforeEach] [Testpattern: Inline-volume (default fs)] subPath test/e2e/storage/testsuites/base.go:99 [BeforeEach] [Testpattern: Inline-volume (default fs)] subPath test/e2e/framework/framework.go:147 �[1mSTEP�[0m: Creating a kubernetes client Nov 4 23:22:52.439: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Building a namespace api object, basename provisioning �[1mSTEP�[0m: Binding the e2e-test-privileged-psp PodSecurityPolicy to the default service account in provisioning-5576 �[1mSTEP�[0m: Waiting for a default service account to be provisioned in namespace [It] should support restarting containers using directory as subpath [Slow] test/e2e/storage/testsuites/subpath.go:315 Nov 4 23:22:52.643: INFO: Could not find CSI Name for in-tree plugin kubernetes.io/host-path Nov 4 23:22:52.651: INFO: Waiting up to 5m0s for pod "hostpath-symlink-prep-provisioning-5576" in namespace "provisioning-5576" to be "success or failure" Nov 4 23:22:52.654: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 2.616321ms Nov 4 23:22:54.657: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 2.005554524s Nov 4 23:22:56.660: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 4.008597225s Nov 4 23:22:58.663: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 6.011316121s Nov 4 23:23:00.666: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 8.014331216s Nov 4 23:23:02.669: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 10.01757211s Nov 4 23:23:04.672: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 12.0207008s Nov 4 23:23:06.676: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 14.024443093s Nov 4 23:23:08.679: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 16.027374076s Nov 4 23:23:10.682: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 18.030395357s Nov 4 23:23:12.685: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 20.033280934s Nov 4 23:23:14.688: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 22.036797613s Nov 4 23:23:16.704: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 24.052211785s Nov 4 23:23:18.707: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Succeeded", Reason="", readiness=false. Elapsed: 26.055355956s �[1mSTEP�[0m: Saw pod success Nov 4 23:23:18.707: INFO: Pod "hostpath-symlink-prep-provisioning-5576" satisfied condition "success or failure" Nov 4 23:23:18.707: INFO: Deleting pod "hostpath-symlink-prep-provisioning-5576" in namespace "provisioning-5576" Nov 4 23:23:18.721: INFO: Wait up to 5m0s for pod "hostpath-symlink-prep-provisioning-5576" to be fully deleted Nov 4 23:23:18.724: INFO: Creating resource for inline volume �[1mSTEP�[0m: Creating pod pod-subpath-test-hostpathsymlink-kmsd �[1mSTEP�[0m: Failing liveness probe Nov 4 23:24:20.734: INFO: Running '/usr/local/bin/kubectl --server=https://kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886.westus2.cloudapp.azure.com --kubeconfig=/workspace/aks722706072/kubeconfig/kubeconfig.westus2.json exec --namespace=provisioning-5576 pod-subpath-test-hostpathsymlink-kmsd --container test-container-volume-hostpathsymlink-kmsd -- /bin/sh -c rm /probe-volume/probe-file' Nov 4 23:24:22.368: INFO: stderr: "" Nov 4 23:24:22.368: INFO: stdout: "" Nov 4 23:24:22.368: INFO: Pod exec output: �[1mSTEP�[0m: Waiting for container to restart Nov 4 23:24:22.371: INFO: Container test-container-subpath-hostpathsymlink-kmsd, restarts: 0 Nov 4 23:24:32.374: INFO: Container test-container-subpath-hostpathsymlink-kmsd, restarts: 0 Nov 4 23:24:42.374: INFO: Container test-container-subpath-hostpathsymlink-kmsd, restarts: 0 Nov 4 23:24:52.374: INFO: Container test-container-subpath-hostpathsymlink-kmsd, restarts: 0 Nov 4 23:25:02.374: INFO: Container test-container-subpath-hostpathsymlink-kmsd, restarts: 0 Nov 4 23:25:12.376: INFO: Container test-container-subpath-hostpathsymlink-kmsd, restarts: 0 Nov 4 23:25:22.374: INFO: Container test-container-subpath-hostpathsymlink-kmsd, restarts: 0 Nov 4 23:25:32.374: INFO: Container test-container-subpath-hostpathsymlink-kmsd, restarts: 0 Nov 4 23:25:42.375: INFO: Container test-container-subpath-hostpathsymlink-kmsd, restarts: 0 Nov 4 23:25:52.374: INFO: Container test-container-subpath-hostpathsymlink-kmsd, restarts: 0 Nov 4 23:26:02.374: INFO: Container test-container-subpath-hostpathsymlink-kmsd, restarts: 0 Nov 4 23:26:12.374: INFO: Container test-container-subpath-hostpathsymlink-kmsd, restarts: 0 Nov 4 23:26:22.374: INFO: Container test-container-subpath-hostpathsymlink-kmsd, restarts: 0 Nov 4 23:26:22.377: INFO: Container test-container-subpath-hostpathsymlink-kmsd, restarts: 0 Nov 4 23:26:22.377: FAIL: while waiting for container to restart Unexpected error: <*errors.errorString | 0xc000158370>: { s: "timed out waiting for the condition", } timed out waiting for the condition occurred Nov 4 23:26:22.377: INFO: Deleting pod "pod-subpath-test-hostpathsymlink-kmsd" in namespace "provisioning-5576" Nov 4 23:26:22.382: INFO: Wait up to 5m0s for pod "pod-subpath-test-hostpathsymlink-kmsd" to be fully deleted �[1mSTEP�[0m: Deleting pod Nov 4 23:30:16.387: INFO: Deleting pod "pod-subpath-test-hostpathsymlink-kmsd" in namespace "provisioning-5576" Nov 4 23:30:16.396: INFO: Waiting up to 5m0s for pod "hostpath-symlink-prep-provisioning-5576" in namespace "provisioning-5576" to be "success or failure" Nov 4 23:30:16.399: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 2.53942ms Nov 4 23:30:18.401: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 2.005368293s Nov 4 23:30:20.404: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 4.007789162s Nov 4 23:30:22.407: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 6.010806935s Nov 4 23:30:24.410: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 8.013735305s Nov 4 23:30:26.413: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 10.017417981s Nov 4 23:30:28.416: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 12.020272048s Nov 4 23:30:30.419: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 14.023291116s Nov 4 23:30:32.422: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 16.02598408s Nov 4 23:30:34.425: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 18.028641942s Nov 4 23:30:36.428: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 20.031720107s Nov 4 23:30:38.431: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 22.035364975s Nov 4 23:30:40.434: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 24.038268736s Nov 4 23:30:42.438: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Pending", Reason="", readiness=false. Elapsed: 26.041481498s Nov 4 23:30:44.443: INFO: Pod "hostpath-symlink-prep-provisioning-5576": Phase="Succeeded", Reason="", readiness=false. Elapsed: 28.047284379s �[1mSTEP�[0m: Saw pod success Nov 4 23:30:44.443: INFO: Pod "hostpath-symlink-prep-provisioning-5576" satisfied condition "success or failure" Nov 4 23:30:44.443: INFO: Deleting pod "hostpath-symlink-prep-provisioning-5576" in namespace "provisioning-5576" Nov 4 23:30:44.467: INFO: Wait up to 5m0s for pod "hostpath-symlink-prep-provisioning-5576" to be fully deleted Nov 4 23:30:44.472: INFO: In-tree plugin kubernetes.io/host-path is not migrated, not validating any metrics [AfterEach] [Testpattern: Inline-volume (default fs)] subPath test/e2e/framework/framework.go:148 �[1mSTEP�[0m: Collecting events from namespace "provisioning-5576". �[1mSTEP�[0m: Found 25 events. Nov 4 23:30:44.478: INFO: At 2019-11-04 23:22:55 +0000 UTC - event for hostpath-symlink-prep-provisioning-5576: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "docker.io/library/busybox:1.29" Nov 4 23:30:44.478: INFO: At 2019-11-04 23:23:03 +0000 UTC - event for hostpath-symlink-prep-provisioning-5576: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "docker.io/library/busybox:1.29" Nov 4 23:30:44.478: INFO: At 2019-11-04 23:23:04 +0000 UTC - event for hostpath-symlink-prep-provisioning-5576: {kubelet k8s-agentpool1-11489250-vmss000000} Created: Created container init-volume-provisioning-5576 Nov 4 23:30:44.478: INFO: At 2019-11-04 23:23:06 +0000 UTC - event for hostpath-symlink-prep-provisioning-5576: {kubelet k8s-agentpool1-11489250-vmss000000} Started: Started container init-volume-provisioning-5576 Nov 4 23:30:44.478: INFO: At 2019-11-04 23:23:34 +0000 UTC - event for pod-subpath-test-hostpathsymlink-kmsd: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "docker.io/library/busybox:1.29" Nov 4 23:30:44.478: INFO: At 2019-11-04 23:23:35 +0000 UTC - event for pod-subpath-test-hostpathsymlink-kmsd: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "docker.io/library/busybox:1.29" Nov 4 23:30:44.478: INFO: At 2019-11-04 23:23:41 +0000 UTC - event for pod-subpath-test-hostpathsymlink-kmsd: {kubelet k8s-agentpool1-11489250-vmss000000} Created: Created container init-volume-hostpathsymlink-kmsd Nov 4 23:30:44.478: INFO: At 2019-11-04 23:23:46 +0000 UTC - event for pod-subpath-test-hostpathsymlink-kmsd: {kubelet k8s-agentpool1-11489250-vmss000000} Started: Started container init-volume-hostpathsymlink-kmsd Nov 4 23:30:44.478: INFO: At 2019-11-04 23:23:48 +0000 UTC - event for pod-subpath-test-hostpathsymlink-kmsd: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "docker.io/library/busybox:1.29" Nov 4 23:30:44.478: INFO: At 2019-11-04 23:23:49 +0000 UTC - event for pod-subpath-test-hostpathsymlink-kmsd: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "docker.io/library/busybox:1.29" Nov 4 23:30:44.478: INFO: At 2019-11-04 23:23:54 +0000 UTC - event for pod-subpath-test-hostpathsymlink-kmsd: {kubelet k8s-agentpool1-11489250-vmss000000} Created: Created container test-container-subpath-hostpathsymlink-kmsd Nov 4 23:30:44.478: INFO: At 2019-11-04 23:23:55 +0000 UTC - event for pod-subpath-test-hostpathsymlink-kmsd: {kubelet k8s-agentpool1-11489250-vmss000000} Started: Started container test-container-subpath-hostpathsymlink-kmsd Nov 4 23:30:44.478: INFO: At 2019-11-04 23:23:55 +0000 UTC - event for pod-subpath-test-hostpathsymlink-kmsd: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "docker.io/library/busybox:1.29" Nov 4 23:30:44.479: INFO: At 2019-11-04 23:23:58 +0000 UTC - event for pod-subpath-test-hostpathsymlink-kmsd: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "docker.io/library/busybox:1.29" Nov 4 23:30:44.479: INFO: At 2019-11-04 23:24:05 +0000 UTC - event for pod-subpath-test-hostpathsymlink-kmsd: {kubelet k8s-agentpool1-11489250-vmss000000} Created: Created container test-container-volume-hostpathsymlink-kmsd Nov 4 23:30:44.479: INFO: At 2019-11-04 23:24:08 +0000 UTC - event for pod-subpath-test-hostpathsymlink-kmsd: {kubelet k8s-agentpool1-11489250-vmss000000} Started: Started container test-container-volume-hostpathsymlink-kmsd Nov 4 23:30:44.479: INFO: At 2019-11-04 23:24:25 +0000 UTC - event for pod-subpath-test-hostpathsymlink-kmsd: {kubelet k8s-agentpool1-11489250-vmss000000} Unhealthy: Liveness probe failed: cat: can't open '/probe-volume/probe-file': No such file or directory Nov 4 23:30:44.479: INFO: At 2019-11-04 23:24:25 +0000 UTC - event for pod-subpath-test-hostpathsymlink-kmsd: {kubelet k8s-agentpool1-11489250-vmss000000} Killing: Container test-container-subpath-hostpathsymlink-kmsd failed liveness probe, will be restarted Nov 4 23:30:44.479: INFO: At 2019-11-04 23:29:44 +0000 UTC - event for pod-subpath-test-hostpathsymlink-kmsd: {kubelet k8s-agentpool1-11489250-vmss000000} Failed: Error: ErrImagePull Nov 4 23:30:44.479: INFO: At 2019-11-04 23:29:44 +0000 UTC - event for pod-subpath-test-hostpathsymlink-kmsd: {kubelet k8s-agentpool1-11489250-vmss000000} Failed: Failed to pull image "docker.io/library/busybox:1.29": rpc error: code = Unknown desc = Error response from daemon: Get https://registry-1.docker.io/v2/library/busybox/manifests/1.29: read tcp 10.240.0.4:47444->34.228.211.243:443: read: connection timed out Nov 4 23:30:44.479: INFO: At 2019-11-04 23:29:45 +0000 UTC - event for pod-subpath-test-hostpathsymlink-kmsd: {kubelet k8s-agentpool1-11489250-vmss000000} Killing: Stopping container test-container-volume-hostpathsymlink-kmsd Nov 4 23:30:44.479: INFO: At 2019-11-04 23:30:28 +0000 UTC - event for hostpath-symlink-prep-provisioning-5576: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "docker.io/library/busybox:1.29" Nov 4 23:30:44.479: INFO: At 2019-11-04 23:30:30 +0000 UTC - event for hostpath-symlink-prep-provisioning-5576: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "docker.io/library/busybox:1.29" Nov 4 23:30:44.479: INFO: At 2019-11-04 23:30:36 +0000 UTC - event for hostpath-symlink-prep-provisioning-5576: {kubelet k8s-agentpool1-11489250-vmss000000} Created: Created container init-volume-provisioning-5576 Nov 4 23:30:44.479: INFO: At 2019-11-04 23:30:40 +0000 UTC - event for hostpath-symlink-prep-provisioning-5576: {kubelet k8s-agentpool1-11489250-vmss000000} Started: Started container init-volume-provisioning-5576 Nov 4 23:30:44.483: INFO: POD NODE PHASE GRACE CONDITIONS Nov 4 23:30:44.483: INFO: Nov 4 23:30:44.487: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:30:44.489: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000000 /api/v1/nodes/k8s-agentpool1-11489250-vmss000000 4d779b63-b743-40ed-9ec9-08ee7dd28ab4 27400 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000000 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000000] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-1271":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-multivolume-5778":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3215":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3527":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-4405":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-7631":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-multivolume-2637":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-2219":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-4772":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-7421":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-8811":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-volumemode-5039":"k8s-agentpool1-11489250-vmss000000","csi-mock-csi-mock-volumes-5459":"csi-mock-csi-mock-volumes-5459"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.2.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/0,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.2.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:30:36 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:30:36 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:30:36 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:30:36 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.4,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000000,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5eb5b251426b48e38a0513ab8a4e5fc0,SystemUUID:CB87A4F7-2661-444E-8AB3-C1A284BA9714,BootID:42192202-1583-496a-b5ff-b9c6d63be18f,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[k8s.gcr.io/kubernetes-dashboard-amd64@sha256:0ae6b69432e78069c5ce2bcde0fe409c5c4d6f0f4d9cd50a17974fea38898747 k8s.gcr.io/kubernetes-dashboard-amd64:v1.10.1],SizeBytes:121711221,},ContainerImage{Names:[gcr.io/kubernetes-helm/tiller@sha256:f6d8f4ab9ba993b5f5b60a6edafe86352eabe474ffeb84cb6c79b8866dce45d1 gcr.io/kubernetes-helm/tiller:v2.11.0],SizeBytes:71821984,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:0efcb424f1dde9b9fb11a1a14f2e48ab47e1c3f08bc3a929990dcfcb1f7ab34f quay.io/k8scsi/csi-provisioner:v1.4.0-rc1],SizeBytes:54431016,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:0aba670b4d9d6b2e720bbf575d733156c676b693ca26501235444490300db838 quay.io/k8scsi/csi-attacher:v1.1.0],SizeBytes:42839085,},ContainerImage{Names:[k8s.gcr.io/coredns@sha256:e83beb5e43f8513fa735e77ffc5859640baea30a882a11cc75c4c3244a737d3c k8s.gcr.io/coredns:1.5.0],SizeBytes:42488424,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[quay.io/k8scsi/mock-driver@sha256:e0eed916b7d970bad2b7d9875f9ad16932f987f0f3d91ec5d86da68b0b5cc9d1 quay.io/k8scsi/mock-driver:v2.1.0],SizeBytes:16226335,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:13daf82fb99e951a4bff8ae5fc7c17c3a8fe7130be6400990d8f6076c32d4599 quay.io/k8scsi/csi-node-driver-registrar:v1.1.0],SizeBytes:15815995,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/google-containers/startup-script@sha256:be96df6845a2af0eb61b17817ed085ce41048e4044c541da7580570b61beff3e gcr.io/google-containers/startup-script:v1],SizeBytes:12528443,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause@sha256:f78411e19d84a252e53bff71a4407a5686c46983a2c2eeed83929b888179acea k8s.gcr.io/pause-amd64:3.1 k8s.gcr.io/pause:3.1],SizeBytes:742472,},},VolumesInUse:[kubernetes.io/csi/csi-hostpath-v0-provisioning-8811^136cf408-ff5b-11e9-bc6f-000d3ac3012d],VolumesAttached:[]AttachedVolume{AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-v0-provisioning-8811^136cf408-ff5b-11e9-bc6f-000d3ac3012d,DevicePath:,},},Config:nil,},} Nov 4 23:30:44.490: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:30:44.501: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000000 Nov 4 23:30:44.522: INFO: azure-ip-masq-agent-nk6ts started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.522: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:30:44.522: INFO: coredns-87f5d796-n67d4 started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.522: INFO: Container coredns ready: true, restart count 0 Nov 4 23:30:44.523: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-x7m4h started at 2019-11-04 23:26:28 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:30:44.523: INFO: pod-subpath-test-csi-hostpath-v0-dynamicpv-z8xc started at 2019-11-04 23:30:27 +0000 UTC (1+2 container statuses recorded) Nov 4 23:30:44.523: INFO: Init container init-volume-csi-hostpath-v0-dynamicpv-z8xc ready: false, restart count 0 Nov 4 23:30:44.523: INFO: Container test-container-subpath-csi-hostpath-v0-dynamicpv-z8xc ready: false, restart count 0 Nov 4 23:30:44.523: INFO: Container test-container-volume-csi-hostpath-v0-dynamicpv-z8xc ready: false, restart count 0 Nov 4 23:30:44.523: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-f7sh6 started at 2019-11-04 23:26:35 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:30:44.523: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:23:00 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Container csi-attacher ready: true, restart count 0 Nov 4 23:30:44.523: INFO: csi-hostpath-resizer-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Container csi-resizer ready: true, restart count 0 Nov 4 23:30:44.523: INFO: kube-proxy-4q46s started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:30:44.523: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-84tg5 started at 2019-11-04 23:29:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:30:44.523: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:26:43 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Container csi-provisioner ready: true, restart count 0 Nov 4 23:30:44.523: INFO: tiller-deploy-7559b6b885-5lm2k started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Container tiller ready: true, restart count 0 Nov 4 23:30:44.523: INFO: pod-subpath-test-hostpathsymlink-gpm4 started at 2019-11-04 23:30:35 +0000 UTC (1+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Init container init-volume-hostpathsymlink-gpm4 ready: false, restart count 0 Nov 4 23:30:44.523: INFO: Container test-container-subpath-hostpathsymlink-gpm4 ready: false, restart count 0 Nov 4 23:30:44.523: INFO: kubernetes-dashboard-65966766b9-lvtsz started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Container kubernetes-dashboard ready: true, restart count 0 Nov 4 23:30:44.523: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-tpwjh started at 2019-11-04 23:29:45 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:30:44.523: INFO: security-context-c5a56bb9-4783-4e96-acd5-c582533b775c started at 2019-11-04 23:30:11 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Container write-pod ready: true, restart count 0 Nov 4 23:30:44.523: INFO: pod-subpath-test-local-preprovisionedpv-2ddb started at 2019-11-04 23:30:33 +0000 UTC (1+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Init container init-volume-local-preprovisionedpv-2ddb ready: false, restart count 0 Nov 4 23:30:44.523: INFO: Container test-container-subpath-local-preprovisionedpv-2ddb ready: false, restart count 0 Nov 4 23:30:44.523: INFO: blobfuse-flexvol-installer-8shkx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:30:44.523: INFO: csi-snapshotter-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Container csi-snapshotter ready: true, restart count 0 Nov 4 23:30:44.523: INFO: security-context-d9a85e53-48f5-4011-b782-8684571f39ba started at 2019-11-04 23:30:22 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Container write-pod ready: true, restart count 0 Nov 4 23:30:44.523: INFO: keyvault-flexvolume-xzbqt started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:30:44.523: INFO: pod-subpath-test-local-preprovisionedpv-v5dd started at 2019-11-04 23:30:18 +0000 UTC (1+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Init container init-volume-local-preprovisionedpv-v5dd ready: true, restart count 0 Nov 4 23:30:44.523: INFO: Container test-container-subpath-local-preprovisionedpv-v5dd ready: false, restart count 0 Nov 4 23:30:44.523: INFO: csi-hostpathplugin-0 started at 2019-11-04 23:23:00 +0000 UTC (0+3 container statuses recorded) Nov 4 23:30:44.523: INFO: Container hostpath ready: true, restart count 0 Nov 4 23:30:44.523: INFO: Container liveness-probe ready: true, restart count 0 Nov 4 23:30:44.523: INFO: Container node-driver-registrar ready: true, restart count 0 Nov 4 23:30:44.523: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-m9tnz started at 2019-11-04 23:26:17 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:30:44.523: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:26:41 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Container csi-attacher ready: true, restart count 0 Nov 4 23:30:44.523: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-rt52w started at 2019-11-04 23:26:46 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:30:44.523: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-flccr started at 2019-11-04 23:29:15 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:30:44.523: INFO: security-context-de0173e0-6e05-44dc-9f7d-8853f185c3f7 started at 2019-11-04 23:30:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:30:44.523: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Container csi-provisioner ready: true, restart count 0 Nov 4 23:30:44.523: INFO: csi-hostpathplugin-p7nrj started at 2019-11-04 23:26:42 +0000 UTC (0+2 container statuses recorded) Nov 4 23:30:44.523: INFO: Container driver-registrar ready: true, restart count 0 Nov 4 23:30:44.523: INFO: Container hostpath ready: true, restart count 0 Nov 4 23:30:44.523: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-8wk7z started at 2019-11-04 23:29:22 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.523: INFO: Container agnhost ready: true, restart count 0 W1104 23:30:44.530253 30397 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:30:44.578: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:30:44.578: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:30:44.581: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000001 /api/v1/nodes/k8s-agentpool1-11489250-vmss000001 2d9f0ab9-c990-46a3-b3bc-7808950553bf 26766 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:1 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000001 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000001] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-3014":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6609":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6697":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-3251":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-4810":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-546":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-6369":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-multivolume-7618":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-2817":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-5016":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-6812":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-855":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumeio-7968":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumemode-6226":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumeio-9022":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumemode-551":"k8s-agentpool1-11489250-vmss000001"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.1.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/1,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.1.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:29:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.5,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000001,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5456dda39b3d435cb066867813114df8,SystemUUID:6D0288FF-6F23-3E4D-916E-D89B5AFE73FD,BootID:eeee8a92-9ca0-4335-88b5-e62705f3f746,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[k8s.gcr.io/metrics-server-amd64@sha256:49a9f12f7067d11f42c803dbe61ed2c1299959ad85cb315b25ff7eef8e6b8892 k8s.gcr.io/metrics-server-amd64:v0.2.1],SizeBytes:42541759,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64@sha256:3b36bd80b97c532a774e7f6246797b8575d97037982f353476c703ba6686c75c gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64:1.0],SizeBytes:19227369,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[nginx@sha256:485b610fefec7ff6c463ced9623314a04ed67e3945b9c08d7e53a47f6d108dc7 nginx:1.14-alpine],SizeBytes:16032814,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:30:44.581: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:30:44.586: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000001 Nov 4 23:30:44.593: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-shzhf started at 2019-11-04 23:29:45 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.593: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:30:44.593: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:30:43 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.593: INFO: Container csi-attacher ready: false, restart count 0 Nov 4 23:30:44.593: INFO: csi-snapshotter-0 started at 2019-11-04 23:30:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.593: INFO: Container csi-snapshotter ready: false, restart count 0 Nov 4 23:30:44.593: INFO: security-context-20325a00-2847-4d6b-85a9-508b471289ce started at 2019-11-04 23:30:14 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.593: INFO: Container write-pod ready: true, restart count 0 Nov 4 23:30:44.593: INFO: back-off-cap started at 2019-11-04 23:25:56 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.593: INFO: Container back-off-cap ready: false, restart count 5 Nov 4 23:30:44.593: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:30:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.593: INFO: Container csi-provisioner ready: false, restart count 0 Nov 4 23:30:44.593: INFO: csi-hostpath-resizer-0 started at 2019-11-04 23:30:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.593: INFO: Container csi-resizer ready: false, restart count 0 Nov 4 23:30:44.593: INFO: azure-ip-masq-agent-tdbp9 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.593: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:30:44.593: INFO: csi-hostpathplugin-0 started at 2019-11-04 23:30:44 +0000 UTC (0+3 container statuses recorded) Nov 4 23:30:44.593: INFO: Container hostpath ready: false, restart count 0 Nov 4 23:30:44.593: INFO: Container liveness-probe ready: false, restart count 0 Nov 4 23:30:44.593: INFO: Container node-driver-registrar ready: false, restart count 0 Nov 4 23:30:44.593: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-lnsc6 started at 2019-11-04 23:30:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.593: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:30:44.593: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-dx6ms started at 2019-11-04 23:30:24 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.593: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:30:44.593: INFO: pod-subpath-test-local-preprovisionedpv-ttxd started at 2019-11-04 23:29:44 +0000 UTC (1+2 container statuses recorded) Nov 4 23:30:44.593: INFO: Init container init-volume-local-preprovisionedpv-ttxd ready: true, restart count 0 Nov 4 23:30:44.593: INFO: Container test-container-subpath-local-preprovisionedpv-ttxd ready: true, restart count 1 Nov 4 23:30:44.593: INFO: Container test-container-volume-local-preprovisionedpv-ttxd ready: true, restart count 0 Nov 4 23:30:44.593: INFO: nfs-server started at 2019-11-04 23:25:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.593: INFO: Container nfs-server ready: true, restart count 0 Nov 4 23:30:44.593: INFO: keyvault-flexvolume-b7nvg started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.593: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:30:44.593: INFO: kube-proxy-gkpm5 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.593: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:30:44.593: INFO: blobfuse-flexvol-installer-kfjfx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.593: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:30:44.593: INFO: metrics-server-58ff8c5ddf-g2hh5 started at 2019-11-04 23:10:24 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.593: INFO: Container metrics-server ready: true, restart count 0 Nov 4 23:30:44.594: INFO: pod-subpath-test-local-preprovisionedpv-dxx9 started at 2019-11-04 23:29:59 +0000 UTC (1+2 container statuses recorded) Nov 4 23:30:44.594: INFO: Init container init-volume-local-preprovisionedpv-dxx9 ready: true, restart count 0 Nov 4 23:30:44.594: INFO: Container test-container-subpath-local-preprovisionedpv-dxx9 ready: true, restart count 2 Nov 4 23:30:44.594: INFO: Container test-container-volume-local-preprovisionedpv-dxx9 ready: true, restart count 0 Nov 4 23:30:44.594: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-sdnnm started at 2019-11-04 23:29:35 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.594: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:30:44.594: INFO: security-context-478af4c4-0103-49bd-9443-db0740f9ed6f started at 2019-11-04 23:30:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.594: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:30:44.594: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-js48p started at 2019-11-04 23:30:38 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.594: INFO: Container agnhost ready: false, restart count 0 W1104 23:30:44.596671 30397 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:30:44.639: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:30:44.639: INFO: Logging node info for node k8s-master-11489250-0 Nov 4 23:30:44.641: INFO: Node Info: &Node{ObjectMeta:{k8s-master-11489250-0 /api/v1/nodes/k8s-master-11489250-0 c7e8559d-81e4-4401-b9ca-034b4af0cc76 27350 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_DS2_v2 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:0 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:master kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-master-11489250-0 kubernetes.io/os:linux kubernetes.io/role:master node-role.kubernetes.io/master:] map[node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.0.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachines/k8s-master-11489250-0,Unschedulable:false,Taints:[]Taint{Taint{Key:node-role.kubernetes.io/master,Value:true,Effect:NoSchedule,TimeAdded:<nil>,},},ConfigSource:nil,PodCIDRs:[10.244.0.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{7284359168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{6497927168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:30:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:30:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:30:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:30:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.255.5,},NodeAddress{Type:Hostname,Address:k8s-master-11489250-0,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:4b2e1465590843f69a05114d1f1735bd,SystemUUID:885E2CBD-DE7B-DE41-AC15-18FB50C2BFBA,BootID:1ddb5423-95a4-4f58-9386-79ef6bca0f71,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[k8sprowinternal.azurecr.io/azure-cloud-controller-manager@sha256:823d2ccf43dfd34db70b91241aa07ab6579db11ffe31cc07fd0fdd752388497c k8sprowinternal.azurecr.io/azure-cloud-controller-manager:1191484695150333952-3d6cd6ff],SizeBytes:92595467,},ContainerImage{Names:[k8s.gcr.io/kube-addon-manager-amd64@sha256:382c220b3531d9f95bf316a16b7282cc2ef929cd8a89a9dd3f5933edafc41a8e k8s.gcr.io/kube-addon-manager-amd64:v9.0.1],SizeBytes:83076194,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:30:44.642: INFO: Logging kubelet events for node k8s-master-11489250-0 Nov 4 23:30:44.648: INFO: Logging pods the kubelet thinks is on node k8s-master-11489250-0 Nov 4 23:30:44.653: INFO: cloud-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.653: INFO: Container cloud-controller-manager ready: true, restart count 0 Nov 4 23:30:44.653: INFO: kube-addon-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.653: INFO: Container kube-addon-manager ready: true, restart count 0 Nov 4 23:30:44.653: INFO: kube-apiserver-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.653: INFO: Container kube-apiserver ready: true, restart count 0 Nov 4 23:30:44.653: INFO: kube-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.653: INFO: Container kube-controller-manager ready: true, restart count 0 Nov 4 23:30:44.653: INFO: kube-scheduler-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.653: INFO: Container kube-scheduler ready: true, restart count 0 Nov 4 23:30:44.653: INFO: azure-ip-masq-agent-hhzdb started at 2019-11-04 23:10:03 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.653: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:30:44.653: INFO: kube-proxy-knwmt started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:44.653: INFO: Container kube-proxy ready: true, restart count 0 W1104 23:30:44.656295 30397 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:30:44.677: INFO: Latency metrics for node k8s-master-11489250-0 Nov 4 23:30:44.677: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready �[1mSTEP�[0m: Destroying namespace "provisioning-5576" for this suite.
Filter through log files
go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sIn\-tree\sVolumes\s\[Driver\:\slocal\]\[LocalVolumeType\:\sblock\]\s\[Testpattern\:\sPre\-provisioned\sPV\s\(block\svolmode\)\]\svolumeMode\sshould\sfail\sto\suse\sa\svolume\sin\sa\spod\swith\smismatched\smode\s\[Slow\]$'
test/e2e/storage/testsuites/volumemode.go:287 Nov 4 23:29:49.611: Unexpected error: <*errors.errorString | 0xc0000a10a0>: { s: "timed out waiting for the condition", } timed out waiting for the condition occurred test/e2e/storage/utils/host_exec.go:104from junit_22.xml
[BeforeEach] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode test/e2e/storage/testsuites/base.go:99 [BeforeEach] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode test/e2e/framework/framework.go:147 �[1mSTEP�[0m: Creating a kubernetes client Nov 4 23:24:49.416: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Building a namespace api object, basename volumemode �[1mSTEP�[0m: Binding the e2e-test-privileged-psp PodSecurityPolicy to the default service account in volumemode-5448 �[1mSTEP�[0m: Waiting for a default service account to be provisioned in namespace [It] should fail to use a volume in a pod with mismatched mode [Slow] test/e2e/storage/testsuites/volumemode.go:287 Nov 4 23:24:49.586: INFO: Could not find CSI Name for in-tree plugin kubernetes.io/local-volume �[1mSTEP�[0m: Creating block device on node "k8s-agentpool1-11489250-vmss000000" using path "/tmp/local-driver-6ad0e848-8669-4c51-8dd2-49754fcd1443" Nov 4 23:29:49.611: FAIL: Unexpected error: <*errors.errorString | 0xc0000a10a0>: { s: "timed out waiting for the condition", } timed out waiting for the condition occurred [AfterEach] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode test/e2e/framework/framework.go:148 �[1mSTEP�[0m: Collecting events from namespace "volumemode-5448". �[1mSTEP�[0m: Found 1 events. Nov 4 23:29:49.614: INFO: At 2019-11-04 23:24:57 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-94ngc: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "gcr.io/kubernetes-e2e-test-images/agnhost:2.6" Nov 4 23:29:49.616: INFO: POD NODE PHASE GRACE CONDITIONS Nov 4 23:29:49.616: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-94ngc k8s-agentpool1-11489250-vmss000000 Pending [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:49 +0000 UTC } {Ready False 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:49 +0000 UTC ContainersNotReady containers with unready status: [agnhost]} {ContainersReady False 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:49 +0000 UTC ContainersNotReady containers with unready status: [agnhost]} {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:49 +0000 UTC }] Nov 4 23:29:49.616: INFO: Nov 4 23:29:49.619: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:49.621: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000000 /api/v1/nodes/k8s-agentpool1-11489250-vmss000000 4d779b63-b743-40ed-9ec9-08ee7dd28ab4 26525 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000000 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000000] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-1271":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-multivolume-5778":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3215":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3527":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-4405":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-7631":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-multivolume-2637":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-2219":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-4772":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-7421":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-volumemode-5039":"k8s-agentpool1-11489250-vmss000000","csi-mock-csi-mock-volumes-5459":"csi-mock-csi-mock-volumes-5459"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.2.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/0,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.2.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.4,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000000,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5eb5b251426b48e38a0513ab8a4e5fc0,SystemUUID:CB87A4F7-2661-444E-8AB3-C1A284BA9714,BootID:42192202-1583-496a-b5ff-b9c6d63be18f,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[k8s.gcr.io/kubernetes-dashboard-amd64@sha256:0ae6b69432e78069c5ce2bcde0fe409c5c4d6f0f4d9cd50a17974fea38898747 k8s.gcr.io/kubernetes-dashboard-amd64:v1.10.1],SizeBytes:121711221,},ContainerImage{Names:[gcr.io/kubernetes-helm/tiller@sha256:f6d8f4ab9ba993b5f5b60a6edafe86352eabe474ffeb84cb6c79b8866dce45d1 gcr.io/kubernetes-helm/tiller:v2.11.0],SizeBytes:71821984,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:0efcb424f1dde9b9fb11a1a14f2e48ab47e1c3f08bc3a929990dcfcb1f7ab34f quay.io/k8scsi/csi-provisioner:v1.4.0-rc1],SizeBytes:54431016,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:0aba670b4d9d6b2e720bbf575d733156c676b693ca26501235444490300db838 quay.io/k8scsi/csi-attacher:v1.1.0],SizeBytes:42839085,},ContainerImage{Names:[k8s.gcr.io/coredns@sha256:e83beb5e43f8513fa735e77ffc5859640baea30a882a11cc75c4c3244a737d3c k8s.gcr.io/coredns:1.5.0],SizeBytes:42488424,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[quay.io/k8scsi/mock-driver@sha256:e0eed916b7d970bad2b7d9875f9ad16932f987f0f3d91ec5d86da68b0b5cc9d1 quay.io/k8scsi/mock-driver:v2.1.0],SizeBytes:16226335,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:13daf82fb99e951a4bff8ae5fc7c17c3a8fe7130be6400990d8f6076c32d4599 quay.io/k8scsi/csi-node-driver-registrar:v1.1.0],SizeBytes:15815995,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/google-containers/startup-script@sha256:be96df6845a2af0eb61b17817ed085ce41048e4044c541da7580570b61beff3e gcr.io/google-containers/startup-script:v1],SizeBytes:12528443,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause@sha256:f78411e19d84a252e53bff71a4407a5686c46983a2c2eeed83929b888179acea k8s.gcr.io/pause-amd64:3.1 k8s.gcr.io/pause:3.1],SizeBytes:742472,},},VolumesInUse:[kubernetes.io/csi/csi-hostpath-multivolume-1271^1f0de69b-ff5a-11e9-a283-9eaad548a827 kubernetes.io/csi/csi-hostpath-multivolume-1271^205df607-ff5a-11e9-a283-9eaad548a827],VolumesAttached:[]AttachedVolume{AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-1271^1f0de69b-ff5a-11e9-a283-9eaad548a827,DevicePath:,},AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-1271^205df607-ff5a-11e9-a283-9eaad548a827,DevicePath:,},},Config:nil,},} Nov 4 23:29:49.621: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:49.626: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:49.640: INFO: blobfuse-flexvol-installer-8shkx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:29:49.640: INFO: csi-snapshotter-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container csi-snapshotter ready: true, restart count 0 Nov 4 23:29:49.640: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-94ngc started at 2019-11-04 23:24:49 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:49.640: INFO: keyvault-flexvolume-xzbqt started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:29:49.640: INFO: csi-hostpathplugin-0 started at 2019-11-04 23:23:00 +0000 UTC (0+3 container statuses recorded) Nov 4 23:29:49.640: INFO: Container hostpath ready: true, restart count 0 Nov 4 23:29:49.640: INFO: Container liveness-probe ready: true, restart count 0 Nov 4 23:29:49.640: INFO: Container node-driver-registrar ready: true, restart count 0 Nov 4 23:29:49.640: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-jv6k6 started at 2019-11-04 23:23:55 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:29:49.640: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-gk47b started at 2019-11-04 23:24:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:49.640: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-cvktv started at 2019-11-04 23:24:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:49.640: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-m9tnz started at 2019-11-04 23:26:17 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:49.640: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:26:41 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container csi-attacher ready: false, restart count 0 Nov 4 23:29:49.640: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-rt52w started at 2019-11-04 23:26:46 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:49.640: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-flccr started at 2019-11-04 23:29:15 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:49.640: INFO: hostpath-symlink-prep-provisioning-4995 started at 2019-11-04 23:24:58 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container init-volume-provisioning-4995 ready: false, restart count 0 Nov 4 23:29:49.640: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container csi-provisioner ready: true, restart count 0 Nov 4 23:29:49.640: INFO: csi-hostpathplugin-p7nrj started at 2019-11-04 23:26:42 +0000 UTC (0+2 container statuses recorded) Nov 4 23:29:49.640: INFO: Container driver-registrar ready: false, restart count 0 Nov 4 23:29:49.640: INFO: Container hostpath ready: false, restart count 0 Nov 4 23:29:49.640: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-8wk7z started at 2019-11-04 23:29:22 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:49.640: INFO: azure-ip-masq-agent-nk6ts started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:29:49.640: INFO: coredns-87f5d796-n67d4 started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container coredns ready: true, restart count 0 Nov 4 23:29:49.640: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-x7m4h started at 2019-11-04 23:26:28 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:49.640: INFO: security-context-7fbb72ad-72e5-4ac2-a31f-3b581f1df154 started at 2019-11-04 23:24:46 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:29:49.640: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-f7sh6 started at 2019-11-04 23:26:35 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:49.640: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:23:00 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container csi-attacher ready: true, restart count 0 Nov 4 23:29:49.640: INFO: csi-hostpath-resizer-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container csi-resizer ready: true, restart count 0 Nov 4 23:29:49.640: INFO: kube-proxy-4q46s started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:29:49.640: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-84tg5 started at 2019-11-04 23:29:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:49.640: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:26:43 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container csi-provisioner ready: false, restart count 0 Nov 4 23:29:49.640: INFO: tiller-deploy-7559b6b885-5lm2k started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container tiller ready: true, restart count 0 Nov 4 23:29:49.640: INFO: pod-subpath-test-hostpathsymlink-kmsd started at 2019-11-04 23:23:19 +0000 UTC (1+2 container statuses recorded) Nov 4 23:29:49.640: INFO: Init container init-volume-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:29:49.640: INFO: Container test-container-subpath-hostpathsymlink-kmsd ready: false, restart count 0 Nov 4 23:29:49.640: INFO: Container test-container-volume-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:29:49.640: INFO: security-context-32e5a9df-35d4-4d74-9394-deba9a253642 started at 2019-11-04 23:25:05 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:29:49.640: INFO: kubernetes-dashboard-65966766b9-lvtsz started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container kubernetes-dashboard ready: true, restart count 0 Nov 4 23:29:49.640: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-tpwjh started at 2019-11-04 23:29:45 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.640: INFO: Container agnhost ready: false, restart count 0 W1104 23:29:49.643715 30419 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:29:49.690: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:49.690: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:49.693: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000001 /api/v1/nodes/k8s-agentpool1-11489250-vmss000001 2d9f0ab9-c990-46a3-b3bc-7808950553bf 26766 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:1 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000001 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000001] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-3014":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6609":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6697":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-3251":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-4810":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-546":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-6369":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-multivolume-7618":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-2817":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-5016":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-6812":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-855":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumeio-7968":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumemode-6226":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumeio-9022":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumemode-551":"k8s-agentpool1-11489250-vmss000001"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.1.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/1,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.1.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:29:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.5,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000001,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5456dda39b3d435cb066867813114df8,SystemUUID:6D0288FF-6F23-3E4D-916E-D89B5AFE73FD,BootID:eeee8a92-9ca0-4335-88b5-e62705f3f746,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[k8s.gcr.io/metrics-server-amd64@sha256:49a9f12f7067d11f42c803dbe61ed2c1299959ad85cb315b25ff7eef8e6b8892 k8s.gcr.io/metrics-server-amd64:v0.2.1],SizeBytes:42541759,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64@sha256:3b36bd80b97c532a774e7f6246797b8575d97037982f353476c703ba6686c75c gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64:1.0],SizeBytes:19227369,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[nginx@sha256:485b610fefec7ff6c463ced9623314a04ed67e3945b9c08d7e53a47f6d108dc7 nginx:1.14-alpine],SizeBytes:16032814,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:29:49.694: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:49.698: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:49.703: INFO: nfs-server started at 2019-11-04 23:25:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.703: INFO: Container nfs-server ready: true, restart count 0 Nov 4 23:29:49.703: INFO: kube-proxy-gkpm5 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.703: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:29:49.703: INFO: blobfuse-flexvol-installer-kfjfx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.703: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:29:49.703: INFO: keyvault-flexvolume-b7nvg started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.703: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:29:49.703: INFO: metrics-server-58ff8c5ddf-g2hh5 started at 2019-11-04 23:10:24 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.703: INFO: Container metrics-server ready: true, restart count 0 Nov 4 23:29:49.703: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-sdnnm started at 2019-11-04 23:29:35 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.703: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:29:49.704: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-shzhf started at 2019-11-04 23:29:45 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.704: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:49.704: INFO: back-off-cap started at 2019-11-04 23:25:56 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.704: INFO: Container back-off-cap ready: true, restart count 5 Nov 4 23:29:49.704: INFO: azure-ip-masq-agent-tdbp9 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.704: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:29:49.704: INFO: pod-subpath-test-local-preprovisionedpv-ttxd started at 2019-11-04 23:29:44 +0000 UTC (1+2 container statuses recorded) Nov 4 23:29:49.704: INFO: Init container init-volume-local-preprovisionedpv-ttxd ready: false, restart count 0 Nov 4 23:29:49.704: INFO: Container test-container-subpath-local-preprovisionedpv-ttxd ready: false, restart count 0 Nov 4 23:29:49.704: INFO: Container test-container-volume-local-preprovisionedpv-ttxd ready: false, restart count 0 W1104 23:29:49.706831 30419 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:29:49.742: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:49.742: INFO: Logging node info for node k8s-master-11489250-0 Nov 4 23:29:49.745: INFO: Node Info: &Node{ObjectMeta:{k8s-master-11489250-0 /api/v1/nodes/k8s-master-11489250-0 c7e8559d-81e4-4401-b9ca-034b4af0cc76 26678 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_DS2_v2 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:0 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:master kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-master-11489250-0 kubernetes.io/os:linux kubernetes.io/role:master node-role.kubernetes.io/master:] map[node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.0.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachines/k8s-master-11489250-0,Unschedulable:false,Taints:[]Taint{Taint{Key:node-role.kubernetes.io/master,Value:true,Effect:NoSchedule,TimeAdded:<nil>,},},ConfigSource:nil,PodCIDRs:[10.244.0.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{7284359168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{6497927168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:29:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.255.5,},NodeAddress{Type:Hostname,Address:k8s-master-11489250-0,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:4b2e1465590843f69a05114d1f1735bd,SystemUUID:885E2CBD-DE7B-DE41-AC15-18FB50C2BFBA,BootID:1ddb5423-95a4-4f58-9386-79ef6bca0f71,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[k8sprowinternal.azurecr.io/azure-cloud-controller-manager@sha256:823d2ccf43dfd34db70b91241aa07ab6579db11ffe31cc07fd0fdd752388497c k8sprowinternal.azurecr.io/azure-cloud-controller-manager:1191484695150333952-3d6cd6ff],SizeBytes:92595467,},ContainerImage{Names:[k8s.gcr.io/kube-addon-manager-amd64@sha256:382c220b3531d9f95bf316a16b7282cc2ef929cd8a89a9dd3f5933edafc41a8e k8s.gcr.io/kube-addon-manager-amd64:v9.0.1],SizeBytes:83076194,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:29:49.745: INFO: Logging kubelet events for node k8s-master-11489250-0 Nov 4 23:29:49.750: INFO: Logging pods the kubelet thinks is on node k8s-master-11489250-0 Nov 4 23:29:49.754: INFO: kube-proxy-knwmt started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.754: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:29:49.754: INFO: cloud-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.754: INFO: Container cloud-controller-manager ready: true, restart count 0 Nov 4 23:29:49.754: INFO: kube-addon-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.754: INFO: Container kube-addon-manager ready: true, restart count 0 Nov 4 23:29:49.754: INFO: kube-apiserver-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.754: INFO: Container kube-apiserver ready: true, restart count 0 Nov 4 23:29:49.754: INFO: kube-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.754: INFO: Container kube-controller-manager ready: true, restart count 0 Nov 4 23:29:49.754: INFO: kube-scheduler-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.754: INFO: Container kube-scheduler ready: true, restart count 0 Nov 4 23:29:49.754: INFO: azure-ip-masq-agent-hhzdb started at 2019-11-04 23:10:03 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:49.754: INFO: Container azure-ip-masq-agent ready: true, restart count 0 W1104 23:29:49.756773 30419 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:29:49.777: INFO: Latency metrics for node k8s-master-11489250-0 Nov 4 23:29:49.777: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready �[1mSTEP�[0m: Destroying namespace "volumemode-5448" for this suite.
Filter through log files
go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sIn\-tree\sVolumes\s\[Driver\:\slocal\]\[LocalVolumeType\:\sblock\]\s\[Testpattern\:\sPre\-provisioned\sPV\s\(default\sfs\)\]\ssubPath\sshould\sverify\scontainer\scannot\swrite\sto\ssubpath\sreadonly\svolumes\s\[Slow\]$'
test/e2e/storage/testsuites/subpath.go:417 Nov 4 23:29:17.248: while waiting for subpath failure Unexpected error: <*errors.errorString | 0xc0000a10a0>: { s: "timed out waiting for the condition", } timed out waiting for the condition occurred test/e2e/storage/testsuites/subpath.go:740from junit_16.xml
[BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath test/e2e/storage/testsuites/base.go:99 [BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath test/e2e/framework/framework.go:147 �[1mSTEP�[0m: Creating a kubernetes client Nov 4 23:22:59.368: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Building a namespace api object, basename provisioning �[1mSTEP�[0m: Binding the e2e-test-privileged-psp PodSecurityPolicy to the default service account in provisioning-7604 �[1mSTEP�[0m: Waiting for a default service account to be provisioned in namespace [It] should verify container cannot write to subpath readonly volumes [Slow] test/e2e/storage/testsuites/subpath.go:417 Nov 4 23:22:59.590: INFO: Could not find CSI Name for in-tree plugin kubernetes.io/local-volume �[1mSTEP�[0m: Creating block device on node "k8s-agentpool1-11489250-vmss000000" using path "/tmp/local-driver-f7414e47-731e-4a53-bfc5-cc37b68fa087" Nov 4 23:23:21.616: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c mkdir -p /tmp/local-driver-f7414e47-731e-4a53-bfc5-cc37b68fa087 && dd if=/dev/zero of=/tmp/local-driver-f7414e47-731e-4a53-bfc5-cc37b68fa087/file bs=4096 count=5120 && losetup -f /tmp/local-driver-f7414e47-731e-4a53-bfc5-cc37b68fa087/file] Namespace:provisioning-7604 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-4mznt ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:23:21.616: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json Nov 4 23:23:24.132: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c E2E_LOOP_DEV=$(losetup | grep /tmp/local-driver-f7414e47-731e-4a53-bfc5-cc37b68fa087/file | awk '{ print $1 }') 2>&1 > /dev/null && echo ${E2E_LOOP_DEV}] Namespace:provisioning-7604 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-4mznt ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:23:24.132: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json Nov 4 23:23:25.083: INFO: Creating resource for pre-provisioned PV Nov 4 23:23:25.083: INFO: Creating PVC and PV �[1mSTEP�[0m: Creating a PVC followed by a PV Nov 4 23:23:25.100: INFO: Waiting for PV local-8kkzv to bind to PVC pvc-cfbx7 Nov 4 23:23:25.100: INFO: Waiting up to 3m0s for PersistentVolumeClaims [pvc-cfbx7] to have phase Bound Nov 4 23:23:25.103: INFO: PersistentVolumeClaim pvc-cfbx7 found but phase is Pending instead of Bound. Nov 4 23:23:27.105: INFO: PersistentVolumeClaim pvc-cfbx7 found but phase is Pending instead of Bound. Nov 4 23:23:29.108: INFO: PersistentVolumeClaim pvc-cfbx7 found but phase is Pending instead of Bound. Nov 4 23:23:31.111: INFO: PersistentVolumeClaim pvc-cfbx7 found and phase=Bound (6.011263485s) Nov 4 23:23:31.111: INFO: Waiting up to 3m0s for PersistentVolume local-8kkzv to have phase Bound Nov 4 23:23:31.114: INFO: PersistentVolume local-8kkzv found and phase=Bound (2.955424ms) �[1mSTEP�[0m: Creating pod to format volume volume-prep-provisioning-7604 Nov 4 23:23:31.126: INFO: Waiting up to 5m0s for pod "volume-prep-provisioning-7604" in namespace "provisioning-7604" to be "success or failure" Nov 4 23:23:31.131: INFO: Pod "volume-prep-provisioning-7604": Phase="Pending", Reason="", readiness=false. Elapsed: 4.725538ms Nov 4 23:23:33.134: INFO: Pod "volume-prep-provisioning-7604": Phase="Pending", Reason="", readiness=false. Elapsed: 2.007430686s Nov 4 23:23:35.137: INFO: Pod "volume-prep-provisioning-7604": Phase="Pending", Reason="", readiness=false. Elapsed: 4.010136431s Nov 4 23:23:37.140: INFO: Pod "volume-prep-provisioning-7604": Phase="Pending", Reason="", readiness=false. Elapsed: 6.013485878s Nov 4 23:23:39.143: INFO: Pod "volume-prep-provisioning-7604": Phase="Pending", Reason="", readiness=false. Elapsed: 8.01648452s Nov 4 23:23:41.160: INFO: Pod "volume-prep-provisioning-7604": Phase="Pending", Reason="", readiness=false. Elapsed: 10.033585372s Nov 4 23:23:43.163: INFO: Pod "volume-prep-provisioning-7604": Phase="Pending", Reason="", readiness=false. Elapsed: 12.036378207s Nov 4 23:23:45.165: INFO: Pod "volume-prep-provisioning-7604": Phase="Pending", Reason="", readiness=false. Elapsed: 14.038964638s Nov 4 23:23:47.169: INFO: Pod "volume-prep-provisioning-7604": Phase="Pending", Reason="", readiness=false. Elapsed: 16.042535274s Nov 4 23:23:49.172: INFO: Pod "volume-prep-provisioning-7604": Phase="Pending", Reason="", readiness=false. Elapsed: 18.045656904s Nov 4 23:23:51.175: INFO: Pod "volume-prep-provisioning-7604": Phase="Pending", Reason="", readiness=false. Elapsed: 20.048843532s Nov 4 23:23:53.178: INFO: Pod "volume-prep-provisioning-7604": Phase="Pending", Reason="", readiness=false. Elapsed: 22.051909056s Nov 4 23:23:55.181: INFO: Pod "volume-prep-provisioning-7604": Phase="Pending", Reason="", readiness=false. Elapsed: 24.054660375s Nov 4 23:23:57.184: INFO: Pod "volume-prep-provisioning-7604": Phase="Pending", Reason="", readiness=false. Elapsed: 26.057504692s Nov 4 23:23:59.187: INFO: Pod "volume-prep-provisioning-7604": Phase="Pending", Reason="", readiness=false. Elapsed: 28.060195906s Nov 4 23:24:01.189: INFO: Pod "volume-prep-provisioning-7604": Phase="Pending", Reason="", readiness=false. Elapsed: 30.062782416s Nov 4 23:24:03.192: INFO: Pod "volume-prep-provisioning-7604": Phase="Pending", Reason="", readiness=false. Elapsed: 32.065863927s Nov 4 23:24:05.196: INFO: Pod "volume-prep-provisioning-7604": Phase="Pending", Reason="", readiness=false. Elapsed: 34.069211938s Nov 4 23:24:07.198: INFO: Pod "volume-prep-provisioning-7604": Phase="Pending", Reason="", readiness=false. Elapsed: 36.072016542s Nov 4 23:24:09.203: INFO: Pod "volume-prep-provisioning-7604": Phase="Pending", Reason="", readiness=false. Elapsed: 38.07674336s Nov 4 23:24:11.208: INFO: Pod "volume-prep-provisioning-7604": Phase="Pending", Reason="", readiness=false. Elapsed: 40.081226672s Nov 4 23:24:13.210: INFO: Pod "volume-prep-provisioning-7604": Phase="Pending", Reason="", readiness=false. Elapsed: 42.083961368s Nov 4 23:24:15.214: INFO: Pod "volume-prep-provisioning-7604": Phase="Pending", Reason="", readiness=false. Elapsed: 44.087371167s Nov 4 23:24:17.217: INFO: Pod "volume-prep-provisioning-7604": Phase="Succeeded", Reason="", readiness=false. Elapsed: 46.090610863s �[1mSTEP�[0m: Saw pod success Nov 4 23:24:17.217: INFO: Pod "volume-prep-provisioning-7604" satisfied condition "success or failure" Nov 4 23:24:17.217: INFO: Deleting pod "volume-prep-provisioning-7604" in namespace "provisioning-7604" Nov 4 23:24:17.225: INFO: Wait up to 5m0s for pod "volume-prep-provisioning-7604" to be fully deleted �[1mSTEP�[0m: Creating pod pod-subpath-test-local-preprovisionedpv-6jbf �[1mSTEP�[0m: Checking for subpath error in container status Nov 4 23:29:17.248: FAIL: while waiting for subpath failure Unexpected error: <*errors.errorString | 0xc0000a10a0>: { s: "timed out waiting for the condition", } timed out waiting for the condition occurred Nov 4 23:29:17.248: INFO: Deleting pod "pod-subpath-test-local-preprovisionedpv-6jbf" in namespace "provisioning-7604" Nov 4 23:29:17.253: INFO: Wait up to 5m0s for pod "pod-subpath-test-local-preprovisionedpv-6jbf" to be fully deleted �[1mSTEP�[0m: Deleting pod Nov 4 23:29:21.267: INFO: Deleting pod "pod-subpath-test-local-preprovisionedpv-6jbf" in namespace "provisioning-7604" �[1mSTEP�[0m: Deleting pv and pvc Nov 4 23:29:21.269: INFO: Deleting PersistentVolumeClaim "pvc-cfbx7" Nov 4 23:29:21.272: INFO: Deleting PersistentVolume "local-8kkzv" Nov 4 23:29:21.277: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c E2E_LOOP_DEV=$(losetup | grep /tmp/local-driver-f7414e47-731e-4a53-bfc5-cc37b68fa087/file | awk '{ print $1 }') 2>&1 > /dev/null && echo ${E2E_LOOP_DEV}] Namespace:provisioning-7604 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-4mznt ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:29:21.277: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Tear down block device "/dev/loop2" on node "k8s-agentpool1-11489250-vmss000000" at path /tmp/local-driver-f7414e47-731e-4a53-bfc5-cc37b68fa087/file Nov 4 23:29:21.536: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c losetup -d /dev/loop2] Namespace:provisioning-7604 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-4mznt ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:29:21.536: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Removing the test directory /tmp/local-driver-f7414e47-731e-4a53-bfc5-cc37b68fa087 Nov 4 23:29:21.777: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c rm -r /tmp/local-driver-f7414e47-731e-4a53-bfc5-cc37b68fa087] Namespace:provisioning-7604 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-4mznt ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:29:21.777: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Deleting pod hostexec-k8s-agentpool1-11489250-vmss000000-4mznt in namespace provisioning-7604 Nov 4 23:29:22.009: INFO: In-tree plugin kubernetes.io/local-volume is not migrated, not validating any metrics [AfterEach] [Testpattern: Pre-provisioned PV (default fs)] subPath test/e2e/framework/framework.go:148 �[1mSTEP�[0m: Collecting events from namespace "provisioning-7604". �[1mSTEP�[0m: Found 10 events. Nov 4 23:29:22.012: INFO: At 2019-11-04 23:23:02 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-4mznt: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "gcr.io/kubernetes-e2e-test-images/agnhost:2.6" Nov 4 23:29:22.012: INFO: At 2019-11-04 23:23:09 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-4mznt: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "gcr.io/kubernetes-e2e-test-images/agnhost:2.6" Nov 4 23:29:22.012: INFO: At 2019-11-04 23:23:10 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-4mznt: {kubelet k8s-agentpool1-11489250-vmss000000} Created: Created container agnhost Nov 4 23:29:22.012: INFO: At 2019-11-04 23:23:10 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-4mznt: {kubelet k8s-agentpool1-11489250-vmss000000} Started: Started container agnhost Nov 4 23:29:22.012: INFO: At 2019-11-04 23:23:25 +0000 UTC - event for pvc-cfbx7: {persistentvolume-controller } ProvisioningFailed: storageclass.storage.k8s.io "provisioning-7604" not found Nov 4 23:29:22.012: INFO: At 2019-11-04 23:23:55 +0000 UTC - event for volume-prep-provisioning-7604: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "docker.io/library/busybox:1.29" Nov 4 23:29:22.012: INFO: At 2019-11-04 23:23:56 +0000 UTC - event for volume-prep-provisioning-7604: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "docker.io/library/busybox:1.29" Nov 4 23:29:22.012: INFO: At 2019-11-04 23:24:03 +0000 UTC - event for volume-prep-provisioning-7604: {kubelet k8s-agentpool1-11489250-vmss000000} Created: Created container init-volume-provisioning-7604 Nov 4 23:29:22.012: INFO: At 2019-11-04 23:24:08 +0000 UTC - event for volume-prep-provisioning-7604: {kubelet k8s-agentpool1-11489250-vmss000000} Started: Started container init-volume-provisioning-7604 Nov 4 23:29:22.012: INFO: At 2019-11-04 23:24:42 +0000 UTC - event for pod-subpath-test-local-preprovisionedpv-6jbf: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "gcr.io/kubernetes-e2e-test-images/mounttest:1.0" Nov 4 23:29:22.016: INFO: POD NODE PHASE GRACE CONDITIONS Nov 4 23:29:22.016: INFO: Nov 4 23:29:22.021: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:22.024: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000000 /api/v1/nodes/k8s-agentpool1-11489250-vmss000000 4d779b63-b743-40ed-9ec9-08ee7dd28ab4 26525 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000000 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000000] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-1271":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-multivolume-5778":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3215":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3527":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-4405":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-7631":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-multivolume-2637":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-2219":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-4772":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-7421":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-volumemode-5039":"k8s-agentpool1-11489250-vmss000000","csi-mock-csi-mock-volumes-5459":"csi-mock-csi-mock-volumes-5459"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.2.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/0,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.2.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.4,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000000,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5eb5b251426b48e38a0513ab8a4e5fc0,SystemUUID:CB87A4F7-2661-444E-8AB3-C1A284BA9714,BootID:42192202-1583-496a-b5ff-b9c6d63be18f,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[k8s.gcr.io/kubernetes-dashboard-amd64@sha256:0ae6b69432e78069c5ce2bcde0fe409c5c4d6f0f4d9cd50a17974fea38898747 k8s.gcr.io/kubernetes-dashboard-amd64:v1.10.1],SizeBytes:121711221,},ContainerImage{Names:[gcr.io/kubernetes-helm/tiller@sha256:f6d8f4ab9ba993b5f5b60a6edafe86352eabe474ffeb84cb6c79b8866dce45d1 gcr.io/kubernetes-helm/tiller:v2.11.0],SizeBytes:71821984,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:0efcb424f1dde9b9fb11a1a14f2e48ab47e1c3f08bc3a929990dcfcb1f7ab34f quay.io/k8scsi/csi-provisioner:v1.4.0-rc1],SizeBytes:54431016,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:0aba670b4d9d6b2e720bbf575d733156c676b693ca26501235444490300db838 quay.io/k8scsi/csi-attacher:v1.1.0],SizeBytes:42839085,},ContainerImage{Names:[k8s.gcr.io/coredns@sha256:e83beb5e43f8513fa735e77ffc5859640baea30a882a11cc75c4c3244a737d3c k8s.gcr.io/coredns:1.5.0],SizeBytes:42488424,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[quay.io/k8scsi/mock-driver@sha256:e0eed916b7d970bad2b7d9875f9ad16932f987f0f3d91ec5d86da68b0b5cc9d1 quay.io/k8scsi/mock-driver:v2.1.0],SizeBytes:16226335,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:13daf82fb99e951a4bff8ae5fc7c17c3a8fe7130be6400990d8f6076c32d4599 quay.io/k8scsi/csi-node-driver-registrar:v1.1.0],SizeBytes:15815995,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/google-containers/startup-script@sha256:be96df6845a2af0eb61b17817ed085ce41048e4044c541da7580570b61beff3e gcr.io/google-containers/startup-script:v1],SizeBytes:12528443,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause@sha256:f78411e19d84a252e53bff71a4407a5686c46983a2c2eeed83929b888179acea k8s.gcr.io/pause-amd64:3.1 k8s.gcr.io/pause:3.1],SizeBytes:742472,},},VolumesInUse:[kubernetes.io/csi/csi-hostpath-multivolume-1271^1f0de69b-ff5a-11e9-a283-9eaad548a827 kubernetes.io/csi/csi-hostpath-multivolume-1271^205df607-ff5a-11e9-a283-9eaad548a827],VolumesAttached:[]AttachedVolume{AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-1271^1f0de69b-ff5a-11e9-a283-9eaad548a827,DevicePath:,},AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-1271^205df607-ff5a-11e9-a283-9eaad548a827,DevicePath:,},},Config:nil,},} Nov 4 23:29:22.024: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:22.029: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:22.044: INFO: kubernetes-dashboard-65966766b9-lvtsz started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container kubernetes-dashboard ready: true, restart count 0 Nov 4 23:29:22.044: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-8rwpq started at 2019-11-04 23:23:34 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:29:22.044: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-94ngc started at 2019-11-04 23:24:49 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:22.044: INFO: blobfuse-flexvol-installer-8shkx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:29:22.044: INFO: csi-snapshotter-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container csi-snapshotter ready: true, restart count 0 Nov 4 23:29:22.044: INFO: keyvault-flexvolume-xzbqt started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:29:22.044: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-jv6k6 started at 2019-11-04 23:23:55 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:29:22.044: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-gk47b started at 2019-11-04 23:24:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:22.044: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-cvktv started at 2019-11-04 23:24:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:22.044: INFO: csi-hostpathplugin-0 started at 2019-11-04 23:23:00 +0000 UTC (0+3 container statuses recorded) Nov 4 23:29:22.044: INFO: Container hostpath ready: true, restart count 0 Nov 4 23:29:22.044: INFO: Container liveness-probe ready: true, restart count 0 Nov 4 23:29:22.044: INFO: Container node-driver-registrar ready: true, restart count 0 Nov 4 23:29:22.044: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-flccr started at 2019-11-04 23:29:15 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:22.044: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-m9tnz started at 2019-11-04 23:26:17 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:22.044: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:26:41 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container csi-attacher ready: false, restart count 0 Nov 4 23:29:22.044: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-rt52w started at 2019-11-04 23:26:46 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:22.044: INFO: hostpath-symlink-prep-provisioning-4995 started at 2019-11-04 23:24:58 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container init-volume-provisioning-4995 ready: false, restart count 0 Nov 4 23:29:22.044: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container csi-provisioner ready: true, restart count 0 Nov 4 23:29:22.044: INFO: csi-hostpathplugin-p7nrj started at 2019-11-04 23:26:42 +0000 UTC (0+2 container statuses recorded) Nov 4 23:29:22.044: INFO: Container driver-registrar ready: false, restart count 0 Nov 4 23:29:22.044: INFO: Container hostpath ready: false, restart count 0 Nov 4 23:29:22.044: INFO: azure-ip-masq-agent-nk6ts started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:29:22.044: INFO: coredns-87f5d796-n67d4 started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container coredns ready: true, restart count 0 Nov 4 23:29:22.044: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-x7m4h started at 2019-11-04 23:26:28 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:22.044: INFO: csi-hostpath-resizer-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container csi-resizer ready: true, restart count 0 Nov 4 23:29:22.044: INFO: security-context-7fbb72ad-72e5-4ac2-a31f-3b581f1df154 started at 2019-11-04 23:24:46 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:29:22.044: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-f7sh6 started at 2019-11-04 23:26:35 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:22.044: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:23:00 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container csi-attacher ready: true, restart count 0 Nov 4 23:29:22.044: INFO: kube-proxy-4q46s started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:29:22.044: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:26:43 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container csi-provisioner ready: false, restart count 0 Nov 4 23:29:22.044: INFO: security-context-32e5a9df-35d4-4d74-9394-deba9a253642 started at 2019-11-04 23:25:05 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:29:22.044: INFO: pod-subpath-test-local-preprovisionedpv-pbjf started at 2019-11-04 23:24:33 +0000 UTC (1+2 container statuses recorded) Nov 4 23:29:22.044: INFO: Init container init-volume-local-preprovisionedpv-pbjf ready: false, restart count 0 Nov 4 23:29:22.044: INFO: Container test-container-subpath-local-preprovisionedpv-pbjf ready: false, restart count 0 Nov 4 23:29:22.044: INFO: Container test-container-volume-local-preprovisionedpv-pbjf ready: false, restart count 0 Nov 4 23:29:22.044: INFO: tiller-deploy-7559b6b885-5lm2k started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.044: INFO: Container tiller ready: true, restart count 0 Nov 4 23:29:22.044: INFO: pod-subpath-test-hostpathsymlink-kmsd started at 2019-11-04 23:23:19 +0000 UTC (1+2 container statuses recorded) Nov 4 23:29:22.044: INFO: Init container init-volume-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:29:22.044: INFO: Container test-container-subpath-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:29:22.044: INFO: Container test-container-volume-hostpathsymlink-kmsd ready: true, restart count 0 W1104 23:29:22.056279 30429 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:29:22.091: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:22.091: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:22.094: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000001 /api/v1/nodes/k8s-agentpool1-11489250-vmss000001 2d9f0ab9-c990-46a3-b3bc-7808950553bf 26413 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:1 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000001 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000001] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-3014":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6609":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6697":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-3251":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-4810":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-546":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-6369":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-multivolume-7618":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-2817":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-5016":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-6812":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-855":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumeio-7968":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumemode-6226":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumeio-9022":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumemode-551":"k8s-agentpool1-11489250-vmss000001"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.1.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/1,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.1.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:28:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.5,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000001,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5456dda39b3d435cb066867813114df8,SystemUUID:6D0288FF-6F23-3E4D-916E-D89B5AFE73FD,BootID:eeee8a92-9ca0-4335-88b5-e62705f3f746,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[k8s.gcr.io/metrics-server-amd64@sha256:49a9f12f7067d11f42c803dbe61ed2c1299959ad85cb315b25ff7eef8e6b8892 k8s.gcr.io/metrics-server-amd64:v0.2.1],SizeBytes:42541759,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64@sha256:3b36bd80b97c532a774e7f6246797b8575d97037982f353476c703ba6686c75c gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64:1.0],SizeBytes:19227369,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[nginx@sha256:485b610fefec7ff6c463ced9623314a04ed67e3945b9c08d7e53a47f6d108dc7 nginx:1.14-alpine],SizeBytes:16032814,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:29:22.094: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:22.099: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:22.105: INFO: kube-proxy-gkpm5 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.105: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:29:22.105: INFO: blobfuse-flexvol-installer-kfjfx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.105: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:29:22.105: INFO: keyvault-flexvolume-b7nvg started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.105: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:29:22.105: INFO: metrics-server-58ff8c5ddf-g2hh5 started at 2019-11-04 23:10:24 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.105: INFO: Container metrics-server ready: true, restart count 0 Nov 4 23:29:22.105: INFO: pod-configmaps-b12ea30b-ab74-4455-95d7-ad4513d9d70b started at 2019-11-04 23:24:24 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.105: INFO: Container createcm-volume-test ready: false, restart count 0 Nov 4 23:29:22.105: INFO: back-off-cap started at 2019-11-04 23:25:56 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.105: INFO: Container back-off-cap ready: false, restart count 4 Nov 4 23:29:22.105: INFO: azure-ip-masq-agent-tdbp9 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.105: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:29:22.105: INFO: nfs-server started at 2019-11-04 23:25:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.105: INFO: Container nfs-server ready: true, restart count 0 W1104 23:29:22.107682 30429 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:29:22.144: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:22.144: INFO: Logging node info for node k8s-master-11489250-0 Nov 4 23:29:22.146: INFO: Node Info: &Node{ObjectMeta:{k8s-master-11489250-0 /api/v1/nodes/k8s-master-11489250-0 c7e8559d-81e4-4401-b9ca-034b4af0cc76 26367 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_DS2_v2 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:0 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:master kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-master-11489250-0 kubernetes.io/os:linux kubernetes.io/role:master node-role.kubernetes.io/master:] map[node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.0.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachines/k8s-master-11489250-0,Unschedulable:false,Taints:[]Taint{Taint{Key:node-role.kubernetes.io/master,Value:true,Effect:NoSchedule,TimeAdded:<nil>,},},ConfigSource:nil,PodCIDRs:[10.244.0.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{7284359168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{6497927168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:28:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.255.5,},NodeAddress{Type:Hostname,Address:k8s-master-11489250-0,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:4b2e1465590843f69a05114d1f1735bd,SystemUUID:885E2CBD-DE7B-DE41-AC15-18FB50C2BFBA,BootID:1ddb5423-95a4-4f58-9386-79ef6bca0f71,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[k8sprowinternal.azurecr.io/azure-cloud-controller-manager@sha256:823d2ccf43dfd34db70b91241aa07ab6579db11ffe31cc07fd0fdd752388497c k8sprowinternal.azurecr.io/azure-cloud-controller-manager:1191484695150333952-3d6cd6ff],SizeBytes:92595467,},ContainerImage{Names:[k8s.gcr.io/kube-addon-manager-amd64@sha256:382c220b3531d9f95bf316a16b7282cc2ef929cd8a89a9dd3f5933edafc41a8e k8s.gcr.io/kube-addon-manager-amd64:v9.0.1],SizeBytes:83076194,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:29:22.146: INFO: Logging kubelet events for node k8s-master-11489250-0 Nov 4 23:29:22.150: INFO: Logging pods the kubelet thinks is on node k8s-master-11489250-0 Nov 4 23:29:22.161: INFO: cloud-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.161: INFO: Container cloud-controller-manager ready: true, restart count 0 Nov 4 23:29:22.161: INFO: kube-addon-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.161: INFO: Container kube-addon-manager ready: true, restart count 0 Nov 4 23:29:22.161: INFO: kube-apiserver-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.161: INFO: Container kube-apiserver ready: true, restart count 0 Nov 4 23:29:22.161: INFO: kube-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.161: INFO: Container kube-controller-manager ready: true, restart count 0 Nov 4 23:29:22.161: INFO: kube-scheduler-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.161: INFO: Container kube-scheduler ready: true, restart count 0 Nov 4 23:29:22.161: INFO: azure-ip-masq-agent-hhzdb started at 2019-11-04 23:10:03 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.161: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:29:22.161: INFO: kube-proxy-knwmt started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:22.161: INFO: Container kube-proxy ready: true, restart count 0 W1104 23:29:22.164087 30429 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:29:22.179: INFO: Latency metrics for node k8s-master-11489250-0 Nov 4 23:29:22.179: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready �[1mSTEP�[0m: Destroying namespace "provisioning-7604" for this suite.
Filter through log files
go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sIn\-tree\sVolumes\s\[Driver\:\slocal\]\[LocalVolumeType\:\sblockfs\]\s\[Testpattern\:\sPre\-provisioned\sPV\s\(default\sfs\)\]\ssubPath\sshould\ssupport\srestarting\scontainers\susing\sfile\sas\ssubpath\s\[Slow\]\[LinuxOnly\]$'
test/e2e/storage/testsuites/subpath.go:330 Nov 4 23:29:44.682: Unexpected error: <*errors.errorString | 0xc0000a10a0>: { s: "timed out waiting for the condition", } timed out waiting for the condition occurred test/e2e/storage/utils/host_exec.go:104from junit_25.xml
[BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath test/e2e/storage/testsuites/base.go:99 [BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath test/e2e/framework/framework.go:147 �[1mSTEP�[0m: Creating a kubernetes client Nov 4 23:24:44.483: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Building a namespace api object, basename provisioning �[1mSTEP�[0m: Binding the e2e-test-privileged-psp PodSecurityPolicy to the default service account in provisioning-227 �[1mSTEP�[0m: Waiting for a default service account to be provisioned in namespace [It] should support restarting containers using file as subpath [Slow][LinuxOnly] test/e2e/storage/testsuites/subpath.go:330 Nov 4 23:24:44.651: INFO: Could not find CSI Name for in-tree plugin kubernetes.io/local-volume �[1mSTEP�[0m: Creating block device on node "k8s-agentpool1-11489250-vmss000000" using path "/tmp/local-driver-0de09e53-3133-4edd-8c89-fb8e0b8dd541" Nov 4 23:29:44.682: FAIL: Unexpected error: <*errors.errorString | 0xc0000a10a0>: { s: "timed out waiting for the condition", } timed out waiting for the condition occurred [AfterEach] [Testpattern: Pre-provisioned PV (default fs)] subPath test/e2e/framework/framework.go:148 �[1mSTEP�[0m: Collecting events from namespace "provisioning-227". �[1mSTEP�[0m: Found 1 events. Nov 4 23:29:44.685: INFO: At 2019-11-04 23:24:49 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-gk47b: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "gcr.io/kubernetes-e2e-test-images/agnhost:2.6" Nov 4 23:29:44.687: INFO: POD NODE PHASE GRACE CONDITIONS Nov 4 23:29:44.687: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-gk47b k8s-agentpool1-11489250-vmss000000 Pending [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:44 +0000 UTC } {Ready False 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:44 +0000 UTC ContainersNotReady containers with unready status: [agnhost]} {ContainersReady False 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:44 +0000 UTC ContainersNotReady containers with unready status: [agnhost]} {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:44 +0000 UTC }] Nov 4 23:29:44.687: INFO: Nov 4 23:29:44.690: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:44.692: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000000 /api/v1/nodes/k8s-agentpool1-11489250-vmss000000 4d779b63-b743-40ed-9ec9-08ee7dd28ab4 26525 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000000 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000000] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-1271":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-multivolume-5778":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3215":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3527":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-4405":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-7631":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-multivolume-2637":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-2219":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-4772":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-7421":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-volumemode-5039":"k8s-agentpool1-11489250-vmss000000","csi-mock-csi-mock-volumes-5459":"csi-mock-csi-mock-volumes-5459"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.2.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/0,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.2.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.4,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000000,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5eb5b251426b48e38a0513ab8a4e5fc0,SystemUUID:CB87A4F7-2661-444E-8AB3-C1A284BA9714,BootID:42192202-1583-496a-b5ff-b9c6d63be18f,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[k8s.gcr.io/kubernetes-dashboard-amd64@sha256:0ae6b69432e78069c5ce2bcde0fe409c5c4d6f0f4d9cd50a17974fea38898747 k8s.gcr.io/kubernetes-dashboard-amd64:v1.10.1],SizeBytes:121711221,},ContainerImage{Names:[gcr.io/kubernetes-helm/tiller@sha256:f6d8f4ab9ba993b5f5b60a6edafe86352eabe474ffeb84cb6c79b8866dce45d1 gcr.io/kubernetes-helm/tiller:v2.11.0],SizeBytes:71821984,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:0efcb424f1dde9b9fb11a1a14f2e48ab47e1c3f08bc3a929990dcfcb1f7ab34f quay.io/k8scsi/csi-provisioner:v1.4.0-rc1],SizeBytes:54431016,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:0aba670b4d9d6b2e720bbf575d733156c676b693ca26501235444490300db838 quay.io/k8scsi/csi-attacher:v1.1.0],SizeBytes:42839085,},ContainerImage{Names:[k8s.gcr.io/coredns@sha256:e83beb5e43f8513fa735e77ffc5859640baea30a882a11cc75c4c3244a737d3c k8s.gcr.io/coredns:1.5.0],SizeBytes:42488424,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[quay.io/k8scsi/mock-driver@sha256:e0eed916b7d970bad2b7d9875f9ad16932f987f0f3d91ec5d86da68b0b5cc9d1 quay.io/k8scsi/mock-driver:v2.1.0],SizeBytes:16226335,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:13daf82fb99e951a4bff8ae5fc7c17c3a8fe7130be6400990d8f6076c32d4599 quay.io/k8scsi/csi-node-driver-registrar:v1.1.0],SizeBytes:15815995,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/google-containers/startup-script@sha256:be96df6845a2af0eb61b17817ed085ce41048e4044c541da7580570b61beff3e gcr.io/google-containers/startup-script:v1],SizeBytes:12528443,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause@sha256:f78411e19d84a252e53bff71a4407a5686c46983a2c2eeed83929b888179acea k8s.gcr.io/pause-amd64:3.1 k8s.gcr.io/pause:3.1],SizeBytes:742472,},},VolumesInUse:[kubernetes.io/csi/csi-hostpath-multivolume-1271^1f0de69b-ff5a-11e9-a283-9eaad548a827 kubernetes.io/csi/csi-hostpath-multivolume-1271^205df607-ff5a-11e9-a283-9eaad548a827],VolumesAttached:[]AttachedVolume{AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-1271^1f0de69b-ff5a-11e9-a283-9eaad548a827,DevicePath:,},AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-1271^205df607-ff5a-11e9-a283-9eaad548a827,DevicePath:,},},Config:nil,},} Nov 4 23:29:44.693: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:44.697: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:44.713: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-94ngc started at 2019-11-04 23:24:49 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:44.713: INFO: blobfuse-flexvol-installer-8shkx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:29:44.713: INFO: csi-snapshotter-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container csi-snapshotter ready: true, restart count 0 Nov 4 23:29:44.713: INFO: keyvault-flexvolume-xzbqt started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:29:44.713: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-jv6k6 started at 2019-11-04 23:23:55 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:29:44.713: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-gk47b started at 2019-11-04 23:24:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:44.713: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-cvktv started at 2019-11-04 23:24:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:44.713: INFO: csi-hostpathplugin-0 started at 2019-11-04 23:23:00 +0000 UTC (0+3 container statuses recorded) Nov 4 23:29:44.713: INFO: Container hostpath ready: true, restart count 0 Nov 4 23:29:44.713: INFO: Container liveness-probe ready: true, restart count 0 Nov 4 23:29:44.713: INFO: Container node-driver-registrar ready: true, restart count 0 Nov 4 23:29:44.713: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-rt52w started at 2019-11-04 23:26:46 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:44.713: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-flccr started at 2019-11-04 23:29:15 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:44.713: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-m9tnz started at 2019-11-04 23:26:17 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:44.713: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:26:41 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container csi-attacher ready: false, restart count 0 Nov 4 23:29:44.713: INFO: csi-hostpathplugin-p7nrj started at 2019-11-04 23:26:42 +0000 UTC (0+2 container statuses recorded) Nov 4 23:29:44.713: INFO: Container driver-registrar ready: false, restart count 0 Nov 4 23:29:44.713: INFO: Container hostpath ready: false, restart count 0 Nov 4 23:29:44.713: INFO: hostpath-symlink-prep-provisioning-4995 started at 2019-11-04 23:24:58 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container init-volume-provisioning-4995 ready: false, restart count 0 Nov 4 23:29:44.713: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container csi-provisioner ready: true, restart count 0 Nov 4 23:29:44.713: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-8wk7z started at 2019-11-04 23:29:22 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:44.713: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-x7m4h started at 2019-11-04 23:26:28 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:44.713: INFO: azure-ip-masq-agent-nk6ts started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:29:44.713: INFO: coredns-87f5d796-n67d4 started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container coredns ready: true, restart count 0 Nov 4 23:29:44.713: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:23:00 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container csi-attacher ready: true, restart count 0 Nov 4 23:29:44.713: INFO: csi-hostpath-resizer-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container csi-resizer ready: true, restart count 0 Nov 4 23:29:44.713: INFO: security-context-7fbb72ad-72e5-4ac2-a31f-3b581f1df154 started at 2019-11-04 23:24:46 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:29:44.713: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-f7sh6 started at 2019-11-04 23:26:35 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:44.713: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:26:43 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container csi-provisioner ready: false, restart count 0 Nov 4 23:29:44.713: INFO: kube-proxy-4q46s started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:29:44.713: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-84tg5 started at 2019-11-04 23:29:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:44.713: INFO: pod-subpath-test-hostpathsymlink-kmsd started at 2019-11-04 23:23:19 +0000 UTC (1+2 container statuses recorded) Nov 4 23:29:44.713: INFO: Init container init-volume-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:29:44.713: INFO: Container test-container-subpath-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:29:44.713: INFO: Container test-container-volume-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:29:44.713: INFO: security-context-32e5a9df-35d4-4d74-9394-deba9a253642 started at 2019-11-04 23:25:05 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:29:44.713: INFO: tiller-deploy-7559b6b885-5lm2k started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container tiller ready: true, restart count 0 Nov 4 23:29:44.713: INFO: kubernetes-dashboard-65966766b9-lvtsz started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.713: INFO: Container kubernetes-dashboard ready: true, restart count 0 W1104 23:29:44.720787 30399 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:29:44.755: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:44.755: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:44.757: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000001 /api/v1/nodes/k8s-agentpool1-11489250-vmss000001 2d9f0ab9-c990-46a3-b3bc-7808950553bf 26413 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:1 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000001 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000001] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-3014":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6609":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6697":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-3251":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-4810":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-546":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-6369":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-multivolume-7618":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-2817":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-5016":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-6812":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-855":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumeio-7968":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumemode-6226":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumeio-9022":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumemode-551":"k8s-agentpool1-11489250-vmss000001"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.1.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/1,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.1.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:28:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.5,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000001,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5456dda39b3d435cb066867813114df8,SystemUUID:6D0288FF-6F23-3E4D-916E-D89B5AFE73FD,BootID:eeee8a92-9ca0-4335-88b5-e62705f3f746,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[k8s.gcr.io/metrics-server-amd64@sha256:49a9f12f7067d11f42c803dbe61ed2c1299959ad85cb315b25ff7eef8e6b8892 k8s.gcr.io/metrics-server-amd64:v0.2.1],SizeBytes:42541759,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64@sha256:3b36bd80b97c532a774e7f6246797b8575d97037982f353476c703ba6686c75c gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64:1.0],SizeBytes:19227369,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[nginx@sha256:485b610fefec7ff6c463ced9623314a04ed67e3945b9c08d7e53a47f6d108dc7 nginx:1.14-alpine],SizeBytes:16032814,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:29:44.757: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:44.762: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:44.767: INFO: pod-subpath-test-local-preprovisionedpv-ttxd started at 2019-11-04 23:29:44 +0000 UTC (1+2 container statuses recorded) Nov 4 23:29:44.767: INFO: Init container init-volume-local-preprovisionedpv-ttxd ready: false, restart count 0 Nov 4 23:29:44.767: INFO: Container test-container-subpath-local-preprovisionedpv-ttxd ready: false, restart count 0 Nov 4 23:29:44.767: INFO: Container test-container-volume-local-preprovisionedpv-ttxd ready: false, restart count 0 Nov 4 23:29:44.767: INFO: nfs-server started at 2019-11-04 23:25:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.767: INFO: Container nfs-server ready: true, restart count 0 Nov 4 23:29:44.767: INFO: kube-proxy-gkpm5 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.767: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:29:44.767: INFO: blobfuse-flexvol-installer-kfjfx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.767: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:29:44.767: INFO: keyvault-flexvolume-b7nvg started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.767: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:29:44.767: INFO: metrics-server-58ff8c5ddf-g2hh5 started at 2019-11-04 23:10:24 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.767: INFO: Container metrics-server ready: true, restart count 0 Nov 4 23:29:44.767: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-sdnnm started at 2019-11-04 23:29:35 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.767: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:29:44.767: INFO: back-off-cap started at 2019-11-04 23:25:56 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.767: INFO: Container back-off-cap ready: false, restart count 4 Nov 4 23:29:44.767: INFO: azure-ip-masq-agent-tdbp9 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.767: INFO: Container azure-ip-masq-agent ready: true, restart count 0 W1104 23:29:44.769984 30399 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:29:44.807: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:44.807: INFO: Logging node info for node k8s-master-11489250-0 Nov 4 23:29:44.809: INFO: Node Info: &Node{ObjectMeta:{k8s-master-11489250-0 /api/v1/nodes/k8s-master-11489250-0 c7e8559d-81e4-4401-b9ca-034b4af0cc76 26678 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_DS2_v2 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:0 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:master kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-master-11489250-0 kubernetes.io/os:linux kubernetes.io/role:master node-role.kubernetes.io/master:] map[node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.0.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachines/k8s-master-11489250-0,Unschedulable:false,Taints:[]Taint{Taint{Key:node-role.kubernetes.io/master,Value:true,Effect:NoSchedule,TimeAdded:<nil>,},},ConfigSource:nil,PodCIDRs:[10.244.0.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{7284359168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{6497927168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:29:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.255.5,},NodeAddress{Type:Hostname,Address:k8s-master-11489250-0,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:4b2e1465590843f69a05114d1f1735bd,SystemUUID:885E2CBD-DE7B-DE41-AC15-18FB50C2BFBA,BootID:1ddb5423-95a4-4f58-9386-79ef6bca0f71,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[k8sprowinternal.azurecr.io/azure-cloud-controller-manager@sha256:823d2ccf43dfd34db70b91241aa07ab6579db11ffe31cc07fd0fdd752388497c k8sprowinternal.azurecr.io/azure-cloud-controller-manager:1191484695150333952-3d6cd6ff],SizeBytes:92595467,},ContainerImage{Names:[k8s.gcr.io/kube-addon-manager-amd64@sha256:382c220b3531d9f95bf316a16b7282cc2ef929cd8a89a9dd3f5933edafc41a8e k8s.gcr.io/kube-addon-manager-amd64:v9.0.1],SizeBytes:83076194,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:29:44.810: INFO: Logging kubelet events for node k8s-master-11489250-0 Nov 4 23:29:44.814: INFO: Logging pods the kubelet thinks is on node k8s-master-11489250-0 Nov 4 23:29:44.819: INFO: kube-apiserver-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.819: INFO: Container kube-apiserver ready: true, restart count 0 Nov 4 23:29:44.819: INFO: kube-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.819: INFO: Container kube-controller-manager ready: true, restart count 0 Nov 4 23:29:44.819: INFO: kube-scheduler-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.819: INFO: Container kube-scheduler ready: true, restart count 0 Nov 4 23:29:44.819: INFO: azure-ip-masq-agent-hhzdb started at 2019-11-04 23:10:03 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.819: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:29:44.819: INFO: kube-proxy-knwmt started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.819: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:29:44.819: INFO: cloud-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.819: INFO: Container cloud-controller-manager ready: true, restart count 0 Nov 4 23:29:44.819: INFO: kube-addon-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.819: INFO: Container kube-addon-manager ready: true, restart count 0 W1104 23:29:44.824221 30399 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:29:44.843: INFO: Latency metrics for node k8s-master-11489250-0 Nov 4 23:29:44.843: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready �[1mSTEP�[0m: Destroying namespace "provisioning-227" for this suite.
Filter through log files
go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sIn\-tree\sVolumes\s\[Driver\:\slocal\]\[LocalVolumeType\:\sblockfs\]\s\[Testpattern\:\sPre\-provisioned\sPV\s\(filesystem\svolmode\)\]\smultiVolume\s\[Slow\]\sshould\sconcurrently\saccess\sthe\ssingle\svolume\sfrom\spods\son\sthe\ssame\snode$'
test/e2e/storage/testsuites/multivolume.go:293 Nov 4 23:29:45.484: Unexpected error: <*errors.errorString | 0xc0011da7e0>: { s: "pod \"security-context-7fbb72ad-72e5-4ac2-a31f-3b581f1df154\" is not Running: timed out waiting for the condition", } pod "security-context-7fbb72ad-72e5-4ac2-a31f-3b581f1df154" is not Running: timed out waiting for the condition occurred test/e2e/storage/testsuites/multivolume.go:434from junit_21.xml
[BeforeEach] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] test/e2e/storage/testsuites/base.go:99 [BeforeEach] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] test/e2e/storage/testsuites/multivolume.go:87 [BeforeEach] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] test/e2e/framework/framework.go:147 �[1mSTEP�[0m: Creating a kubernetes client Nov 4 23:23:54.702: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Building a namespace api object, basename multivolume �[1mSTEP�[0m: Binding the e2e-test-privileged-psp PodSecurityPolicy to the default service account in multivolume-5570 �[1mSTEP�[0m: Waiting for a default service account to be provisioned in namespace [It] should concurrently access the single volume from pods on the same node test/e2e/storage/testsuites/multivolume.go:293 Nov 4 23:23:54.857: INFO: Could not find CSI Name for in-tree plugin kubernetes.io/local-volume �[1mSTEP�[0m: Creating block device on node "k8s-agentpool1-11489250-vmss000000" using path "/tmp/local-driver-ff47659f-dae0-4e25-bae1-59ebb3a85390" Nov 4 23:24:20.868: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c mkdir -p /tmp/local-driver-ff47659f-dae0-4e25-bae1-59ebb3a85390 && dd if=/dev/zero of=/tmp/local-driver-ff47659f-dae0-4e25-bae1-59ebb3a85390/file bs=4096 count=5120 && losetup -f /tmp/local-driver-ff47659f-dae0-4e25-bae1-59ebb3a85390/file] Namespace:multivolume-5570 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-jv6k6 ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:24:20.868: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json Nov 4 23:24:22.440: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c E2E_LOOP_DEV=$(losetup | grep /tmp/local-driver-ff47659f-dae0-4e25-bae1-59ebb3a85390/file | awk '{ print $1 }') 2>&1 > /dev/null && echo ${E2E_LOOP_DEV}] Namespace:multivolume-5570 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-jv6k6 ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:24:22.440: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json Nov 4 23:24:25.726: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c mkfs -t ext4 /dev/loop7 && mount -t ext4 /dev/loop7 /tmp/local-driver-ff47659f-dae0-4e25-bae1-59ebb3a85390 && chmod o+rwx /tmp/local-driver-ff47659f-dae0-4e25-bae1-59ebb3a85390] Namespace:multivolume-5570 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-jv6k6 ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:24:25.726: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json Nov 4 23:24:29.421: INFO: Creating resource for pre-provisioned PV Nov 4 23:24:29.421: INFO: Creating PVC and PV �[1mSTEP�[0m: Creating a PVC followed by a PV Nov 4 23:24:29.432: INFO: Waiting for PV local-r6lc2 to bind to PVC pvc-ptd5r Nov 4 23:24:29.432: INFO: Waiting up to 3m0s for PersistentVolumeClaims [pvc-ptd5r] to have phase Bound Nov 4 23:24:29.438: INFO: PersistentVolumeClaim pvc-ptd5r found but phase is Pending instead of Bound. Nov 4 23:24:31.441: INFO: PersistentVolumeClaim pvc-ptd5r found but phase is Pending instead of Bound. Nov 4 23:24:33.444: INFO: PersistentVolumeClaim pvc-ptd5r found but phase is Pending instead of Bound. Nov 4 23:24:35.446: INFO: PersistentVolumeClaim pvc-ptd5r found but phase is Pending instead of Bound. Nov 4 23:24:37.450: INFO: PersistentVolumeClaim pvc-ptd5r found but phase is Pending instead of Bound. Nov 4 23:24:39.453: INFO: PersistentVolumeClaim pvc-ptd5r found but phase is Pending instead of Bound. Nov 4 23:24:41.455: INFO: PersistentVolumeClaim pvc-ptd5r found but phase is Pending instead of Bound. Nov 4 23:24:43.458: INFO: PersistentVolumeClaim pvc-ptd5r found but phase is Pending instead of Bound. Nov 4 23:24:45.461: INFO: PersistentVolumeClaim pvc-ptd5r found and phase=Bound (16.028864481s) Nov 4 23:24:45.461: INFO: Waiting up to 3m0s for PersistentVolume local-r6lc2 to have phase Bound Nov 4 23:24:45.467: INFO: PersistentVolume local-r6lc2 found and phase=Bound (6.197649ms) �[1mSTEP�[0m: Creating pod1 with a volume on {Name:k8s-agentpool1-11489250-vmss000000 Selector:map[] Affinity:nil} Nov 4 23:29:45.484: FAIL: Unexpected error: <*errors.errorString | 0xc0011da7e0>: { s: "pod \"security-context-7fbb72ad-72e5-4ac2-a31f-3b581f1df154\" is not Running: timed out waiting for the condition", } pod "security-context-7fbb72ad-72e5-4ac2-a31f-3b581f1df154" is not Running: timed out waiting for the condition occurred Nov 4 23:29:45.484: INFO: Deleting pod "security-context-7fbb72ad-72e5-4ac2-a31f-3b581f1df154" in namespace "multivolume-5570" Nov 4 23:29:45.493: INFO: Wait up to 5m0s for pod "security-context-7fbb72ad-72e5-4ac2-a31f-3b581f1df154" to be fully deleted �[1mSTEP�[0m: Deleting pv and pvc Nov 4 23:29:55.498: INFO: Deleting PersistentVolumeClaim "pvc-ptd5r" Nov 4 23:29:55.502: INFO: Deleting PersistentVolume "local-r6lc2" Nov 4 23:29:55.514: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c umount /tmp/local-driver-ff47659f-dae0-4e25-bae1-59ebb3a85390] Namespace:multivolume-5570 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-jv6k6 ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:29:55.514: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json Nov 4 23:29:59.278: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c E2E_LOOP_DEV=$(losetup | grep /tmp/local-driver-ff47659f-dae0-4e25-bae1-59ebb3a85390/file | awk '{ print $1 }') 2>&1 > /dev/null && echo ${E2E_LOOP_DEV}] Namespace:multivolume-5570 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-jv6k6 ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:29:59.278: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Tear down block device "/dev/loop7" on node "k8s-agentpool1-11489250-vmss000000" at path /tmp/local-driver-ff47659f-dae0-4e25-bae1-59ebb3a85390/file Nov 4 23:29:59.472: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c losetup -d /dev/loop7] Namespace:multivolume-5570 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-jv6k6 ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:29:59.472: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Removing the test directory /tmp/local-driver-ff47659f-dae0-4e25-bae1-59ebb3a85390 Nov 4 23:30:00.299: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c rm -r /tmp/local-driver-ff47659f-dae0-4e25-bae1-59ebb3a85390] Namespace:multivolume-5570 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-jv6k6 ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:30:00.299: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Deleting pod hostexec-k8s-agentpool1-11489250-vmss000000-jv6k6 in namespace multivolume-5570 Nov 4 23:30:01.135: INFO: In-tree plugin kubernetes.io/local-volume is not migrated, not validating any metrics [AfterEach] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] test/e2e/framework/framework.go:148 �[1mSTEP�[0m: Collecting events from namespace "multivolume-5570". �[1mSTEP�[0m: Found 9 events. Nov 4 23:30:01.139: INFO: At 2019-11-04 23:24:08 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-jv6k6: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "gcr.io/kubernetes-e2e-test-images/agnhost:2.6" Nov 4 23:30:01.139: INFO: At 2019-11-04 23:24:10 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-jv6k6: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "gcr.io/kubernetes-e2e-test-images/agnhost:2.6" Nov 4 23:30:01.139: INFO: At 2019-11-04 23:24:12 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-jv6k6: {kubelet k8s-agentpool1-11489250-vmss000000} Created: Created container agnhost Nov 4 23:30:01.139: INFO: At 2019-11-04 23:24:12 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-jv6k6: {kubelet k8s-agentpool1-11489250-vmss000000} Started: Started container agnhost Nov 4 23:30:01.139: INFO: At 2019-11-04 23:24:29 +0000 UTC - event for pvc-ptd5r: {persistentvolume-controller } ProvisioningFailed: storageclass.storage.k8s.io "multivolume-5570" not found Nov 4 23:30:01.139: INFO: At 2019-11-04 23:24:52 +0000 UTC - event for security-context-7fbb72ad-72e5-4ac2-a31f-3b581f1df154: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "docker.io/library/busybox:1.29" Nov 4 23:30:01.139: INFO: At 2019-11-04 23:29:52 +0000 UTC - event for security-context-7fbb72ad-72e5-4ac2-a31f-3b581f1df154: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "docker.io/library/busybox:1.29" Nov 4 23:30:01.139: INFO: At 2019-11-04 23:29:52 +0000 UTC - event for security-context-7fbb72ad-72e5-4ac2-a31f-3b581f1df154: {kubelet k8s-agentpool1-11489250-vmss000000} Failed: Error: cannot find volume "volume1" to mount into container "write-pod" Nov 4 23:30:01.139: INFO: At 2019-11-04 23:30:01 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-jv6k6: {kubelet k8s-agentpool1-11489250-vmss000000} Killing: Stopping container agnhost Nov 4 23:30:01.144: INFO: POD NODE PHASE GRACE CONDITIONS Nov 4 23:30:01.144: INFO: Nov 4 23:30:01.146: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:30:01.148: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000000 /api/v1/nodes/k8s-agentpool1-11489250-vmss000000 4d779b63-b743-40ed-9ec9-08ee7dd28ab4 26525 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000000 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000000] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-1271":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-multivolume-5778":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3215":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3527":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-4405":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-7631":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-multivolume-2637":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-2219":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-4772":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-7421":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-volumemode-5039":"k8s-agentpool1-11489250-vmss000000","csi-mock-csi-mock-volumes-5459":"csi-mock-csi-mock-volumes-5459"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.2.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/0,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.2.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.4,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000000,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5eb5b251426b48e38a0513ab8a4e5fc0,SystemUUID:CB87A4F7-2661-444E-8AB3-C1A284BA9714,BootID:42192202-1583-496a-b5ff-b9c6d63be18f,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[k8s.gcr.io/kubernetes-dashboard-amd64@sha256:0ae6b69432e78069c5ce2bcde0fe409c5c4d6f0f4d9cd50a17974fea38898747 k8s.gcr.io/kubernetes-dashboard-amd64:v1.10.1],SizeBytes:121711221,},ContainerImage{Names:[gcr.io/kubernetes-helm/tiller@sha256:f6d8f4ab9ba993b5f5b60a6edafe86352eabe474ffeb84cb6c79b8866dce45d1 gcr.io/kubernetes-helm/tiller:v2.11.0],SizeBytes:71821984,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:0efcb424f1dde9b9fb11a1a14f2e48ab47e1c3f08bc3a929990dcfcb1f7ab34f quay.io/k8scsi/csi-provisioner:v1.4.0-rc1],SizeBytes:54431016,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:0aba670b4d9d6b2e720bbf575d733156c676b693ca26501235444490300db838 quay.io/k8scsi/csi-attacher:v1.1.0],SizeBytes:42839085,},ContainerImage{Names:[k8s.gcr.io/coredns@sha256:e83beb5e43f8513fa735e77ffc5859640baea30a882a11cc75c4c3244a737d3c k8s.gcr.io/coredns:1.5.0],SizeBytes:42488424,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[quay.io/k8scsi/mock-driver@sha256:e0eed916b7d970bad2b7d9875f9ad16932f987f0f3d91ec5d86da68b0b5cc9d1 quay.io/k8scsi/mock-driver:v2.1.0],SizeBytes:16226335,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:13daf82fb99e951a4bff8ae5fc7c17c3a8fe7130be6400990d8f6076c32d4599 quay.io/k8scsi/csi-node-driver-registrar:v1.1.0],SizeBytes:15815995,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/google-containers/startup-script@sha256:be96df6845a2af0eb61b17817ed085ce41048e4044c541da7580570b61beff3e gcr.io/google-containers/startup-script:v1],SizeBytes:12528443,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause@sha256:f78411e19d84a252e53bff71a4407a5686c46983a2c2eeed83929b888179acea k8s.gcr.io/pause-amd64:3.1 k8s.gcr.io/pause:3.1],SizeBytes:742472,},},VolumesInUse:[kubernetes.io/csi/csi-hostpath-multivolume-1271^1f0de69b-ff5a-11e9-a283-9eaad548a827 kubernetes.io/csi/csi-hostpath-multivolume-1271^205df607-ff5a-11e9-a283-9eaad548a827],VolumesAttached:[]AttachedVolume{AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-1271^1f0de69b-ff5a-11e9-a283-9eaad548a827,DevicePath:,},AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-1271^205df607-ff5a-11e9-a283-9eaad548a827,DevicePath:,},},Config:nil,},} Nov 4 23:30:01.149: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:30:01.153: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000000 Nov 4 23:30:01.167: INFO: hostpath-symlink-prep-provisioning-4995 started at 2019-11-04 23:24:58 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container init-volume-provisioning-4995 ready: false, restart count 0 Nov 4 23:30:01.167: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container csi-provisioner ready: true, restart count 0 Nov 4 23:30:01.167: INFO: csi-hostpathplugin-p7nrj started at 2019-11-04 23:26:42 +0000 UTC (0+2 container statuses recorded) Nov 4 23:30:01.167: INFO: Container driver-registrar ready: false, restart count 0 Nov 4 23:30:01.167: INFO: Container hostpath ready: false, restart count 0 Nov 4 23:30:01.167: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-8wk7z started at 2019-11-04 23:29:22 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:30:01.167: INFO: azure-ip-masq-agent-nk6ts started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:30:01.167: INFO: coredns-87f5d796-n67d4 started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container coredns ready: true, restart count 0 Nov 4 23:30:01.167: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-x7m4h started at 2019-11-04 23:26:28 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:30:01.167: INFO: csi-hostpath-resizer-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container csi-resizer ready: true, restart count 0 Nov 4 23:30:01.167: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-f7sh6 started at 2019-11-04 23:26:35 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:30:01.167: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:23:00 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container csi-attacher ready: true, restart count 0 Nov 4 23:30:01.167: INFO: kube-proxy-4q46s started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:30:01.167: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-84tg5 started at 2019-11-04 23:29:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:30:01.167: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:26:43 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container csi-provisioner ready: false, restart count 0 Nov 4 23:30:01.167: INFO: tiller-deploy-7559b6b885-5lm2k started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container tiller ready: true, restart count 0 Nov 4 23:30:01.167: INFO: pod-subpath-test-hostpathsymlink-kmsd started at 2019-11-04 23:23:19 +0000 UTC (1+2 container statuses recorded) Nov 4 23:30:01.167: INFO: Init container init-volume-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:30:01.167: INFO: Container test-container-subpath-hostpathsymlink-kmsd ready: false, restart count 0 Nov 4 23:30:01.167: INFO: Container test-container-volume-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:30:01.167: INFO: security-context-32e5a9df-35d4-4d74-9394-deba9a253642 started at 2019-11-04 23:25:05 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:30:01.167: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-pqjdl started at 2019-11-04 23:29:50 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:30:01.167: INFO: hostpath-symlink-prep-provisioning-844 started at 2019-11-04 23:30:00 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container init-volume-provisioning-844 ready: false, restart count 0 Nov 4 23:30:01.167: INFO: kubernetes-dashboard-65966766b9-lvtsz started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container kubernetes-dashboard ready: true, restart count 0 Nov 4 23:30:01.167: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-tpwjh started at 2019-11-04 23:29:45 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:30:01.167: INFO: blobfuse-flexvol-installer-8shkx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:30:01.167: INFO: csi-snapshotter-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container csi-snapshotter ready: true, restart count 0 Nov 4 23:30:01.167: INFO: keyvault-flexvolume-xzbqt started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:30:01.167: INFO: csi-hostpathplugin-0 started at 2019-11-04 23:23:00 +0000 UTC (0+3 container statuses recorded) Nov 4 23:30:01.167: INFO: Container hostpath ready: true, restart count 0 Nov 4 23:30:01.167: INFO: Container liveness-probe ready: true, restart count 0 Nov 4 23:30:01.167: INFO: Container node-driver-registrar ready: true, restart count 0 Nov 4 23:30:01.167: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-m9tnz started at 2019-11-04 23:26:17 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:30:01.167: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:26:41 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container csi-attacher ready: false, restart count 0 Nov 4 23:30:01.167: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-rt52w started at 2019-11-04 23:26:46 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:30:01.167: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-flccr started at 2019-11-04 23:29:15 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:01.167: INFO: Container agnhost ready: false, restart count 0 W1104 23:30:01.170393 30414 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:30:03.962: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:30:03.962: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:30:03.965: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000001 /api/v1/nodes/k8s-agentpool1-11489250-vmss000001 2d9f0ab9-c990-46a3-b3bc-7808950553bf 26766 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:1 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000001 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000001] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-3014":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6609":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6697":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-3251":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-4810":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-546":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-6369":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-multivolume-7618":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-2817":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-5016":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-6812":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-855":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumeio-7968":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumemode-6226":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumeio-9022":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumemode-551":"k8s-agentpool1-11489250-vmss000001"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.1.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/1,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.1.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:29:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.5,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000001,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5456dda39b3d435cb066867813114df8,SystemUUID:6D0288FF-6F23-3E4D-916E-D89B5AFE73FD,BootID:eeee8a92-9ca0-4335-88b5-e62705f3f746,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[k8s.gcr.io/metrics-server-amd64@sha256:49a9f12f7067d11f42c803dbe61ed2c1299959ad85cb315b25ff7eef8e6b8892 k8s.gcr.io/metrics-server-amd64:v0.2.1],SizeBytes:42541759,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64@sha256:3b36bd80b97c532a774e7f6246797b8575d97037982f353476c703ba6686c75c gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64:1.0],SizeBytes:19227369,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[nginx@sha256:485b610fefec7ff6c463ced9623314a04ed67e3945b9c08d7e53a47f6d108dc7 nginx:1.14-alpine],SizeBytes:16032814,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:30:03.965: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:30:03.970: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000001 Nov 4 23:30:03.976: INFO: back-off-cap started at 2019-11-04 23:25:56 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:03.976: INFO: Container back-off-cap ready: false, restart count 5 Nov 4 23:30:03.976: INFO: azure-ip-masq-agent-tdbp9 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:03.976: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:30:03.976: INFO: pod-subpath-test-local-preprovisionedpv-ttxd started at 2019-11-04 23:29:44 +0000 UTC (1+2 container statuses recorded) Nov 4 23:30:03.976: INFO: Init container init-volume-local-preprovisionedpv-ttxd ready: true, restart count 0 Nov 4 23:30:03.976: INFO: Container test-container-subpath-local-preprovisionedpv-ttxd ready: true, restart count 0 Nov 4 23:30:03.976: INFO: Container test-container-volume-local-preprovisionedpv-ttxd ready: true, restart count 0 Nov 4 23:30:03.976: INFO: nfs-server started at 2019-11-04 23:25:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:03.976: INFO: Container nfs-server ready: true, restart count 0 Nov 4 23:30:03.976: INFO: kube-proxy-gkpm5 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:03.976: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:30:03.976: INFO: blobfuse-flexvol-installer-kfjfx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:03.976: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:30:03.976: INFO: keyvault-flexvolume-b7nvg started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:03.976: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:30:03.976: INFO: metrics-server-58ff8c5ddf-g2hh5 started at 2019-11-04 23:10:24 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:03.976: INFO: Container metrics-server ready: true, restart count 0 Nov 4 23:30:03.976: INFO: pod-subpath-test-local-preprovisionedpv-dxx9 started at 2019-11-04 23:29:59 +0000 UTC (1+2 container statuses recorded) Nov 4 23:30:03.976: INFO: Init container init-volume-local-preprovisionedpv-dxx9 ready: false, restart count 0 Nov 4 23:30:03.976: INFO: Container test-container-subpath-local-preprovisionedpv-dxx9 ready: false, restart count 0 Nov 4 23:30:03.976: INFO: Container test-container-volume-local-preprovisionedpv-dxx9 ready: false, restart count 0 Nov 4 23:30:03.976: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-sdnnm started at 2019-11-04 23:29:35 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:03.976: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:30:03.976: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-shzhf started at 2019-11-04 23:29:45 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:03.976: INFO: Container agnhost ready: true, restart count 0 W1104 23:30:03.979232 30414 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:30:04.018: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:30:04.018: INFO: Logging node info for node k8s-master-11489250-0 Nov 4 23:30:04.025: INFO: Node Info: &Node{ObjectMeta:{k8s-master-11489250-0 /api/v1/nodes/k8s-master-11489250-0 c7e8559d-81e4-4401-b9ca-034b4af0cc76 26678 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_DS2_v2 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:0 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:master kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-master-11489250-0 kubernetes.io/os:linux kubernetes.io/role:master node-role.kubernetes.io/master:] map[node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.0.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachines/k8s-master-11489250-0,Unschedulable:false,Taints:[]Taint{Taint{Key:node-role.kubernetes.io/master,Value:true,Effect:NoSchedule,TimeAdded:<nil>,},},ConfigSource:nil,PodCIDRs:[10.244.0.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{7284359168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{6497927168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:29:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.255.5,},NodeAddress{Type:Hostname,Address:k8s-master-11489250-0,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:4b2e1465590843f69a05114d1f1735bd,SystemUUID:885E2CBD-DE7B-DE41-AC15-18FB50C2BFBA,BootID:1ddb5423-95a4-4f58-9386-79ef6bca0f71,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[k8sprowinternal.azurecr.io/azure-cloud-controller-manager@sha256:823d2ccf43dfd34db70b91241aa07ab6579db11ffe31cc07fd0fdd752388497c k8sprowinternal.azurecr.io/azure-cloud-controller-manager:1191484695150333952-3d6cd6ff],SizeBytes:92595467,},ContainerImage{Names:[k8s.gcr.io/kube-addon-manager-amd64@sha256:382c220b3531d9f95bf316a16b7282cc2ef929cd8a89a9dd3f5933edafc41a8e k8s.gcr.io/kube-addon-manager-amd64:v9.0.1],SizeBytes:83076194,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:30:04.025: INFO: Logging kubelet events for node k8s-master-11489250-0 Nov 4 23:30:04.029: INFO: Logging pods the kubelet thinks is on node k8s-master-11489250-0 Nov 4 23:30:04.034: INFO: kube-apiserver-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:04.034: INFO: Container kube-apiserver ready: true, restart count 0 Nov 4 23:30:04.034: INFO: kube-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:04.034: INFO: Container kube-controller-manager ready: true, restart count 0 Nov 4 23:30:04.034: INFO: kube-scheduler-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:04.034: INFO: Container kube-scheduler ready: true, restart count 0 Nov 4 23:30:04.034: INFO: azure-ip-masq-agent-hhzdb started at 2019-11-04 23:10:03 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:04.034: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:30:04.034: INFO: kube-proxy-knwmt started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:04.034: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:30:04.034: INFO: cloud-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:04.034: INFO: Container cloud-controller-manager ready: true, restart count 0 Nov 4 23:30:04.034: INFO: kube-addon-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:30:04.034: INFO: Container kube-addon-manager ready: true, restart count 0 W1104 23:30:04.037597 30414 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:30:04.052: INFO: Latency metrics for node k8s-master-11489250-0 Nov 4 23:30:04.052: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready �[1mSTEP�[0m: Destroying namespace "multivolume-5570" for this suite.
Find security-context-7fbb72ad-72e5-4ac2-a31f-3b581f1df154 mentions in log files
go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sIn\-tree\sVolumes\s\[Driver\:\slocal\]\[LocalVolumeType\:\sdir\-link\]\s\[Testpattern\:\sPre\-provisioned\sPV\s\(default\sfs\)\]\ssubPath\sshould\sfail\sif\ssubpath\sdirectory\sis\soutside\sthe\svolume\s\[Slow\]$'
test/e2e/storage/testsuites/subpath.go:235 Nov 4 23:29:15.449: while waiting for subpath failure Unexpected error: <*errors.errorString | 0xc0000a10a0>: { s: "timed out waiting for the condition", } timed out waiting for the condition occurred test/e2e/storage/testsuites/subpath.go:740from junit_12.xml
[BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath test/e2e/storage/testsuites/base.go:99 [BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath test/e2e/framework/framework.go:147 �[1mSTEP�[0m: Creating a kubernetes client Nov 4 23:23:11.886: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Building a namespace api object, basename provisioning �[1mSTEP�[0m: Binding the e2e-test-privileged-psp PodSecurityPolicy to the default service account in provisioning-9178 �[1mSTEP�[0m: Waiting for a default service account to be provisioned in namespace [It] should fail if subpath directory is outside the volume [Slow] test/e2e/storage/testsuites/subpath.go:235 Nov 4 23:23:12.041: INFO: Could not find CSI Name for in-tree plugin kubernetes.io/local-volume Nov 4 23:24:02.057: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c mkdir /tmp/local-driver-4b5df9f3-a80d-4f55-9fc9-0167fd6fd14c-backend && ln -s /tmp/local-driver-4b5df9f3-a80d-4f55-9fc9-0167fd6fd14c-backend /tmp/local-driver-4b5df9f3-a80d-4f55-9fc9-0167fd6fd14c] Namespace:provisioning-9178 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-dwxr9 ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:24:02.057: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json Nov 4 23:24:03.360: INFO: Creating resource for pre-provisioned PV Nov 4 23:24:03.360: INFO: Creating PVC and PV �[1mSTEP�[0m: Creating a PVC followed by a PV Nov 4 23:24:03.379: INFO: Waiting for PV local-dwzzm to bind to PVC pvc-6xdx6 Nov 4 23:24:03.379: INFO: Waiting up to 3m0s for PersistentVolumeClaims [pvc-6xdx6] to have phase Bound Nov 4 23:24:03.390: INFO: PersistentVolumeClaim pvc-6xdx6 found but phase is Pending instead of Bound. Nov 4 23:24:05.393: INFO: PersistentVolumeClaim pvc-6xdx6 found but phase is Pending instead of Bound. Nov 4 23:24:07.395: INFO: PersistentVolumeClaim pvc-6xdx6 found but phase is Pending instead of Bound. Nov 4 23:24:09.399: INFO: PersistentVolumeClaim pvc-6xdx6 found but phase is Pending instead of Bound. Nov 4 23:24:11.402: INFO: PersistentVolumeClaim pvc-6xdx6 found but phase is Pending instead of Bound. Nov 4 23:24:13.412: INFO: PersistentVolumeClaim pvc-6xdx6 found but phase is Pending instead of Bound. Nov 4 23:24:15.427: INFO: PersistentVolumeClaim pvc-6xdx6 found and phase=Bound (12.047832049s) Nov 4 23:24:15.427: INFO: Waiting up to 3m0s for PersistentVolume local-dwzzm to have phase Bound Nov 4 23:24:15.431: INFO: PersistentVolume local-dwzzm found and phase=Bound (3.633229ms) �[1mSTEP�[0m: Creating pod pod-subpath-test-local-preprovisionedpv-94cz �[1mSTEP�[0m: Checking for subpath error in container status Nov 4 23:29:15.449: FAIL: while waiting for subpath failure Unexpected error: <*errors.errorString | 0xc0000a10a0>: { s: "timed out waiting for the condition", } timed out waiting for the condition occurred Nov 4 23:29:15.450: INFO: Deleting pod "pod-subpath-test-local-preprovisionedpv-94cz" in namespace "provisioning-9178" Nov 4 23:29:15.453: INFO: Wait up to 5m0s for pod "pod-subpath-test-local-preprovisionedpv-94cz" to be fully deleted �[1mSTEP�[0m: Deleting pod Nov 4 23:29:21.468: INFO: Deleting pod "pod-subpath-test-local-preprovisionedpv-94cz" in namespace "provisioning-9178" �[1mSTEP�[0m: Deleting pv and pvc Nov 4 23:29:21.471: INFO: Deleting PersistentVolumeClaim "pvc-6xdx6" Nov 4 23:29:21.486: INFO: Deleting PersistentVolume "local-dwzzm" �[1mSTEP�[0m: Removing the test directory Nov 4 23:29:21.490: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c rm -r /tmp/local-driver-4b5df9f3-a80d-4f55-9fc9-0167fd6fd14c && rm -r /tmp/local-driver-4b5df9f3-a80d-4f55-9fc9-0167fd6fd14c-backend] Namespace:provisioning-9178 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-dwxr9 ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:29:21.490: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Deleting pod hostexec-k8s-agentpool1-11489250-vmss000000-dwxr9 in namespace provisioning-9178 Nov 4 23:29:21.720: INFO: In-tree plugin kubernetes.io/local-volume is not migrated, not validating any metrics [AfterEach] [Testpattern: Pre-provisioned PV (default fs)] subPath test/e2e/framework/framework.go:148 �[1mSTEP�[0m: Collecting events from namespace "provisioning-9178". �[1mSTEP�[0m: Found 7 events. Nov 4 23:29:21.729: INFO: At 2019-11-04 23:23:13 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-dwxr9: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "gcr.io/kubernetes-e2e-test-images/agnhost:2.6" Nov 4 23:29:21.729: INFO: At 2019-11-04 23:23:17 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-dwxr9: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "gcr.io/kubernetes-e2e-test-images/agnhost:2.6" Nov 4 23:29:21.729: INFO: At 2019-11-04 23:23:19 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-dwxr9: {kubelet k8s-agentpool1-11489250-vmss000000} Created: Created container agnhost Nov 4 23:29:21.729: INFO: At 2019-11-04 23:23:23 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-dwxr9: {kubelet k8s-agentpool1-11489250-vmss000000} Started: Started container agnhost Nov 4 23:29:21.729: INFO: At 2019-11-04 23:24:03 +0000 UTC - event for pvc-6xdx6: {persistentvolume-controller } ProvisioningFailed: storageclass.storage.k8s.io "provisioning-9178" not found Nov 4 23:29:21.729: INFO: At 2019-11-04 23:24:42 +0000 UTC - event for pod-subpath-test-local-preprovisionedpv-94cz: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "docker.io/library/busybox:1.29" Nov 4 23:29:21.729: INFO: At 2019-11-04 23:29:21 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-dwxr9: {kubelet k8s-agentpool1-11489250-vmss000000} Killing: Stopping container agnhost Nov 4 23:29:21.733: INFO: POD NODE PHASE GRACE CONDITIONS Nov 4 23:29:21.733: INFO: Nov 4 23:29:21.736: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:21.738: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000000 /api/v1/nodes/k8s-agentpool1-11489250-vmss000000 4d779b63-b743-40ed-9ec9-08ee7dd28ab4 26525 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000000 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000000] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-1271":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-multivolume-5778":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3215":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3527":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-4405":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-7631":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-multivolume-2637":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-2219":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-4772":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-7421":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-volumemode-5039":"k8s-agentpool1-11489250-vmss000000","csi-mock-csi-mock-volumes-5459":"csi-mock-csi-mock-volumes-5459"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.2.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/0,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.2.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.4,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000000,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5eb5b251426b48e38a0513ab8a4e5fc0,SystemUUID:CB87A4F7-2661-444E-8AB3-C1A284BA9714,BootID:42192202-1583-496a-b5ff-b9c6d63be18f,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[k8s.gcr.io/kubernetes-dashboard-amd64@sha256:0ae6b69432e78069c5ce2bcde0fe409c5c4d6f0f4d9cd50a17974fea38898747 k8s.gcr.io/kubernetes-dashboard-amd64:v1.10.1],SizeBytes:121711221,},ContainerImage{Names:[gcr.io/kubernetes-helm/tiller@sha256:f6d8f4ab9ba993b5f5b60a6edafe86352eabe474ffeb84cb6c79b8866dce45d1 gcr.io/kubernetes-helm/tiller:v2.11.0],SizeBytes:71821984,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:0efcb424f1dde9b9fb11a1a14f2e48ab47e1c3f08bc3a929990dcfcb1f7ab34f quay.io/k8scsi/csi-provisioner:v1.4.0-rc1],SizeBytes:54431016,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:0aba670b4d9d6b2e720bbf575d733156c676b693ca26501235444490300db838 quay.io/k8scsi/csi-attacher:v1.1.0],SizeBytes:42839085,},ContainerImage{Names:[k8s.gcr.io/coredns@sha256:e83beb5e43f8513fa735e77ffc5859640baea30a882a11cc75c4c3244a737d3c k8s.gcr.io/coredns:1.5.0],SizeBytes:42488424,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[quay.io/k8scsi/mock-driver@sha256:e0eed916b7d970bad2b7d9875f9ad16932f987f0f3d91ec5d86da68b0b5cc9d1 quay.io/k8scsi/mock-driver:v2.1.0],SizeBytes:16226335,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:13daf82fb99e951a4bff8ae5fc7c17c3a8fe7130be6400990d8f6076c32d4599 quay.io/k8scsi/csi-node-driver-registrar:v1.1.0],SizeBytes:15815995,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/google-containers/startup-script@sha256:be96df6845a2af0eb61b17817ed085ce41048e4044c541da7580570b61beff3e gcr.io/google-containers/startup-script:v1],SizeBytes:12528443,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause@sha256:f78411e19d84a252e53bff71a4407a5686c46983a2c2eeed83929b888179acea k8s.gcr.io/pause-amd64:3.1 k8s.gcr.io/pause:3.1],SizeBytes:742472,},},VolumesInUse:[kubernetes.io/csi/csi-hostpath-multivolume-1271^1f0de69b-ff5a-11e9-a283-9eaad548a827 kubernetes.io/csi/csi-hostpath-multivolume-1271^205df607-ff5a-11e9-a283-9eaad548a827],VolumesAttached:[]AttachedVolume{AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-1271^1f0de69b-ff5a-11e9-a283-9eaad548a827,DevicePath:,},AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-1271^205df607-ff5a-11e9-a283-9eaad548a827,DevicePath:,},},Config:nil,},} Nov 4 23:29:21.738: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:21.742: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:21.757: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-flccr started at 2019-11-04 23:29:15 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:21.757: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-m9tnz started at 2019-11-04 23:26:17 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:21.757: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:26:41 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container csi-attacher ready: false, restart count 0 Nov 4 23:29:21.757: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-rt52w started at 2019-11-04 23:26:46 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:21.757: INFO: hostpath-symlink-prep-provisioning-4995 started at 2019-11-04 23:24:58 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container init-volume-provisioning-4995 ready: false, restart count 0 Nov 4 23:29:21.757: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container csi-provisioner ready: true, restart count 0 Nov 4 23:29:21.757: INFO: csi-hostpathplugin-p7nrj started at 2019-11-04 23:26:42 +0000 UTC (0+2 container statuses recorded) Nov 4 23:29:21.757: INFO: Container driver-registrar ready: false, restart count 0 Nov 4 23:29:21.757: INFO: Container hostpath ready: false, restart count 0 Nov 4 23:29:21.757: INFO: azure-ip-masq-agent-nk6ts started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:29:21.757: INFO: coredns-87f5d796-n67d4 started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container coredns ready: true, restart count 0 Nov 4 23:29:21.757: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-x7m4h started at 2019-11-04 23:26:28 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:21.757: INFO: csi-hostpath-resizer-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container csi-resizer ready: true, restart count 0 Nov 4 23:29:21.757: INFO: security-context-7fbb72ad-72e5-4ac2-a31f-3b581f1df154 started at 2019-11-04 23:24:46 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:29:21.757: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-f7sh6 started at 2019-11-04 23:26:35 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:21.757: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:23:00 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container csi-attacher ready: true, restart count 0 Nov 4 23:29:21.757: INFO: kube-proxy-4q46s started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:29:21.757: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:26:43 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container csi-provisioner ready: false, restart count 0 Nov 4 23:29:21.757: INFO: security-context-32e5a9df-35d4-4d74-9394-deba9a253642 started at 2019-11-04 23:25:05 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:29:21.757: INFO: pod-subpath-test-local-preprovisionedpv-pbjf started at 2019-11-04 23:24:33 +0000 UTC (1+2 container statuses recorded) Nov 4 23:29:21.757: INFO: Init container init-volume-local-preprovisionedpv-pbjf ready: false, restart count 0 Nov 4 23:29:21.757: INFO: Container test-container-subpath-local-preprovisionedpv-pbjf ready: false, restart count 0 Nov 4 23:29:21.757: INFO: Container test-container-volume-local-preprovisionedpv-pbjf ready: false, restart count 0 Nov 4 23:29:21.757: INFO: tiller-deploy-7559b6b885-5lm2k started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container tiller ready: true, restart count 0 Nov 4 23:29:21.757: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-4mznt started at 2019-11-04 23:22:59 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:29:21.757: INFO: pod-subpath-test-hostpathsymlink-kmsd started at 2019-11-04 23:23:19 +0000 UTC (1+2 container statuses recorded) Nov 4 23:29:21.757: INFO: Init container init-volume-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:29:21.757: INFO: Container test-container-subpath-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:29:21.757: INFO: Container test-container-volume-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:29:21.757: INFO: kubernetes-dashboard-65966766b9-lvtsz started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container kubernetes-dashboard ready: true, restart count 0 Nov 4 23:29:21.757: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-8rwpq started at 2019-11-04 23:23:34 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:29:21.757: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-94ngc started at 2019-11-04 23:24:49 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:21.757: INFO: blobfuse-flexvol-installer-8shkx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:29:21.757: INFO: csi-snapshotter-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container csi-snapshotter ready: true, restart count 0 Nov 4 23:29:21.757: INFO: keyvault-flexvolume-xzbqt started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:29:21.757: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-jv6k6 started at 2019-11-04 23:23:55 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:29:21.757: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-gk47b started at 2019-11-04 23:24:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:21.757: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-cvktv started at 2019-11-04 23:24:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.757: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:21.757: INFO: csi-hostpathplugin-0 started at 2019-11-04 23:23:00 +0000 UTC (0+3 container statuses recorded) Nov 4 23:29:21.757: INFO: Container hostpath ready: true, restart count 0 Nov 4 23:29:21.757: INFO: Container liveness-probe ready: true, restart count 0 Nov 4 23:29:21.757: INFO: Container node-driver-registrar ready: true, restart count 0 W1104 23:29:21.760337 30437 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:29:21.814: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:21.814: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:21.820: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000001 /api/v1/nodes/k8s-agentpool1-11489250-vmss000001 2d9f0ab9-c990-46a3-b3bc-7808950553bf 26413 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:1 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000001 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000001] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-3014":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6609":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6697":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-3251":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-4810":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-546":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-6369":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-multivolume-7618":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-2817":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-5016":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-6812":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-855":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumeio-7968":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumemode-6226":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumeio-9022":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumemode-551":"k8s-agentpool1-11489250-vmss000001"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.1.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/1,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.1.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:28:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.5,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000001,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5456dda39b3d435cb066867813114df8,SystemUUID:6D0288FF-6F23-3E4D-916E-D89B5AFE73FD,BootID:eeee8a92-9ca0-4335-88b5-e62705f3f746,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[k8s.gcr.io/metrics-server-amd64@sha256:49a9f12f7067d11f42c803dbe61ed2c1299959ad85cb315b25ff7eef8e6b8892 k8s.gcr.io/metrics-server-amd64:v0.2.1],SizeBytes:42541759,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64@sha256:3b36bd80b97c532a774e7f6246797b8575d97037982f353476c703ba6686c75c gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64:1.0],SizeBytes:19227369,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[nginx@sha256:485b610fefec7ff6c463ced9623314a04ed67e3945b9c08d7e53a47f6d108dc7 nginx:1.14-alpine],SizeBytes:16032814,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:29:21.820: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:21.824: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:21.831: INFO: back-off-cap started at 2019-11-04 23:25:56 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.831: INFO: Container back-off-cap ready: false, restart count 4 Nov 4 23:29:21.831: INFO: azure-ip-masq-agent-tdbp9 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.831: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:29:21.831: INFO: nfs-server started at 2019-11-04 23:25:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.831: INFO: Container nfs-server ready: true, restart count 0 Nov 4 23:29:21.831: INFO: blobfuse-flexvol-installer-kfjfx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.831: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:29:21.831: INFO: keyvault-flexvolume-b7nvg started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.831: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:29:21.831: INFO: kube-proxy-gkpm5 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.831: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:29:21.831: INFO: metrics-server-58ff8c5ddf-g2hh5 started at 2019-11-04 23:10:24 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.831: INFO: Container metrics-server ready: true, restart count 0 Nov 4 23:29:21.831: INFO: pod-configmaps-b12ea30b-ab74-4455-95d7-ad4513d9d70b started at 2019-11-04 23:24:24 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.831: INFO: Container createcm-volume-test ready: false, restart count 0 W1104 23:29:21.839639 30437 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:29:21.876: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:21.876: INFO: Logging node info for node k8s-master-11489250-0 Nov 4 23:29:21.879: INFO: Node Info: &Node{ObjectMeta:{k8s-master-11489250-0 /api/v1/nodes/k8s-master-11489250-0 c7e8559d-81e4-4401-b9ca-034b4af0cc76 26367 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_DS2_v2 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:0 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:master kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-master-11489250-0 kubernetes.io/os:linux kubernetes.io/role:master node-role.kubernetes.io/master:] map[node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.0.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachines/k8s-master-11489250-0,Unschedulable:false,Taints:[]Taint{Taint{Key:node-role.kubernetes.io/master,Value:true,Effect:NoSchedule,TimeAdded:<nil>,},},ConfigSource:nil,PodCIDRs:[10.244.0.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{7284359168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{6497927168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:28:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.255.5,},NodeAddress{Type:Hostname,Address:k8s-master-11489250-0,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:4b2e1465590843f69a05114d1f1735bd,SystemUUID:885E2CBD-DE7B-DE41-AC15-18FB50C2BFBA,BootID:1ddb5423-95a4-4f58-9386-79ef6bca0f71,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[k8sprowinternal.azurecr.io/azure-cloud-controller-manager@sha256:823d2ccf43dfd34db70b91241aa07ab6579db11ffe31cc07fd0fdd752388497c k8sprowinternal.azurecr.io/azure-cloud-controller-manager:1191484695150333952-3d6cd6ff],SizeBytes:92595467,},ContainerImage{Names:[k8s.gcr.io/kube-addon-manager-amd64@sha256:382c220b3531d9f95bf316a16b7282cc2ef929cd8a89a9dd3f5933edafc41a8e k8s.gcr.io/kube-addon-manager-amd64:v9.0.1],SizeBytes:83076194,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:29:21.879: INFO: Logging kubelet events for node k8s-master-11489250-0 Nov 4 23:29:21.883: INFO: Logging pods the kubelet thinks is on node k8s-master-11489250-0 Nov 4 23:29:21.888: INFO: kube-apiserver-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.888: INFO: Container kube-apiserver ready: true, restart count 0 Nov 4 23:29:21.888: INFO: kube-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.888: INFO: Container kube-controller-manager ready: true, restart count 0 Nov 4 23:29:21.888: INFO: kube-scheduler-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.888: INFO: Container kube-scheduler ready: true, restart count 0 Nov 4 23:29:21.888: INFO: azure-ip-masq-agent-hhzdb started at 2019-11-04 23:10:03 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.888: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:29:21.888: INFO: kube-proxy-knwmt started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.888: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:29:21.888: INFO: cloud-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.888: INFO: Container cloud-controller-manager ready: true, restart count 0 Nov 4 23:29:21.888: INFO: kube-addon-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:21.888: INFO: Container kube-addon-manager ready: true, restart count 0 W1104 23:29:21.891491 30437 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:29:21.907: INFO: Latency metrics for node k8s-master-11489250-0 Nov 4 23:29:21.907: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready �[1mSTEP�[0m: Destroying namespace "provisioning-9178" for this suite.
Filter through log files
go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sIn\-tree\sVolumes\s\[Driver\:\slocal\]\[LocalVolumeType\:\sdir\-link\]\s\[Testpattern\:\sPre\-provisioned\sPV\s\(default\sfs\)\]\ssubPath\sshould\ssupport\srestarting\scontainers\susing\sdirectory\sas\ssubpath\s\[Slow\]$'
test/e2e/storage/testsuites/subpath.go:315 Nov 4 23:29:29.658: while waiting for pod to be running Unexpected error: <*errors.errorString | 0xc0000d5080>: { s: "timed out waiting for the condition", } timed out waiting for the condition occurred test/e2e/storage/testsuites/subpath.go:818from junit_29.xml
[BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath test/e2e/storage/testsuites/base.go:99 [BeforeEach] [Testpattern: Pre-provisioned PV (default fs)] subPath test/e2e/framework/framework.go:147 �[1mSTEP�[0m: Creating a kubernetes client Nov 4 23:23:33.858: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Building a namespace api object, basename provisioning �[1mSTEP�[0m: Binding the e2e-test-privileged-psp PodSecurityPolicy to the default service account in provisioning-7427 �[1mSTEP�[0m: Waiting for a default service account to be provisioned in namespace [It] should support restarting containers using directory as subpath [Slow] test/e2e/storage/testsuites/subpath.go:315 Nov 4 23:23:34.021: INFO: Could not find CSI Name for in-tree plugin kubernetes.io/local-volume Nov 4 23:24:22.035: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c mkdir /tmp/local-driver-69da0029-026b-4d74-ae99-1ae368fe82b1-backend && ln -s /tmp/local-driver-69da0029-026b-4d74-ae99-1ae368fe82b1-backend /tmp/local-driver-69da0029-026b-4d74-ae99-1ae368fe82b1] Namespace:provisioning-7427 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-8rwpq ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:24:22.035: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json Nov 4 23:24:25.598: INFO: Creating resource for pre-provisioned PV Nov 4 23:24:25.598: INFO: Creating PVC and PV �[1mSTEP�[0m: Creating a PVC followed by a PV Nov 4 23:24:25.612: INFO: Waiting for PV local-hhsqv to bind to PVC pvc-dlt28 Nov 4 23:24:25.612: INFO: Waiting up to 3m0s for PersistentVolumeClaims [pvc-dlt28] to have phase Bound Nov 4 23:24:25.619: INFO: PersistentVolumeClaim pvc-dlt28 found but phase is Pending instead of Bound. Nov 4 23:24:27.622: INFO: PersistentVolumeClaim pvc-dlt28 found but phase is Pending instead of Bound. Nov 4 23:24:29.625: INFO: PersistentVolumeClaim pvc-dlt28 found and phase=Bound (4.012503211s) Nov 4 23:24:29.625: INFO: Waiting up to 3m0s for PersistentVolume local-hhsqv to have phase Bound Nov 4 23:24:29.627: INFO: PersistentVolume local-hhsqv found and phase=Bound (1.991015ms) �[1mSTEP�[0m: Creating pod pod-subpath-test-local-preprovisionedpv-pbjf Nov 4 23:29:29.658: FAIL: while waiting for pod to be running Unexpected error: <*errors.errorString | 0xc0000d5080>: { s: "timed out waiting for the condition", } timed out waiting for the condition occurred Nov 4 23:29:29.658: INFO: Deleting pod "pod-subpath-test-local-preprovisionedpv-pbjf" in namespace "provisioning-7427" Nov 4 23:29:29.663: INFO: Wait up to 5m0s for pod "pod-subpath-test-local-preprovisionedpv-pbjf" to be fully deleted �[1mSTEP�[0m: Deleting pod Nov 4 23:29:33.675: INFO: Deleting pod "pod-subpath-test-local-preprovisionedpv-pbjf" in namespace "provisioning-7427" �[1mSTEP�[0m: Deleting pv and pvc Nov 4 23:29:33.678: INFO: Deleting PersistentVolumeClaim "pvc-dlt28" Nov 4 23:29:33.684: INFO: Deleting PersistentVolume "local-hhsqv" �[1mSTEP�[0m: Removing the test directory Nov 4 23:29:33.691: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c rm -r /tmp/local-driver-69da0029-026b-4d74-ae99-1ae368fe82b1 && rm -r /tmp/local-driver-69da0029-026b-4d74-ae99-1ae368fe82b1-backend] Namespace:provisioning-7427 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-8rwpq ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:29:33.691: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Deleting pod hostexec-k8s-agentpool1-11489250-vmss000000-8rwpq in namespace provisioning-7427 Nov 4 23:29:33.954: INFO: In-tree plugin kubernetes.io/local-volume is not migrated, not validating any metrics [AfterEach] [Testpattern: Pre-provisioned PV (default fs)] subPath test/e2e/framework/framework.go:148 �[1mSTEP�[0m: Collecting events from namespace "provisioning-7427". �[1mSTEP�[0m: Found 7 events. Nov 4 23:29:33.963: INFO: At 2019-11-04 23:24:01 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-8rwpq: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "gcr.io/kubernetes-e2e-test-images/agnhost:2.6" Nov 4 23:29:33.963: INFO: At 2019-11-04 23:24:01 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-8rwpq: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "gcr.io/kubernetes-e2e-test-images/agnhost:2.6" Nov 4 23:29:33.963: INFO: At 2019-11-04 23:24:06 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-8rwpq: {kubelet k8s-agentpool1-11489250-vmss000000} Created: Created container agnhost Nov 4 23:29:33.963: INFO: At 2019-11-04 23:24:09 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-8rwpq: {kubelet k8s-agentpool1-11489250-vmss000000} Started: Started container agnhost Nov 4 23:29:33.963: INFO: At 2019-11-04 23:24:25 +0000 UTC - event for pvc-dlt28: {persistentvolume-controller } ProvisioningFailed: storageclass.storage.k8s.io "provisioning-7427" not found Nov 4 23:29:33.963: INFO: At 2019-11-04 23:24:49 +0000 UTC - event for pod-subpath-test-local-preprovisionedpv-pbjf: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "docker.io/library/busybox:1.29" Nov 4 23:29:33.963: INFO: At 2019-11-04 23:29:33 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-8rwpq: {kubelet k8s-agentpool1-11489250-vmss000000} Killing: Stopping container agnhost Nov 4 23:29:33.967: INFO: POD NODE PHASE GRACE CONDITIONS Nov 4 23:29:33.967: INFO: Nov 4 23:29:33.971: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:33.973: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000000 /api/v1/nodes/k8s-agentpool1-11489250-vmss000000 4d779b63-b743-40ed-9ec9-08ee7dd28ab4 26525 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000000 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000000] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-1271":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-multivolume-5778":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3215":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3527":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-4405":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-7631":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-multivolume-2637":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-2219":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-4772":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-7421":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-volumemode-5039":"k8s-agentpool1-11489250-vmss000000","csi-mock-csi-mock-volumes-5459":"csi-mock-csi-mock-volumes-5459"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.2.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/0,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.2.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.4,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000000,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5eb5b251426b48e38a0513ab8a4e5fc0,SystemUUID:CB87A4F7-2661-444E-8AB3-C1A284BA9714,BootID:42192202-1583-496a-b5ff-b9c6d63be18f,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[k8s.gcr.io/kubernetes-dashboard-amd64@sha256:0ae6b69432e78069c5ce2bcde0fe409c5c4d6f0f4d9cd50a17974fea38898747 k8s.gcr.io/kubernetes-dashboard-amd64:v1.10.1],SizeBytes:121711221,},ContainerImage{Names:[gcr.io/kubernetes-helm/tiller@sha256:f6d8f4ab9ba993b5f5b60a6edafe86352eabe474ffeb84cb6c79b8866dce45d1 gcr.io/kubernetes-helm/tiller:v2.11.0],SizeBytes:71821984,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:0efcb424f1dde9b9fb11a1a14f2e48ab47e1c3f08bc3a929990dcfcb1f7ab34f quay.io/k8scsi/csi-provisioner:v1.4.0-rc1],SizeBytes:54431016,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:0aba670b4d9d6b2e720bbf575d733156c676b693ca26501235444490300db838 quay.io/k8scsi/csi-attacher:v1.1.0],SizeBytes:42839085,},ContainerImage{Names:[k8s.gcr.io/coredns@sha256:e83beb5e43f8513fa735e77ffc5859640baea30a882a11cc75c4c3244a737d3c k8s.gcr.io/coredns:1.5.0],SizeBytes:42488424,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[quay.io/k8scsi/mock-driver@sha256:e0eed916b7d970bad2b7d9875f9ad16932f987f0f3d91ec5d86da68b0b5cc9d1 quay.io/k8scsi/mock-driver:v2.1.0],SizeBytes:16226335,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:13daf82fb99e951a4bff8ae5fc7c17c3a8fe7130be6400990d8f6076c32d4599 quay.io/k8scsi/csi-node-driver-registrar:v1.1.0],SizeBytes:15815995,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/google-containers/startup-script@sha256:be96df6845a2af0eb61b17817ed085ce41048e4044c541da7580570b61beff3e gcr.io/google-containers/startup-script:v1],SizeBytes:12528443,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause@sha256:f78411e19d84a252e53bff71a4407a5686c46983a2c2eeed83929b888179acea k8s.gcr.io/pause-amd64:3.1 k8s.gcr.io/pause:3.1],SizeBytes:742472,},},VolumesInUse:[kubernetes.io/csi/csi-hostpath-multivolume-1271^1f0de69b-ff5a-11e9-a283-9eaad548a827 kubernetes.io/csi/csi-hostpath-multivolume-1271^205df607-ff5a-11e9-a283-9eaad548a827],VolumesAttached:[]AttachedVolume{AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-1271^1f0de69b-ff5a-11e9-a283-9eaad548a827,DevicePath:,},AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-1271^205df607-ff5a-11e9-a283-9eaad548a827,DevicePath:,},},Config:nil,},} Nov 4 23:29:33.973: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:33.978: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:33.994: INFO: keyvault-flexvolume-xzbqt started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:29:33.994: INFO: csi-hostpathplugin-0 started at 2019-11-04 23:23:00 +0000 UTC (0+3 container statuses recorded) Nov 4 23:29:33.994: INFO: Container hostpath ready: true, restart count 0 Nov 4 23:29:33.994: INFO: Container liveness-probe ready: true, restart count 0 Nov 4 23:29:33.994: INFO: Container node-driver-registrar ready: true, restart count 0 Nov 4 23:29:33.994: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-jv6k6 started at 2019-11-04 23:23:55 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:29:33.994: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-gk47b started at 2019-11-04 23:24:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:33.994: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-cvktv started at 2019-11-04 23:24:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:33.994: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-m9tnz started at 2019-11-04 23:26:17 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:33.994: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:26:41 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container csi-attacher ready: false, restart count 0 Nov 4 23:29:33.994: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-rt52w started at 2019-11-04 23:26:46 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:33.994: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-flccr started at 2019-11-04 23:29:15 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:33.994: INFO: hostpath-symlink-prep-provisioning-4995 started at 2019-11-04 23:24:58 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container init-volume-provisioning-4995 ready: false, restart count 0 Nov 4 23:29:33.994: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container csi-provisioner ready: true, restart count 0 Nov 4 23:29:33.994: INFO: csi-hostpathplugin-p7nrj started at 2019-11-04 23:26:42 +0000 UTC (0+2 container statuses recorded) Nov 4 23:29:33.994: INFO: Container driver-registrar ready: false, restart count 0 Nov 4 23:29:33.994: INFO: Container hostpath ready: false, restart count 0 Nov 4 23:29:33.994: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-8wk7z started at 2019-11-04 23:29:22 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:33.994: INFO: azure-ip-masq-agent-nk6ts started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:29:33.994: INFO: coredns-87f5d796-n67d4 started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container coredns ready: true, restart count 0 Nov 4 23:29:33.994: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-x7m4h started at 2019-11-04 23:26:28 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:33.994: INFO: security-context-7fbb72ad-72e5-4ac2-a31f-3b581f1df154 started at 2019-11-04 23:24:46 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:29:33.994: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-f7sh6 started at 2019-11-04 23:26:35 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:33.994: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:23:00 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container csi-attacher ready: true, restart count 0 Nov 4 23:29:33.994: INFO: csi-hostpath-resizer-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container csi-resizer ready: true, restart count 0 Nov 4 23:29:33.994: INFO: kube-proxy-4q46s started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:29:33.994: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-84tg5 started at 2019-11-04 23:29:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:33.994: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:26:43 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container csi-provisioner ready: false, restart count 0 Nov 4 23:29:33.994: INFO: tiller-deploy-7559b6b885-5lm2k started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container tiller ready: true, restart count 0 Nov 4 23:29:33.994: INFO: pod-subpath-test-hostpathsymlink-kmsd started at 2019-11-04 23:23:19 +0000 UTC (1+2 container statuses recorded) Nov 4 23:29:33.994: INFO: Init container init-volume-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:29:33.994: INFO: Container test-container-subpath-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:29:33.994: INFO: Container test-container-volume-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:29:33.994: INFO: security-context-32e5a9df-35d4-4d74-9394-deba9a253642 started at 2019-11-04 23:25:05 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:29:33.994: INFO: kubernetes-dashboard-65966766b9-lvtsz started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container kubernetes-dashboard ready: true, restart count 0 Nov 4 23:29:33.994: INFO: blobfuse-flexvol-installer-8shkx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:29:33.994: INFO: csi-snapshotter-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container csi-snapshotter ready: true, restart count 0 Nov 4 23:29:33.994: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-94ngc started at 2019-11-04 23:24:49 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:33.994: INFO: Container agnhost ready: false, restart count 0 W1104 23:29:33.998247 30411 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:29:34.034: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:34.034: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:34.037: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000001 /api/v1/nodes/k8s-agentpool1-11489250-vmss000001 2d9f0ab9-c990-46a3-b3bc-7808950553bf 26413 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:1 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000001 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000001] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-3014":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6609":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6697":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-3251":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-4810":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-546":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-6369":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-multivolume-7618":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-2817":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-5016":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-6812":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-855":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumeio-7968":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumemode-6226":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumeio-9022":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumemode-551":"k8s-agentpool1-11489250-vmss000001"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.1.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/1,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.1.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:28:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.5,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000001,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5456dda39b3d435cb066867813114df8,SystemUUID:6D0288FF-6F23-3E4D-916E-D89B5AFE73FD,BootID:eeee8a92-9ca0-4335-88b5-e62705f3f746,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[k8s.gcr.io/metrics-server-amd64@sha256:49a9f12f7067d11f42c803dbe61ed2c1299959ad85cb315b25ff7eef8e6b8892 k8s.gcr.io/metrics-server-amd64:v0.2.1],SizeBytes:42541759,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64@sha256:3b36bd80b97c532a774e7f6246797b8575d97037982f353476c703ba6686c75c gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64:1.0],SizeBytes:19227369,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[nginx@sha256:485b610fefec7ff6c463ced9623314a04ed67e3945b9c08d7e53a47f6d108dc7 nginx:1.14-alpine],SizeBytes:16032814,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:29:34.038: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:34.042: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:34.053: INFO: metrics-server-58ff8c5ddf-g2hh5 started at 2019-11-04 23:10:24 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:34.053: INFO: Container metrics-server ready: true, restart count 0 Nov 4 23:29:34.053: INFO: back-off-cap started at 2019-11-04 23:25:56 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:34.053: INFO: Container back-off-cap ready: false, restart count 4 Nov 4 23:29:34.053: INFO: azure-ip-masq-agent-tdbp9 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:34.053: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:29:34.053: INFO: nfs-server started at 2019-11-04 23:25:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:34.053: INFO: Container nfs-server ready: true, restart count 0 Nov 4 23:29:34.053: INFO: kube-proxy-gkpm5 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:34.053: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:29:34.053: INFO: blobfuse-flexvol-installer-kfjfx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:34.053: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:29:34.053: INFO: keyvault-flexvolume-b7nvg started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:34.053: INFO: Container keyvault-flexvolume ready: true, restart count 0 W1104 23:29:34.056572 30411 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:29:34.105: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:34.105: INFO: Logging node info for node k8s-master-11489250-0 Nov 4 23:29:34.107: INFO: Node Info: &Node{ObjectMeta:{k8s-master-11489250-0 /api/v1/nodes/k8s-master-11489250-0 c7e8559d-81e4-4401-b9ca-034b4af0cc76 26678 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_DS2_v2 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:0 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:master kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-master-11489250-0 kubernetes.io/os:linux kubernetes.io/role:master node-role.kubernetes.io/master:] map[node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.0.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachines/k8s-master-11489250-0,Unschedulable:false,Taints:[]Taint{Taint{Key:node-role.kubernetes.io/master,Value:true,Effect:NoSchedule,TimeAdded:<nil>,},},ConfigSource:nil,PodCIDRs:[10.244.0.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{7284359168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{6497927168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:29:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.255.5,},NodeAddress{Type:Hostname,Address:k8s-master-11489250-0,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:4b2e1465590843f69a05114d1f1735bd,SystemUUID:885E2CBD-DE7B-DE41-AC15-18FB50C2BFBA,BootID:1ddb5423-95a4-4f58-9386-79ef6bca0f71,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[k8sprowinternal.azurecr.io/azure-cloud-controller-manager@sha256:823d2ccf43dfd34db70b91241aa07ab6579db11ffe31cc07fd0fdd752388497c k8sprowinternal.azurecr.io/azure-cloud-controller-manager:1191484695150333952-3d6cd6ff],SizeBytes:92595467,},ContainerImage{Names:[k8s.gcr.io/kube-addon-manager-amd64@sha256:382c220b3531d9f95bf316a16b7282cc2ef929cd8a89a9dd3f5933edafc41a8e k8s.gcr.io/kube-addon-manager-amd64:v9.0.1],SizeBytes:83076194,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:29:34.107: INFO: Logging kubelet events for node k8s-master-11489250-0 Nov 4 23:29:34.112: INFO: Logging pods the kubelet thinks is on node k8s-master-11489250-0 Nov 4 23:29:34.116: INFO: kube-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:34.116: INFO: Container kube-controller-manager ready: true, restart count 0 Nov 4 23:29:34.116: INFO: kube-scheduler-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:34.116: INFO: Container kube-scheduler ready: true, restart count 0 Nov 4 23:29:34.116: INFO: azure-ip-masq-agent-hhzdb started at 2019-11-04 23:10:03 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:34.116: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:29:34.116: INFO: kube-proxy-knwmt started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:34.116: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:29:34.116: INFO: cloud-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:34.116: INFO: Container cloud-controller-manager ready: true, restart count 0 Nov 4 23:29:34.116: INFO: kube-addon-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:34.116: INFO: Container kube-addon-manager ready: true, restart count 0 Nov 4 23:29:34.116: INFO: kube-apiserver-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:34.116: INFO: Container kube-apiserver ready: true, restart count 0 W1104 23:29:34.119373 30411 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:29:34.138: INFO: Latency metrics for node k8s-master-11489250-0 Nov 4 23:29:34.138: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready �[1mSTEP�[0m: Destroying namespace "provisioning-7427" for this suite.
Find to mentions in log files
go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sPersistentVolumes\-local\s\sStatefulSet\swith\spod\saffinity\s\[Slow\]\sshould\suse\svolumes\sspread\sacross\snodes\swhen\spod\shas\santi\-affinity$'
test/e2e/storage/persistent_volumes-local.go:375 Nov 4 23:29:44.816: Unexpected error: <*errors.errorString | 0xc0000a10a0>: { s: "timed out waiting for the condition", } timed out waiting for the condition occurred test/e2e/storage/utils/host_exec.go:104from junit_02.xml
[BeforeEach] [sig-storage] PersistentVolumes-local test/e2e/framework/framework.go:147 �[1mSTEP�[0m: Creating a kubernetes client Nov 4 23:24:44.638: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Building a namespace api object, basename persistent-local-volumes-test �[1mSTEP�[0m: Binding the e2e-test-privileged-psp PodSecurityPolicy to the default service account in persistent-local-volumes-test-8264 �[1mSTEP�[0m: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-storage] PersistentVolumes-local test/e2e/storage/persistent_volumes-local.go:153 [BeforeEach] StatefulSet with pod affinity [Slow] test/e2e/storage/persistent_volumes-local.go:375 �[1mSTEP�[0m: Setting up local volumes on node "k8s-agentpool1-11489250-vmss000000" �[1mSTEP�[0m: Initializing test volumes Nov 4 23:29:44.816: FAIL: Unexpected error: <*errors.errorString | 0xc0000a10a0>: { s: "timed out waiting for the condition", } timed out waiting for the condition occurred [AfterEach] StatefulSet with pod affinity [Slow] test/e2e/storage/persistent_volumes-local.go:387 [AfterEach] [sig-storage] PersistentVolumes-local test/e2e/framework/framework.go:148 �[1mSTEP�[0m: Collecting events from namespace "persistent-local-volumes-test-8264". �[1mSTEP�[0m: Found 1 events. Nov 4 23:29:44.830: INFO: At 2019-11-04 23:24:51 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-cvktv: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "gcr.io/kubernetes-e2e-test-images/agnhost:2.6" Nov 4 23:29:44.839: INFO: POD NODE PHASE GRACE CONDITIONS Nov 4 23:29:44.839: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-cvktv k8s-agentpool1-11489250-vmss000000 Pending [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:44 +0000 UTC } {Ready False 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:44 +0000 UTC ContainersNotReady containers with unready status: [agnhost]} {ContainersReady False 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:44 +0000 UTC ContainersNotReady containers with unready status: [agnhost]} {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:44 +0000 UTC }] Nov 4 23:29:44.839: INFO: Nov 4 23:29:44.842: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:44.845: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000000 /api/v1/nodes/k8s-agentpool1-11489250-vmss000000 4d779b63-b743-40ed-9ec9-08ee7dd28ab4 26525 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000000 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000000] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-1271":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-multivolume-5778":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3215":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3527":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-4405":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-7631":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-multivolume-2637":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-2219":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-4772":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-7421":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-volumemode-5039":"k8s-agentpool1-11489250-vmss000000","csi-mock-csi-mock-volumes-5459":"csi-mock-csi-mock-volumes-5459"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.2.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/0,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.2.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:29:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.4,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000000,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5eb5b251426b48e38a0513ab8a4e5fc0,SystemUUID:CB87A4F7-2661-444E-8AB3-C1A284BA9714,BootID:42192202-1583-496a-b5ff-b9c6d63be18f,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[k8s.gcr.io/kubernetes-dashboard-amd64@sha256:0ae6b69432e78069c5ce2bcde0fe409c5c4d6f0f4d9cd50a17974fea38898747 k8s.gcr.io/kubernetes-dashboard-amd64:v1.10.1],SizeBytes:121711221,},ContainerImage{Names:[gcr.io/kubernetes-helm/tiller@sha256:f6d8f4ab9ba993b5f5b60a6edafe86352eabe474ffeb84cb6c79b8866dce45d1 gcr.io/kubernetes-helm/tiller:v2.11.0],SizeBytes:71821984,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:0efcb424f1dde9b9fb11a1a14f2e48ab47e1c3f08bc3a929990dcfcb1f7ab34f quay.io/k8scsi/csi-provisioner:v1.4.0-rc1],SizeBytes:54431016,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:0aba670b4d9d6b2e720bbf575d733156c676b693ca26501235444490300db838 quay.io/k8scsi/csi-attacher:v1.1.0],SizeBytes:42839085,},ContainerImage{Names:[k8s.gcr.io/coredns@sha256:e83beb5e43f8513fa735e77ffc5859640baea30a882a11cc75c4c3244a737d3c k8s.gcr.io/coredns:1.5.0],SizeBytes:42488424,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[quay.io/k8scsi/mock-driver@sha256:e0eed916b7d970bad2b7d9875f9ad16932f987f0f3d91ec5d86da68b0b5cc9d1 quay.io/k8scsi/mock-driver:v2.1.0],SizeBytes:16226335,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:13daf82fb99e951a4bff8ae5fc7c17c3a8fe7130be6400990d8f6076c32d4599 quay.io/k8scsi/csi-node-driver-registrar:v1.1.0],SizeBytes:15815995,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/google-containers/startup-script@sha256:be96df6845a2af0eb61b17817ed085ce41048e4044c541da7580570b61beff3e gcr.io/google-containers/startup-script:v1],SizeBytes:12528443,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause@sha256:f78411e19d84a252e53bff71a4407a5686c46983a2c2eeed83929b888179acea k8s.gcr.io/pause-amd64:3.1 k8s.gcr.io/pause:3.1],SizeBytes:742472,},},VolumesInUse:[kubernetes.io/csi/csi-hostpath-multivolume-1271^1f0de69b-ff5a-11e9-a283-9eaad548a827 kubernetes.io/csi/csi-hostpath-multivolume-1271^205df607-ff5a-11e9-a283-9eaad548a827],VolumesAttached:[]AttachedVolume{AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-1271^1f0de69b-ff5a-11e9-a283-9eaad548a827,DevicePath:,},AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-1271^205df607-ff5a-11e9-a283-9eaad548a827,DevicePath:,},},Config:nil,},} Nov 4 23:29:44.845: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:44.849: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:44.876: INFO: kubernetes-dashboard-65966766b9-lvtsz started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container kubernetes-dashboard ready: true, restart count 0 Nov 4 23:29:44.876: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-94ngc started at 2019-11-04 23:24:49 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:44.876: INFO: blobfuse-flexvol-installer-8shkx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:29:44.876: INFO: csi-snapshotter-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container csi-snapshotter ready: true, restart count 0 Nov 4 23:29:44.876: INFO: keyvault-flexvolume-xzbqt started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:29:44.876: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-gk47b started at 2019-11-04 23:24:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:44.876: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-cvktv started at 2019-11-04 23:24:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:44.876: INFO: csi-hostpathplugin-0 started at 2019-11-04 23:23:00 +0000 UTC (0+3 container statuses recorded) Nov 4 23:29:44.876: INFO: Container hostpath ready: true, restart count 0 Nov 4 23:29:44.876: INFO: Container liveness-probe ready: true, restart count 0 Nov 4 23:29:44.876: INFO: Container node-driver-registrar ready: true, restart count 0 Nov 4 23:29:44.876: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-jv6k6 started at 2019-11-04 23:23:55 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:29:44.876: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-m9tnz started at 2019-11-04 23:26:17 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:44.876: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:26:41 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container csi-attacher ready: false, restart count 0 Nov 4 23:29:44.876: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-rt52w started at 2019-11-04 23:26:46 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:44.876: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-flccr started at 2019-11-04 23:29:15 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:44.876: INFO: hostpath-symlink-prep-provisioning-4995 started at 2019-11-04 23:24:58 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container init-volume-provisioning-4995 ready: false, restart count 0 Nov 4 23:29:44.876: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container csi-provisioner ready: true, restart count 0 Nov 4 23:29:44.876: INFO: csi-hostpathplugin-p7nrj started at 2019-11-04 23:26:42 +0000 UTC (0+2 container statuses recorded) Nov 4 23:29:44.876: INFO: Container driver-registrar ready: false, restart count 0 Nov 4 23:29:44.876: INFO: Container hostpath ready: false, restart count 0 Nov 4 23:29:44.876: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-8wk7z started at 2019-11-04 23:29:22 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:44.876: INFO: azure-ip-masq-agent-nk6ts started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:29:44.876: INFO: coredns-87f5d796-n67d4 started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container coredns ready: true, restart count 0 Nov 4 23:29:44.876: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-x7m4h started at 2019-11-04 23:26:28 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:44.876: INFO: csi-hostpath-resizer-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container csi-resizer ready: true, restart count 0 Nov 4 23:29:44.876: INFO: security-context-7fbb72ad-72e5-4ac2-a31f-3b581f1df154 started at 2019-11-04 23:24:46 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:29:44.876: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-f7sh6 started at 2019-11-04 23:26:35 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:44.876: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:23:00 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container csi-attacher ready: true, restart count 0 Nov 4 23:29:44.876: INFO: kube-proxy-4q46s started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:29:44.876: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-84tg5 started at 2019-11-04 23:29:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:44.876: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:26:43 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container csi-provisioner ready: false, restart count 0 Nov 4 23:29:44.876: INFO: tiller-deploy-7559b6b885-5lm2k started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container tiller ready: true, restart count 0 Nov 4 23:29:44.876: INFO: pod-subpath-test-hostpathsymlink-kmsd started at 2019-11-04 23:23:19 +0000 UTC (1+2 container statuses recorded) Nov 4 23:29:44.876: INFO: Init container init-volume-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:29:44.876: INFO: Container test-container-subpath-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:29:44.876: INFO: Container test-container-volume-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:29:44.876: INFO: security-context-32e5a9df-35d4-4d74-9394-deba9a253642 started at 2019-11-04 23:25:05 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.876: INFO: Container write-pod ready: false, restart count 0 W1104 23:29:44.879865 30390 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:29:44.925: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:44.925: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:44.927: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000001 /api/v1/nodes/k8s-agentpool1-11489250-vmss000001 2d9f0ab9-c990-46a3-b3bc-7808950553bf 26413 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:1 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000001 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000001] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-3014":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6609":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6697":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-3251":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-4810":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-546":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-6369":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-multivolume-7618":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-2817":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-5016":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-6812":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-855":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumeio-7968":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumemode-6226":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumeio-9022":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumemode-551":"k8s-agentpool1-11489250-vmss000001"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.1.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/1,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.1.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:28:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.5,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000001,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5456dda39b3d435cb066867813114df8,SystemUUID:6D0288FF-6F23-3E4D-916E-D89B5AFE73FD,BootID:eeee8a92-9ca0-4335-88b5-e62705f3f746,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[k8s.gcr.io/metrics-server-amd64@sha256:49a9f12f7067d11f42c803dbe61ed2c1299959ad85cb315b25ff7eef8e6b8892 k8s.gcr.io/metrics-server-amd64:v0.2.1],SizeBytes:42541759,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64@sha256:3b36bd80b97c532a774e7f6246797b8575d97037982f353476c703ba6686c75c gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64:1.0],SizeBytes:19227369,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[nginx@sha256:485b610fefec7ff6c463ced9623314a04ed67e3945b9c08d7e53a47f6d108dc7 nginx:1.14-alpine],SizeBytes:16032814,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:29:44.927: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:44.932: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:44.939: INFO: back-off-cap started at 2019-11-04 23:25:56 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.939: INFO: Container back-off-cap ready: false, restart count 4 Nov 4 23:29:44.939: INFO: azure-ip-masq-agent-tdbp9 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.939: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:29:44.939: INFO: pod-subpath-test-local-preprovisionedpv-ttxd started at 2019-11-04 23:29:44 +0000 UTC (1+2 container statuses recorded) Nov 4 23:29:44.939: INFO: Init container init-volume-local-preprovisionedpv-ttxd ready: false, restart count 0 Nov 4 23:29:44.939: INFO: Container test-container-subpath-local-preprovisionedpv-ttxd ready: false, restart count 0 Nov 4 23:29:44.939: INFO: Container test-container-volume-local-preprovisionedpv-ttxd ready: false, restart count 0 Nov 4 23:29:44.939: INFO: nfs-server started at 2019-11-04 23:25:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.939: INFO: Container nfs-server ready: true, restart count 0 Nov 4 23:29:44.939: INFO: blobfuse-flexvol-installer-kfjfx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.939: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:29:44.939: INFO: keyvault-flexvolume-b7nvg started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.939: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:29:44.939: INFO: kube-proxy-gkpm5 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.939: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:29:44.939: INFO: metrics-server-58ff8c5ddf-g2hh5 started at 2019-11-04 23:10:24 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.939: INFO: Container metrics-server ready: true, restart count 0 Nov 4 23:29:44.939: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-sdnnm started at 2019-11-04 23:29:35 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.939: INFO: Container agnhost ready: true, restart count 0 W1104 23:29:44.947298 30390 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:29:44.976: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:44.976: INFO: Logging node info for node k8s-master-11489250-0 Nov 4 23:29:44.979: INFO: Node Info: &Node{ObjectMeta:{k8s-master-11489250-0 /api/v1/nodes/k8s-master-11489250-0 c7e8559d-81e4-4401-b9ca-034b4af0cc76 26678 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_DS2_v2 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:0 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:master kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-master-11489250-0 kubernetes.io/os:linux kubernetes.io/role:master node-role.kubernetes.io/master:] map[node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.0.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachines/k8s-master-11489250-0,Unschedulable:false,Taints:[]Taint{Taint{Key:node-role.kubernetes.io/master,Value:true,Effect:NoSchedule,TimeAdded:<nil>,},},ConfigSource:nil,PodCIDRs:[10.244.0.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{7284359168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{6497927168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:29:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:29:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.255.5,},NodeAddress{Type:Hostname,Address:k8s-master-11489250-0,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:4b2e1465590843f69a05114d1f1735bd,SystemUUID:885E2CBD-DE7B-DE41-AC15-18FB50C2BFBA,BootID:1ddb5423-95a4-4f58-9386-79ef6bca0f71,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[k8sprowinternal.azurecr.io/azure-cloud-controller-manager@sha256:823d2ccf43dfd34db70b91241aa07ab6579db11ffe31cc07fd0fdd752388497c k8sprowinternal.azurecr.io/azure-cloud-controller-manager:1191484695150333952-3d6cd6ff],SizeBytes:92595467,},ContainerImage{Names:[k8s.gcr.io/kube-addon-manager-amd64@sha256:382c220b3531d9f95bf316a16b7282cc2ef929cd8a89a9dd3f5933edafc41a8e k8s.gcr.io/kube-addon-manager-amd64:v9.0.1],SizeBytes:83076194,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:29:44.979: INFO: Logging kubelet events for node k8s-master-11489250-0 Nov 4 23:29:44.983: INFO: Logging pods the kubelet thinks is on node k8s-master-11489250-0 Nov 4 23:29:44.987: INFO: kube-scheduler-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.987: INFO: Container kube-scheduler ready: true, restart count 0 Nov 4 23:29:44.987: INFO: azure-ip-masq-agent-hhzdb started at 2019-11-04 23:10:03 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.987: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:29:44.987: INFO: kube-proxy-knwmt started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.987: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:29:44.987: INFO: cloud-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.987: INFO: Container cloud-controller-manager ready: true, restart count 0 Nov 4 23:29:44.987: INFO: kube-addon-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.987: INFO: Container kube-addon-manager ready: true, restart count 0 Nov 4 23:29:44.987: INFO: kube-apiserver-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.987: INFO: Container kube-apiserver ready: true, restart count 0 Nov 4 23:29:44.987: INFO: kube-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:44.987: INFO: Container kube-controller-manager ready: true, restart count 0 W1104 23:29:44.995175 30390 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:29:45.010: INFO: Latency metrics for node k8s-master-11489250-0 Nov 4 23:29:45.010: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready �[1mSTEP�[0m: Destroying namespace "persistent-local-volumes-test-8264" for this suite.
Filter through log files
go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sPersistentVolumes\-local\s\s\[Volume\stype\:\sblockfswithformat\]\sSet\sfsGroup\sfor\slocal\svolume\sshould\sset\sfsGroup\sfor\sone\spod\s\[Slow\]$'
test/e2e/storage/persistent_volumes-local.go:261 Nov 4 23:26:33.314: Unexpected error: <*errors.errorString | 0xc0006ee5a0>: { s: "pod \"security-context-31bda50b-37fd-4954-b1e9-2fff7c8e2368\" is not Running: timed out waiting for the condition", } pod "security-context-31bda50b-37fd-4954-b1e9-2fff7c8e2368" is not Running: timed out waiting for the condition occurred test/e2e/storage/persistent_volumes-local.go:775from junit_14.xml
[BeforeEach] [sig-storage] PersistentVolumes-local test/e2e/framework/framework.go:147 �[1mSTEP�[0m: Creating a kubernetes client Nov 4 23:23:41.788: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Building a namespace api object, basename persistent-local-volumes-test �[1mSTEP�[0m: Binding the e2e-test-privileged-psp PodSecurityPolicy to the default service account in persistent-local-volumes-test-6302 �[1mSTEP�[0m: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-storage] PersistentVolumes-local test/e2e/storage/persistent_volumes-local.go:153 [BeforeEach] [Volume type: blockfswithformat] test/e2e/storage/persistent_volumes-local.go:189 �[1mSTEP�[0m: Initializing test volumes �[1mSTEP�[0m: Creating block device on node "k8s-agentpool1-11489250-vmss000000" using path "/tmp/local-volume-test-df2fe6b2-7ba8-4552-9099-9e0e4119ecda" Nov 4 23:24:21.962: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c mkdir -p /tmp/local-volume-test-df2fe6b2-7ba8-4552-9099-9e0e4119ecda && dd if=/dev/zero of=/tmp/local-volume-test-df2fe6b2-7ba8-4552-9099-9e0e4119ecda/file bs=4096 count=5120 && losetup -f /tmp/local-volume-test-df2fe6b2-7ba8-4552-9099-9e0e4119ecda/file] Namespace:persistent-local-volumes-test-6302 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-nmw2d ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:24:21.962: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json Nov 4 23:24:25.778: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c E2E_LOOP_DEV=$(losetup | grep /tmp/local-volume-test-df2fe6b2-7ba8-4552-9099-9e0e4119ecda/file | awk '{ print $1 }') 2>&1 > /dev/null && echo ${E2E_LOOP_DEV}] Namespace:persistent-local-volumes-test-6302 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-nmw2d ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:24:25.778: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json Nov 4 23:24:26.690: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c mkfs -t ext4 /dev/loop8 && mount -t ext4 /dev/loop8 /tmp/local-volume-test-df2fe6b2-7ba8-4552-9099-9e0e4119ecda && chmod o+rwx /tmp/local-volume-test-df2fe6b2-7ba8-4552-9099-9e0e4119ecda] Namespace:persistent-local-volumes-test-6302 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-nmw2d ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:24:26.690: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Creating local PVCs and PVs Nov 4 23:24:31.279: INFO: Creating a PV followed by a PVC Nov 4 23:24:31.291: INFO: Waiting for PV local-pvxbbp7 to bind to PVC pvc-v269z Nov 4 23:24:31.291: INFO: Waiting up to 3m0s for PersistentVolumeClaims [pvc-v269z] to have phase Bound Nov 4 23:24:31.293: INFO: PersistentVolumeClaim pvc-v269z found but phase is Pending instead of Bound. Nov 4 23:24:33.296: INFO: PersistentVolumeClaim pvc-v269z found and phase=Bound (2.005243092s) Nov 4 23:24:33.296: INFO: Waiting up to 3m0s for PersistentVolume local-pvxbbp7 to have phase Bound Nov 4 23:24:33.298: INFO: PersistentVolume local-pvxbbp7 found and phase=Bound (2.019416ms) [BeforeEach] Set fsGroup for local volume test/e2e/storage/persistent_volumes-local.go:255 [It] should set fsGroup for one pod [Slow] test/e2e/storage/persistent_volumes-local.go:261 �[1mSTEP�[0m: Checking fsGroup is set �[1mSTEP�[0m: Creating a pod Nov 4 23:26:33.314: FAIL: Unexpected error: <*errors.errorString | 0xc0006ee5a0>: { s: "pod \"security-context-31bda50b-37fd-4954-b1e9-2fff7c8e2368\" is not Running: timed out waiting for the condition", } pod "security-context-31bda50b-37fd-4954-b1e9-2fff7c8e2368" is not Running: timed out waiting for the condition occurred [AfterEach] [Volume type: blockfswithformat] test/e2e/storage/persistent_volumes-local.go:198 �[1mSTEP�[0m: Cleaning up PVC and PV Nov 4 23:26:33.315: INFO: Deleting PersistentVolumeClaim "pvc-v269z" Nov 4 23:26:33.318: INFO: Deleting PersistentVolume "local-pvxbbp7" Nov 4 23:26:33.326: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c umount /tmp/local-volume-test-df2fe6b2-7ba8-4552-9099-9e0e4119ecda] Namespace:persistent-local-volumes-test-6302 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-nmw2d ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:26:33.326: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json Nov 4 23:26:33.544: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c E2E_LOOP_DEV=$(losetup | grep /tmp/local-volume-test-df2fe6b2-7ba8-4552-9099-9e0e4119ecda/file | awk '{ print $1 }') 2>&1 > /dev/null && echo ${E2E_LOOP_DEV}] Namespace:persistent-local-volumes-test-6302 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-nmw2d ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:26:33.545: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Tear down block device "/dev/loop8" on node "k8s-agentpool1-11489250-vmss000000" at path /tmp/local-volume-test-df2fe6b2-7ba8-4552-9099-9e0e4119ecda/file Nov 4 23:26:33.768: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c losetup -d /dev/loop8] Namespace:persistent-local-volumes-test-6302 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-nmw2d ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:26:33.768: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Removing the test directory /tmp/local-volume-test-df2fe6b2-7ba8-4552-9099-9e0e4119ecda Nov 4 23:26:34.036: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c rm -r /tmp/local-volume-test-df2fe6b2-7ba8-4552-9099-9e0e4119ecda] Namespace:persistent-local-volumes-test-6302 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-nmw2d ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:26:34.036: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json [AfterEach] [sig-storage] PersistentVolumes-local test/e2e/framework/framework.go:148 �[1mSTEP�[0m: Collecting events from namespace "persistent-local-volumes-test-6302". �[1mSTEP�[0m: Found 6 events. Nov 4 23:26:34.891: INFO: At 0001-01-01 00:00:00 +0000 UTC - event for security-context-31bda50b-37fd-4954-b1e9-2fff7c8e2368: {default-scheduler } Scheduled: Successfully assigned persistent-local-volumes-test-6302/security-context-31bda50b-37fd-4954-b1e9-2fff7c8e2368 to k8s-agentpool1-11489250-vmss000000 Nov 4 23:26:34.891: INFO: At 2019-11-04 23:24:00 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-nmw2d: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "gcr.io/kubernetes-e2e-test-images/agnhost:2.6" Nov 4 23:26:34.891: INFO: At 2019-11-04 23:24:00 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-nmw2d: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "gcr.io/kubernetes-e2e-test-images/agnhost:2.6" Nov 4 23:26:34.891: INFO: At 2019-11-04 23:24:06 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-nmw2d: {kubelet k8s-agentpool1-11489250-vmss000000} Created: Created container agnhost Nov 4 23:26:34.891: INFO: At 2019-11-04 23:24:09 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-nmw2d: {kubelet k8s-agentpool1-11489250-vmss000000} Started: Started container agnhost Nov 4 23:26:34.891: INFO: At 2019-11-04 23:24:51 +0000 UTC - event for security-context-31bda50b-37fd-4954-b1e9-2fff7c8e2368: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "docker.io/library/busybox:1.29" Nov 4 23:26:34.900: INFO: POD NODE PHASE GRACE CONDITIONS Nov 4 23:26:34.900: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-nmw2d k8s-agentpool1-11489250-vmss000000 Running [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:23:42 +0000 UTC } {Ready True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:09 +0000 UTC } {ContainersReady True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:09 +0000 UTC } {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:23:42 +0000 UTC }] Nov 4 23:26:34.900: INFO: security-context-31bda50b-37fd-4954-b1e9-2fff7c8e2368 k8s-agentpool1-11489250-vmss000000 Pending [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:34 +0000 UTC } {Ready False 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:34 +0000 UTC ContainersNotReady containers with unready status: [write-pod]} {ContainersReady False 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:34 +0000 UTC ContainersNotReady containers with unready status: [write-pod]} {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:33 +0000 UTC }] Nov 4 23:26:34.900: INFO: Nov 4 23:26:34.902: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:26:34.905: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000000 /api/v1/nodes/k8s-agentpool1-11489250-vmss000000 4d779b63-b743-40ed-9ec9-08ee7dd28ab4 24987 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000000 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000000] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-1271":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-multivolume-5778":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3215":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3527":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-4405":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-7631":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-multivolume-2637":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-2219":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-4772":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-7421":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-volumemode-5039":"k8s-agentpool1-11489250-vmss000000","csi-mock-csi-mock-volumes-5459":"csi-mock-csi-mock-volumes-5459"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.2.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/0,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.2.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:26:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:26:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:26:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:26:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.4,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000000,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5eb5b251426b48e38a0513ab8a4e5fc0,SystemUUID:CB87A4F7-2661-444E-8AB3-C1A284BA9714,BootID:42192202-1583-496a-b5ff-b9c6d63be18f,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[k8s.gcr.io/kubernetes-dashboard-amd64@sha256:0ae6b69432e78069c5ce2bcde0fe409c5c4d6f0f4d9cd50a17974fea38898747 k8s.gcr.io/kubernetes-dashboard-amd64:v1.10.1],SizeBytes:121711221,},ContainerImage{Names:[gcr.io/kubernetes-helm/tiller@sha256:f6d8f4ab9ba993b5f5b60a6edafe86352eabe474ffeb84cb6c79b8866dce45d1 gcr.io/kubernetes-helm/tiller:v2.11.0],SizeBytes:71821984,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:0efcb424f1dde9b9fb11a1a14f2e48ab47e1c3f08bc3a929990dcfcb1f7ab34f quay.io/k8scsi/csi-provisioner:v1.4.0-rc1],SizeBytes:54431016,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:0aba670b4d9d6b2e720bbf575d733156c676b693ca26501235444490300db838 quay.io/k8scsi/csi-attacher:v1.1.0],SizeBytes:42839085,},ContainerImage{Names:[k8s.gcr.io/coredns@sha256:e83beb5e43f8513fa735e77ffc5859640baea30a882a11cc75c4c3244a737d3c k8s.gcr.io/coredns:1.5.0],SizeBytes:42488424,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[quay.io/k8scsi/mock-driver@sha256:e0eed916b7d970bad2b7d9875f9ad16932f987f0f3d91ec5d86da68b0b5cc9d1 quay.io/k8scsi/mock-driver:v2.1.0],SizeBytes:16226335,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:13daf82fb99e951a4bff8ae5fc7c17c3a8fe7130be6400990d8f6076c32d4599 quay.io/k8scsi/csi-node-driver-registrar:v1.1.0],SizeBytes:15815995,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/google-containers/startup-script@sha256:be96df6845a2af0eb61b17817ed085ce41048e4044c541da7580570b61beff3e gcr.io/google-containers/startup-script:v1],SizeBytes:12528443,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause@sha256:f78411e19d84a252e53bff71a4407a5686c46983a2c2eeed83929b888179acea k8s.gcr.io/pause-amd64:3.1 k8s.gcr.io/pause:3.1],SizeBytes:742472,},},VolumesInUse:[kubernetes.io/csi/csi-hostpath-multivolume-1271^1f0de69b-ff5a-11e9-a283-9eaad548a827 kubernetes.io/csi/csi-hostpath-multivolume-1271^205df607-ff5a-11e9-a283-9eaad548a827],VolumesAttached:[]AttachedVolume{AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-1271^1f0de69b-ff5a-11e9-a283-9eaad548a827,DevicePath:,},AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-1271^205df607-ff5a-11e9-a283-9eaad548a827,DevicePath:,},},Config:nil,},} Nov 4 23:26:34.905: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:26:34.911: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000000 Nov 4 23:26:34.928: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-nmw2d started at 2019-11-04 23:23:42 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:26:34.928: INFO: kubernetes-dashboard-65966766b9-lvtsz started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container kubernetes-dashboard ready: true, restart count 0 Nov 4 23:26:34.928: INFO: pod-subpath-test-local-preprovisionedpv-94cz started at 2019-11-04 23:24:16 +0000 UTC (1+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Init container init-volume-local-preprovisionedpv-94cz ready: false, restart count 0 Nov 4 23:26:34.928: INFO: Container test-container-subpath-local-preprovisionedpv-94cz ready: false, restart count 0 Nov 4 23:26:34.928: INFO: pod-subpath-test-local-preprovisionedpv-6jbf started at 2019-11-04 23:24:18 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container test-container-subpath-local-preprovisionedpv-6jbf ready: false, restart count 0 Nov 4 23:26:34.928: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-8rwpq started at 2019-11-04 23:23:34 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:26:34.928: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-94ngc started at 2019-11-04 23:24:49 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:26:34.928: INFO: blobfuse-flexvol-installer-8shkx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:26:34.928: INFO: csi-snapshotter-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container csi-snapshotter ready: true, restart count 0 Nov 4 23:26:34.928: INFO: keyvault-flexvolume-xzbqt started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:26:34.928: INFO: affinity-lb-transition-tzqrg started at 2019-11-04 23:23:20 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container affinity-lb-transition ready: true, restart count 0 Nov 4 23:26:34.928: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-gk47b started at 2019-11-04 23:24:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:26:34.928: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-cvktv started at 2019-11-04 23:24:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:26:34.928: INFO: security-context-31bda50b-37fd-4954-b1e9-2fff7c8e2368 started at 2019-11-04 23:24:34 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:26:34.928: INFO: csi-hostpathplugin-0 started at 2019-11-04 23:23:00 +0000 UTC (0+3 container statuses recorded) Nov 4 23:26:34.928: INFO: Container hostpath ready: true, restart count 0 Nov 4 23:26:34.928: INFO: Container liveness-probe ready: true, restart count 0 Nov 4 23:26:34.928: INFO: Container node-driver-registrar ready: true, restart count 0 Nov 4 23:26:34.928: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-jv6k6 started at 2019-11-04 23:23:55 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:26:34.928: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-m9tnz started at 2019-11-04 23:26:17 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:26:34.928: INFO: hostpath-symlink-prep-provisioning-4995 started at 2019-11-04 23:24:58 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container init-volume-provisioning-4995 ready: false, restart count 0 Nov 4 23:26:34.928: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container csi-provisioner ready: true, restart count 0 Nov 4 23:26:34.928: INFO: azure-ip-masq-agent-nk6ts started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:26:34.928: INFO: coredns-87f5d796-n67d4 started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container coredns ready: true, restart count 0 Nov 4 23:26:34.928: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-x7m4h started at 2019-11-04 23:26:28 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:26:34.928: INFO: csi-hostpath-resizer-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container csi-resizer ready: true, restart count 0 Nov 4 23:26:34.928: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-dwxr9 started at 2019-11-04 23:23:12 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:26:34.928: INFO: security-context-7fbb72ad-72e5-4ac2-a31f-3b581f1df154 started at 2019-11-04 23:24:46 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:26:34.928: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:23:00 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container csi-attacher ready: true, restart count 0 Nov 4 23:26:34.928: INFO: kube-proxy-4q46s started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:26:34.928: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-pgtp8 started at 2019-11-04 23:24:14 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:26:34.928: INFO: pod-subpath-test-local-preprovisionedpv-pbjf started at 2019-11-04 23:24:33 +0000 UTC (1+2 container statuses recorded) Nov 4 23:26:34.928: INFO: Init container init-volume-local-preprovisionedpv-pbjf ready: false, restart count 0 Nov 4 23:26:34.928: INFO: Container test-container-subpath-local-preprovisionedpv-pbjf ready: false, restart count 0 Nov 4 23:26:34.928: INFO: Container test-container-volume-local-preprovisionedpv-pbjf ready: false, restart count 0 Nov 4 23:26:34.928: INFO: tiller-deploy-7559b6b885-5lm2k started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container tiller ready: true, restart count 0 Nov 4 23:26:34.928: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-4mznt started at 2019-11-04 23:22:59 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:26:34.928: INFO: pod-subpath-test-hostpathsymlink-kmsd started at 2019-11-04 23:23:19 +0000 UTC (1+2 container statuses recorded) Nov 4 23:26:34.928: INFO: Init container init-volume-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:26:34.928: INFO: Container test-container-subpath-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:26:34.928: INFO: Container test-container-volume-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:26:34.928: INFO: security-context-32e5a9df-35d4-4d74-9394-deba9a253642 started at 2019-11-04 23:25:05 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.928: INFO: Container write-pod ready: false, restart count 0 W1104 23:26:34.931745 30424 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:26:34.976: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:26:34.976: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:26:34.978: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000001 /api/v1/nodes/k8s-agentpool1-11489250-vmss000001 2d9f0ab9-c990-46a3-b3bc-7808950553bf 25170 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:1 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000001 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000001] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-3014":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6609":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6697":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-3251":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-4810":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-546":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-6369":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-multivolume-7618":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-2817":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-5016":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-6812":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-855":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumeio-7968":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumemode-6226":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumeio-9022":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumemode-551":"k8s-agentpool1-11489250-vmss000001"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.1.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/1,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.1.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:26:34 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:26:34 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:26:34 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:26:34 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.5,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000001,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5456dda39b3d435cb066867813114df8,SystemUUID:6D0288FF-6F23-3E4D-916E-D89B5AFE73FD,BootID:eeee8a92-9ca0-4335-88b5-e62705f3f746,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[k8s.gcr.io/metrics-server-amd64@sha256:49a9f12f7067d11f42c803dbe61ed2c1299959ad85cb315b25ff7eef8e6b8892 k8s.gcr.io/metrics-server-amd64:v0.2.1],SizeBytes:42541759,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64@sha256:3b36bd80b97c532a774e7f6246797b8575d97037982f353476c703ba6686c75c gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64:1.0],SizeBytes:19227369,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[nginx@sha256:485b610fefec7ff6c463ced9623314a04ed67e3945b9c08d7e53a47f6d108dc7 nginx:1.14-alpine],SizeBytes:16032814,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[kubernetes.io/csi/csi-hostpath-multivolume-6609^594d7086-ff5a-11e9-b5d4-ae4d0534c552],VolumesAttached:[]AttachedVolume{AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-6609^594d7086-ff5a-11e9-b5d4-ae4d0534c552,DevicePath:,},},Config:nil,},} Nov 4 23:26:34.978: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:26:34.983: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000001 Nov 4 23:26:34.992: INFO: csi-hostpathplugin-jklbt started at 2019-11-04 23:24:09 +0000 UTC (0+2 container statuses recorded) Nov 4 23:26:34.992: INFO: Container driver-registrar ready: true, restart count 0 Nov 4 23:26:34.992: INFO: Container hostpath ready: true, restart count 0 Nov 4 23:26:34.992: INFO: csi-snapshotter-0 started at 2019-11-04 23:24:35 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.992: INFO: Container csi-snapshotter ready: true, restart count 0 Nov 4 23:26:34.992: INFO: back-off-cap started at 2019-11-04 23:25:56 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.992: INFO: Container back-off-cap ready: false, restart count 1 Nov 4 23:26:34.992: INFO: csi-hostpathplugin-0 started at 2019-11-04 23:24:33 +0000 UTC (0+3 container statuses recorded) Nov 4 23:26:34.992: INFO: Container hostpath ready: true, restart count 0 Nov 4 23:26:34.992: INFO: Container liveness-probe ready: true, restart count 0 Nov 4 23:26:34.992: INFO: Container node-driver-registrar ready: true, restart count 0 Nov 4 23:26:34.992: INFO: pod-configmaps-598fa230-9a3a-4cb5-bd57-76b3b2b91977 started at 2019-11-04 23:23:39 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.992: INFO: Container createcm-volume-test ready: false, restart count 0 Nov 4 23:26:34.992: INFO: security-context-0685e8cf-d994-461c-8dc1-74dfbeb47ea4 started at 2019-11-04 23:25:16 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.992: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:26:34.992: INFO: pod-subpath-test-hostpathsymlink-dmwr started at 2019-11-04 23:25:34 +0000 UTC (1+2 container statuses recorded) Nov 4 23:26:34.992: INFO: Init container init-volume-hostpathsymlink-dmwr ready: true, restart count 0 Nov 4 23:26:34.992: INFO: Container test-container-subpath-hostpathsymlink-dmwr ready: true, restart count 2 Nov 4 23:26:34.992: INFO: Container test-container-volume-hostpathsymlink-dmwr ready: true, restart count 0 Nov 4 23:26:34.992: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-x5xjq started at 2019-11-04 23:24:21 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.992: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:26:34.992: INFO: azure-ip-masq-agent-tdbp9 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.992: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:26:34.992: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:24:30 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.992: INFO: Container csi-attacher ready: true, restart count 0 Nov 4 23:26:34.992: INFO: affinity-lb-transition-kjch6 started at 2019-11-04 23:23:21 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.992: INFO: Container affinity-lb-transition ready: true, restart count 0 Nov 4 23:26:34.992: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:24:09 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.992: INFO: Container csi-provisioner ready: true, restart count 0 Nov 4 23:26:34.992: INFO: csi-hostpath-resizer-0 started at 2019-11-04 23:24:35 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.992: INFO: Container csi-resizer ready: true, restart count 0 Nov 4 23:26:34.992: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:24:09 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.992: INFO: Container csi-attacher ready: true, restart count 0 Nov 4 23:26:34.992: INFO: pod-subpath-test-emptydir-hr4r started at 2019-11-04 23:25:03 +0000 UTC (1+2 container statuses recorded) Nov 4 23:26:34.992: INFO: Init container init-volume-emptydir-hr4r ready: true, restart count 0 Nov 4 23:26:34.992: INFO: Container test-container-subpath-emptydir-hr4r ready: true, restart count 2 Nov 4 23:26:34.992: INFO: Container test-container-volume-emptydir-hr4r ready: true, restart count 0 Nov 4 23:26:34.992: INFO: nfs-server started at 2019-11-04 23:25:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.992: INFO: Container nfs-server ready: true, restart count 0 Nov 4 23:26:34.992: INFO: kube-proxy-gkpm5 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.992: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:26:34.992: INFO: blobfuse-flexvol-installer-kfjfx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.992: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:26:34.992: INFO: keyvault-flexvolume-b7nvg started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.992: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:26:34.992: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:24:34 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.992: INFO: Container csi-provisioner ready: true, restart count 0 Nov 4 23:26:34.992: INFO: metrics-server-58ff8c5ddf-g2hh5 started at 2019-11-04 23:10:24 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.992: INFO: Container metrics-server ready: true, restart count 0 Nov 4 23:26:34.992: INFO: pod-secrets-14a1e335-0f57-4cb3-a284-5c9a56af4101 started at 2019-11-04 23:21:36 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.992: INFO: Container creates-volume-test ready: false, restart count 0 Nov 4 23:26:34.992: INFO: security-context-9dc773c7-be6b-4db5-92c1-da4910c11f57 started at 2019-11-04 23:25:12 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.992: INFO: Container write-pod ready: true, restart count 0 Nov 4 23:26:34.992: INFO: var-expansion-ea641585-8af8-45b8-b961-259294d70bbb started at 2019-11-04 23:24:37 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.992: INFO: Container dapi-container ready: false, restart count 0 Nov 4 23:26:34.992: INFO: pod-configmaps-729a65e5-83ee-41ea-92f1-6fd623aff6b6 started at 2019-11-04 23:23:22 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.992: INFO: Container createcm-volume-test ready: false, restart count 0 Nov 4 23:26:34.992: INFO: security-context-f086d83f-ee20-4ada-bc68-845bfab92a98 started at 2019-11-04 23:25:00 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.993: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:26:34.993: INFO: pod-projected-configmaps-a3540205-649a-429f-bd73-07874e3ed68e started at 2019-11-04 23:22:42 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.993: INFO: Container createcm-volume-test ready: false, restart count 0 Nov 4 23:26:34.993: INFO: pod-configmaps-b12ea30b-ab74-4455-95d7-ad4513d9d70b started at 2019-11-04 23:24:24 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.993: INFO: Container createcm-volume-test ready: false, restart count 0 Nov 4 23:26:34.993: INFO: affinity-lb-transition-2t8r7 started at 2019-11-04 23:23:21 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.993: INFO: Container affinity-lb-transition ready: true, restart count 0 Nov 4 23:26:34.993: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-vql5r started at 2019-11-04 23:24:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:34.993: INFO: Container agnhost ready: true, restart count 0 W1104 23:26:34.995855 30424 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:26:35.059: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:26:35.059: INFO: Logging node info for node k8s-master-11489250-0 Nov 4 23:26:35.062: INFO: Node Info: &Node{ObjectMeta:{k8s-master-11489250-0 /api/v1/nodes/k8s-master-11489250-0 c7e8559d-81e4-4401-b9ca-034b4af0cc76 25138 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_DS2_v2 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:0 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:master kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-master-11489250-0 kubernetes.io/os:linux kubernetes.io/role:master node-role.kubernetes.io/master:] map[node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.0.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachines/k8s-master-11489250-0,Unschedulable:false,Taints:[]Taint{Taint{Key:node-role.kubernetes.io/master,Value:true,Effect:NoSchedule,TimeAdded:<nil>,},},ConfigSource:nil,PodCIDRs:[10.244.0.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{7284359168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{6497927168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:26:32 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:26:32 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:26:32 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:26:32 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.255.5,},NodeAddress{Type:Hostname,Address:k8s-master-11489250-0,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:4b2e1465590843f69a05114d1f1735bd,SystemUUID:885E2CBD-DE7B-DE41-AC15-18FB50C2BFBA,BootID:1ddb5423-95a4-4f58-9386-79ef6bca0f71,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[k8sprowinternal.azurecr.io/azure-cloud-controller-manager@sha256:823d2ccf43dfd34db70b91241aa07ab6579db11ffe31cc07fd0fdd752388497c k8sprowinternal.azurecr.io/azure-cloud-controller-manager:1191484695150333952-3d6cd6ff],SizeBytes:92595467,},ContainerImage{Names:[k8s.gcr.io/kube-addon-manager-amd64@sha256:382c220b3531d9f95bf316a16b7282cc2ef929cd8a89a9dd3f5933edafc41a8e k8s.gcr.io/kube-addon-manager-amd64:v9.0.1],SizeBytes:83076194,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:26:35.062: INFO: Logging kubelet events for node k8s-master-11489250-0 Nov 4 23:26:35.067: INFO: Logging pods the kubelet thinks is on node k8s-master-11489250-0 Nov 4 23:26:35.074: INFO: kube-scheduler-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:35.074: INFO: Container kube-scheduler ready: true, restart count 0 Nov 4 23:26:35.074: INFO: azure-ip-masq-agent-hhzdb started at 2019-11-04 23:10:03 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:35.074: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:26:35.074: INFO: kube-proxy-knwmt started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:35.074: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:26:35.074: INFO: cloud-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:35.074: INFO: Container cloud-controller-manager ready: true, restart count 0 Nov 4 23:26:35.074: INFO: kube-addon-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:35.074: INFO: Container kube-addon-manager ready: true, restart count 0 Nov 4 23:26:35.074: INFO: kube-apiserver-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:35.074: INFO: Container kube-apiserver ready: true, restart count 0 Nov 4 23:26:35.074: INFO: kube-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:35.074: INFO: Container kube-controller-manager ready: true, restart count 0 W1104 23:26:35.076973 30424 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:26:35.101: INFO: Latency metrics for node k8s-master-11489250-0 Nov 4 23:26:35.101: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready �[1mSTEP�[0m: Destroying namespace "persistent-local-volumes-test-6302" for this suite.
Find security-context-31bda50b-37fd-4954-b1e9-2fff7c8e2368 mentions in log files
go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sPersistentVolumes\-local\s\s\[Volume\stype\:\sblockfswithoutformat\]\sSet\sfsGroup\sfor\slocal\svolume\sshould\sset\sfsGroup\sfor\sone\spod\s\[Slow\]$'
test/e2e/storage/persistent_volumes-local.go:261 Nov 4 23:26:27.752: Unexpected error: <*errors.errorString | 0xc002726380>: { s: "pod \"security-context-45392744-e942-455f-9eeb-b4fc225717f7\" is not Running: timed out waiting for the condition", } pod "security-context-45392744-e942-455f-9eeb-b4fc225717f7" is not Running: timed out waiting for the condition occurred test/e2e/storage/persistent_volumes-local.go:775from junit_30.xml
[BeforeEach] [sig-storage] PersistentVolumes-local test/e2e/framework/framework.go:147 �[1mSTEP�[0m: Creating a kubernetes client Nov 4 23:23:42.775: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Building a namespace api object, basename persistent-local-volumes-test �[1mSTEP�[0m: Binding the e2e-test-privileged-psp PodSecurityPolicy to the default service account in persistent-local-volumes-test-9210 �[1mSTEP�[0m: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-storage] PersistentVolumes-local test/e2e/storage/persistent_volumes-local.go:153 [BeforeEach] [Volume type: blockfswithoutformat] test/e2e/storage/persistent_volumes-local.go:189 �[1mSTEP�[0m: Initializing test volumes �[1mSTEP�[0m: Creating block device on node "k8s-agentpool1-11489250-vmss000000" using path "/tmp/local-volume-test-695c74ad-3f9a-4053-b4fa-2bd879da757c" Nov 4 23:24:20.945: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c mkdir -p /tmp/local-volume-test-695c74ad-3f9a-4053-b4fa-2bd879da757c && dd if=/dev/zero of=/tmp/local-volume-test-695c74ad-3f9a-4053-b4fa-2bd879da757c/file bs=4096 count=5120 && losetup -f /tmp/local-volume-test-695c74ad-3f9a-4053-b4fa-2bd879da757c/file] Namespace:persistent-local-volumes-test-9210 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-jn7cx ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:24:20.945: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json Nov 4 23:24:22.418: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c E2E_LOOP_DEV=$(losetup | grep /tmp/local-volume-test-695c74ad-3f9a-4053-b4fa-2bd879da757c/file | awk '{ print $1 }') 2>&1 > /dev/null && echo ${E2E_LOOP_DEV}] Namespace:persistent-local-volumes-test-9210 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-jn7cx ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:24:22.418: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Creating local PVCs and PVs Nov 4 23:24:25.686: INFO: Creating a PV followed by a PVC Nov 4 23:24:25.705: INFO: Waiting for PV local-pvh2cf8 to bind to PVC pvc-sdqc9 Nov 4 23:24:25.705: INFO: Waiting up to 3m0s for PersistentVolumeClaims [pvc-sdqc9] to have phase Bound Nov 4 23:24:25.719: INFO: PersistentVolumeClaim pvc-sdqc9 found but phase is Pending instead of Bound. Nov 4 23:24:27.722: INFO: PersistentVolumeClaim pvc-sdqc9 found and phase=Bound (2.016938791s) Nov 4 23:24:27.722: INFO: Waiting up to 3m0s for PersistentVolume local-pvh2cf8 to have phase Bound Nov 4 23:24:27.725: INFO: PersistentVolume local-pvh2cf8 found and phase=Bound (2.774522ms) [BeforeEach] Set fsGroup for local volume test/e2e/storage/persistent_volumes-local.go:255 [It] should set fsGroup for one pod [Slow] test/e2e/storage/persistent_volumes-local.go:261 �[1mSTEP�[0m: Checking fsGroup is set �[1mSTEP�[0m: Creating a pod Nov 4 23:26:27.752: FAIL: Unexpected error: <*errors.errorString | 0xc002726380>: { s: "pod \"security-context-45392744-e942-455f-9eeb-b4fc225717f7\" is not Running: timed out waiting for the condition", } pod "security-context-45392744-e942-455f-9eeb-b4fc225717f7" is not Running: timed out waiting for the condition occurred [AfterEach] [Volume type: blockfswithoutformat] test/e2e/storage/persistent_volumes-local.go:198 �[1mSTEP�[0m: Cleaning up PVC and PV Nov 4 23:26:27.753: INFO: Deleting PersistentVolumeClaim "pvc-sdqc9" Nov 4 23:26:27.757: INFO: Deleting PersistentVolume "local-pvh2cf8" Nov 4 23:26:27.767: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c E2E_LOOP_DEV=$(losetup | grep /tmp/local-volume-test-695c74ad-3f9a-4053-b4fa-2bd879da757c/file | awk '{ print $1 }') 2>&1 > /dev/null && echo ${E2E_LOOP_DEV}] Namespace:persistent-local-volumes-test-9210 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-jn7cx ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:26:27.767: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Tear down block device "/dev/loop6" on node "k8s-agentpool1-11489250-vmss000000" at path /tmp/local-volume-test-695c74ad-3f9a-4053-b4fa-2bd879da757c/file Nov 4 23:26:27.959: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c losetup -d /dev/loop6] Namespace:persistent-local-volumes-test-9210 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-jn7cx ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:26:27.959: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Removing the test directory /tmp/local-volume-test-695c74ad-3f9a-4053-b4fa-2bd879da757c Nov 4 23:26:28.169: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c rm -r /tmp/local-volume-test-695c74ad-3f9a-4053-b4fa-2bd879da757c] Namespace:persistent-local-volumes-test-9210 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-jn7cx ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:26:28.169: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json [AfterEach] [sig-storage] PersistentVolumes-local test/e2e/framework/framework.go:148 �[1mSTEP�[0m: Collecting events from namespace "persistent-local-volumes-test-9210". �[1mSTEP�[0m: Found 6 events. Nov 4 23:26:28.392: INFO: At 0001-01-01 00:00:00 +0000 UTC - event for security-context-45392744-e942-455f-9eeb-b4fc225717f7: {default-scheduler } Scheduled: Successfully assigned persistent-local-volumes-test-9210/security-context-45392744-e942-455f-9eeb-b4fc225717f7 to k8s-agentpool1-11489250-vmss000000 Nov 4 23:26:28.392: INFO: At 2019-11-04 23:23:59 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-jn7cx: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "gcr.io/kubernetes-e2e-test-images/agnhost:2.6" Nov 4 23:26:28.392: INFO: At 2019-11-04 23:24:00 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-jn7cx: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "gcr.io/kubernetes-e2e-test-images/agnhost:2.6" Nov 4 23:26:28.392: INFO: At 2019-11-04 23:24:06 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-jn7cx: {kubelet k8s-agentpool1-11489250-vmss000000} Created: Created container agnhost Nov 4 23:26:28.393: INFO: At 2019-11-04 23:24:09 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-jn7cx: {kubelet k8s-agentpool1-11489250-vmss000000} Started: Started container agnhost Nov 4 23:26:28.393: INFO: At 2019-11-04 23:24:51 +0000 UTC - event for security-context-45392744-e942-455f-9eeb-b4fc225717f7: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "docker.io/library/busybox:1.29" Nov 4 23:26:28.395: INFO: POD NODE PHASE GRACE CONDITIONS Nov 4 23:26:28.395: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-jn7cx k8s-agentpool1-11489250-vmss000000 Running [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:23:43 +0000 UTC } {Ready True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:09 +0000 UTC } {ContainersReady True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:09 +0000 UTC } {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:23:43 +0000 UTC }] Nov 4 23:26:28.395: INFO: security-context-45392744-e942-455f-9eeb-b4fc225717f7 k8s-agentpool1-11489250-vmss000000 Pending [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:28 +0000 UTC } {Ready False 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:28 +0000 UTC ContainersNotReady containers with unready status: [write-pod]} {ContainersReady False 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:28 +0000 UTC ContainersNotReady containers with unready status: [write-pod]} {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:27 +0000 UTC }] Nov 4 23:26:28.395: INFO: Nov 4 23:26:28.398: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:26:28.400: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000000 /api/v1/nodes/k8s-agentpool1-11489250-vmss000000 4d779b63-b743-40ed-9ec9-08ee7dd28ab4 24987 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000000 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000000] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-1271":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-multivolume-5778":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3215":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3527":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-4405":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-7631":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-multivolume-2637":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-2219":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-4772":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-7421":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-volumemode-5039":"k8s-agentpool1-11489250-vmss000000","csi-mock-csi-mock-volumes-5459":"csi-mock-csi-mock-volumes-5459"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.2.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/0,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.2.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:26:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:26:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:26:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:26:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.4,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000000,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5eb5b251426b48e38a0513ab8a4e5fc0,SystemUUID:CB87A4F7-2661-444E-8AB3-C1A284BA9714,BootID:42192202-1583-496a-b5ff-b9c6d63be18f,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[k8s.gcr.io/kubernetes-dashboard-amd64@sha256:0ae6b69432e78069c5ce2bcde0fe409c5c4d6f0f4d9cd50a17974fea38898747 k8s.gcr.io/kubernetes-dashboard-amd64:v1.10.1],SizeBytes:121711221,},ContainerImage{Names:[gcr.io/kubernetes-helm/tiller@sha256:f6d8f4ab9ba993b5f5b60a6edafe86352eabe474ffeb84cb6c79b8866dce45d1 gcr.io/kubernetes-helm/tiller:v2.11.0],SizeBytes:71821984,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:0efcb424f1dde9b9fb11a1a14f2e48ab47e1c3f08bc3a929990dcfcb1f7ab34f quay.io/k8scsi/csi-provisioner:v1.4.0-rc1],SizeBytes:54431016,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:0aba670b4d9d6b2e720bbf575d733156c676b693ca26501235444490300db838 quay.io/k8scsi/csi-attacher:v1.1.0],SizeBytes:42839085,},ContainerImage{Names:[k8s.gcr.io/coredns@sha256:e83beb5e43f8513fa735e77ffc5859640baea30a882a11cc75c4c3244a737d3c k8s.gcr.io/coredns:1.5.0],SizeBytes:42488424,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[quay.io/k8scsi/mock-driver@sha256:e0eed916b7d970bad2b7d9875f9ad16932f987f0f3d91ec5d86da68b0b5cc9d1 quay.io/k8scsi/mock-driver:v2.1.0],SizeBytes:16226335,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:13daf82fb99e951a4bff8ae5fc7c17c3a8fe7130be6400990d8f6076c32d4599 quay.io/k8scsi/csi-node-driver-registrar:v1.1.0],SizeBytes:15815995,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/google-containers/startup-script@sha256:be96df6845a2af0eb61b17817ed085ce41048e4044c541da7580570b61beff3e gcr.io/google-containers/startup-script:v1],SizeBytes:12528443,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause@sha256:f78411e19d84a252e53bff71a4407a5686c46983a2c2eeed83929b888179acea k8s.gcr.io/pause-amd64:3.1 k8s.gcr.io/pause:3.1],SizeBytes:742472,},},VolumesInUse:[kubernetes.io/csi/csi-hostpath-multivolume-1271^1f0de69b-ff5a-11e9-a283-9eaad548a827 kubernetes.io/csi/csi-hostpath-multivolume-1271^205df607-ff5a-11e9-a283-9eaad548a827],VolumesAttached:[]AttachedVolume{AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-1271^1f0de69b-ff5a-11e9-a283-9eaad548a827,DevicePath:,},AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-1271^205df607-ff5a-11e9-a283-9eaad548a827,DevicePath:,},},Config:nil,},} Nov 4 23:26:28.401: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:26:28.406: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000000 Nov 4 23:26:28.442: INFO: hostpath-symlink-prep-provisioning-4995 started at 2019-11-04 23:24:58 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container init-volume-provisioning-4995 ready: false, restart count 0 Nov 4 23:26:28.442: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container csi-provisioner ready: true, restart count 0 Nov 4 23:26:28.442: INFO: azure-ip-masq-agent-nk6ts started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:26:28.442: INFO: coredns-87f5d796-n67d4 started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container coredns ready: true, restart count 0 Nov 4 23:26:28.442: INFO: security-context-7fbb72ad-72e5-4ac2-a31f-3b581f1df154 started at 2019-11-04 23:24:46 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:26:28.442: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:23:00 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container csi-attacher ready: true, restart count 0 Nov 4 23:26:28.442: INFO: csi-hostpath-resizer-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container csi-resizer ready: true, restart count 0 Nov 4 23:26:28.442: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-dwxr9 started at 2019-11-04 23:23:12 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:26:28.442: INFO: kube-proxy-4q46s started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:26:28.442: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-pgtp8 started at 2019-11-04 23:24:14 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:26:28.442: INFO: tiller-deploy-7559b6b885-5lm2k started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container tiller ready: true, restart count 0 Nov 4 23:26:28.442: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-4mznt started at 2019-11-04 23:22:59 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:26:28.442: INFO: pod-subpath-test-hostpathsymlink-kmsd started at 2019-11-04 23:23:19 +0000 UTC (1+2 container statuses recorded) Nov 4 23:26:28.442: INFO: Init container init-volume-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:26:28.442: INFO: Container test-container-subpath-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:26:28.442: INFO: Container test-container-volume-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:26:28.442: INFO: security-context-32e5a9df-35d4-4d74-9394-deba9a253642 started at 2019-11-04 23:25:05 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:26:28.442: INFO: pod-subpath-test-local-preprovisionedpv-pbjf started at 2019-11-04 23:24:33 +0000 UTC (1+2 container statuses recorded) Nov 4 23:26:28.442: INFO: Init container init-volume-local-preprovisionedpv-pbjf ready: false, restart count 0 Nov 4 23:26:28.442: INFO: Container test-container-subpath-local-preprovisionedpv-pbjf ready: false, restart count 0 Nov 4 23:26:28.442: INFO: Container test-container-volume-local-preprovisionedpv-pbjf ready: false, restart count 0 Nov 4 23:26:28.442: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-nmw2d started at 2019-11-04 23:23:42 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:26:28.442: INFO: kubernetes-dashboard-65966766b9-lvtsz started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container kubernetes-dashboard ready: true, restart count 0 Nov 4 23:26:28.442: INFO: pod-subpath-test-local-preprovisionedpv-94cz started at 2019-11-04 23:24:16 +0000 UTC (1+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Init container init-volume-local-preprovisionedpv-94cz ready: false, restart count 0 Nov 4 23:26:28.442: INFO: Container test-container-subpath-local-preprovisionedpv-94cz ready: false, restart count 0 Nov 4 23:26:28.442: INFO: pod-subpath-test-local-preprovisionedpv-6jbf started at 2019-11-04 23:24:18 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container test-container-subpath-local-preprovisionedpv-6jbf ready: false, restart count 0 Nov 4 23:26:28.442: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-8rwpq started at 2019-11-04 23:23:34 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:26:28.442: INFO: blobfuse-flexvol-installer-8shkx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:26:28.442: INFO: csi-snapshotter-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container csi-snapshotter ready: true, restart count 0 Nov 4 23:26:28.442: INFO: security-context-45392744-e942-455f-9eeb-b4fc225717f7 started at 2019-11-04 23:24:28 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:26:28.442: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-94ngc started at 2019-11-04 23:24:49 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:26:28.442: INFO: keyvault-flexvolume-xzbqt started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:26:28.442: INFO: affinity-lb-transition-tzqrg started at 2019-11-04 23:23:20 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container affinity-lb-transition ready: true, restart count 0 Nov 4 23:26:28.442: INFO: security-context-31bda50b-37fd-4954-b1e9-2fff7c8e2368 started at 2019-11-04 23:24:34 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:26:28.442: INFO: csi-hostpathplugin-0 started at 2019-11-04 23:23:00 +0000 UTC (0+3 container statuses recorded) Nov 4 23:26:28.442: INFO: Container hostpath ready: true, restart count 0 Nov 4 23:26:28.442: INFO: Container liveness-probe ready: true, restart count 0 Nov 4 23:26:28.442: INFO: Container node-driver-registrar ready: true, restart count 0 Nov 4 23:26:28.442: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-jn7cx started at 2019-11-04 23:23:43 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:26:28.442: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-jv6k6 started at 2019-11-04 23:23:55 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:26:28.442: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-gk47b started at 2019-11-04 23:24:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:26:28.442: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-cvktv started at 2019-11-04 23:24:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:26:28.442: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-m9tnz started at 2019-11-04 23:26:17 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.442: INFO: Container agnhost ready: false, restart count 0 W1104 23:26:28.445350 30387 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:26:28.505: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:26:28.505: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:26:28.508: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000001 /api/v1/nodes/k8s-agentpool1-11489250-vmss000001 2d9f0ab9-c990-46a3-b3bc-7808950553bf 24985 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:1 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000001 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000001] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-3014":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6609":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6697":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-3251":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-4810":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-546":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-6369":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-multivolume-7618":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-2817":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-5016":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-6812":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-855":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumeio-7968":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumemode-6226":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumeio-9022":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumemode-551":"k8s-agentpool1-11489250-vmss000001"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.1.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/1,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.1.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:26:14 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:26:14 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:26:14 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:26:14 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.5,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000001,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5456dda39b3d435cb066867813114df8,SystemUUID:6D0288FF-6F23-3E4D-916E-D89B5AFE73FD,BootID:eeee8a92-9ca0-4335-88b5-e62705f3f746,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[k8s.gcr.io/metrics-server-amd64@sha256:49a9f12f7067d11f42c803dbe61ed2c1299959ad85cb315b25ff7eef8e6b8892 k8s.gcr.io/metrics-server-amd64:v0.2.1],SizeBytes:42541759,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64@sha256:3b36bd80b97c532a774e7f6246797b8575d97037982f353476c703ba6686c75c gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64:1.0],SizeBytes:19227369,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[nginx@sha256:485b610fefec7ff6c463ced9623314a04ed67e3945b9c08d7e53a47f6d108dc7 nginx:1.14-alpine],SizeBytes:16032814,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[kubernetes.io/csi/csi-hostpath-multivolume-6609^594d7086-ff5a-11e9-b5d4-ae4d0534c552 kubernetes.io/csi/csi-hostpath-v0-multivolume-7618^4c1c9491-ff5a-11e9-87d1-000d3ac3032f kubernetes.io/csi/csi-hostpath-v0-multivolume-7618^4d1d360b-ff5a-11e9-87d1-000d3ac3032f],VolumesAttached:[]AttachedVolume{AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-v0-multivolume-7618^4d1d360b-ff5a-11e9-87d1-000d3ac3032f,DevicePath:,},AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-6609^594d7086-ff5a-11e9-b5d4-ae4d0534c552,DevicePath:,},AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-v0-multivolume-7618^4c1c9491-ff5a-11e9-87d1-000d3ac3032f,DevicePath:,},},Config:nil,},} Nov 4 23:26:28.508: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:26:28.522: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000001 Nov 4 23:26:28.532: INFO: var-expansion-ea641585-8af8-45b8-b961-259294d70bbb started at 2019-11-04 23:24:37 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container dapi-container ready: false, restart count 0 Nov 4 23:26:28.532: INFO: pod-configmaps-729a65e5-83ee-41ea-92f1-6fd623aff6b6 started at 2019-11-04 23:23:22 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container createcm-volume-test ready: false, restart count 0 Nov 4 23:26:28.532: INFO: security-context-f086d83f-ee20-4ada-bc68-845bfab92a98 started at 2019-11-04 23:25:00 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container write-pod ready: true, restart count 0 Nov 4 23:26:28.532: INFO: pod-projected-configmaps-a3540205-649a-429f-bd73-07874e3ed68e started at 2019-11-04 23:22:42 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container createcm-volume-test ready: false, restart count 0 Nov 4 23:26:28.532: INFO: pod-configmaps-b12ea30b-ab74-4455-95d7-ad4513d9d70b started at 2019-11-04 23:24:24 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container createcm-volume-test ready: false, restart count 0 Nov 4 23:26:28.532: INFO: affinity-lb-transition-2t8r7 started at 2019-11-04 23:23:21 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container affinity-lb-transition ready: true, restart count 0 Nov 4 23:26:28.532: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-vql5r started at 2019-11-04 23:24:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:26:28.532: INFO: csi-hostpathplugin-jklbt started at 2019-11-04 23:24:09 +0000 UTC (0+2 container statuses recorded) Nov 4 23:26:28.532: INFO: Container driver-registrar ready: true, restart count 0 Nov 4 23:26:28.532: INFO: Container hostpath ready: true, restart count 0 Nov 4 23:26:28.532: INFO: csi-snapshotter-0 started at 2019-11-04 23:24:35 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container csi-snapshotter ready: true, restart count 0 Nov 4 23:26:28.532: INFO: csi-hostpathplugin-0 started at 2019-11-04 23:24:33 +0000 UTC (0+3 container statuses recorded) Nov 4 23:26:28.532: INFO: Container hostpath ready: true, restart count 0 Nov 4 23:26:28.532: INFO: Container liveness-probe ready: true, restart count 0 Nov 4 23:26:28.532: INFO: Container node-driver-registrar ready: true, restart count 0 Nov 4 23:26:28.532: INFO: pod-configmaps-598fa230-9a3a-4cb5-bd57-76b3b2b91977 started at 2019-11-04 23:23:39 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container createcm-volume-test ready: false, restart count 0 Nov 4 23:26:28.532: INFO: security-context-0685e8cf-d994-461c-8dc1-74dfbeb47ea4 started at 2019-11-04 23:25:16 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:26:28.532: INFO: pod-subpath-test-hostpathsymlink-dmwr started at 2019-11-04 23:25:34 +0000 UTC (1+2 container statuses recorded) Nov 4 23:26:28.532: INFO: Init container init-volume-hostpathsymlink-dmwr ready: true, restart count 0 Nov 4 23:26:28.532: INFO: Container test-container-subpath-hostpathsymlink-dmwr ready: true, restart count 1 Nov 4 23:26:28.532: INFO: Container test-container-volume-hostpathsymlink-dmwr ready: true, restart count 0 Nov 4 23:26:28.532: INFO: back-off-cap started at 2019-11-04 23:25:56 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container back-off-cap ready: true, restart count 1 Nov 4 23:26:28.532: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-x5xjq started at 2019-11-04 23:24:21 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:26:28.532: INFO: azure-ip-masq-agent-tdbp9 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:26:28.532: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:24:30 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container csi-attacher ready: true, restart count 0 Nov 4 23:26:28.532: INFO: affinity-lb-transition-kjch6 started at 2019-11-04 23:23:21 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container affinity-lb-transition ready: true, restart count 0 Nov 4 23:26:28.532: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:24:09 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container csi-provisioner ready: true, restart count 0 Nov 4 23:26:28.532: INFO: csi-hostpath-resizer-0 started at 2019-11-04 23:24:35 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container csi-resizer ready: true, restart count 0 Nov 4 23:26:28.532: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:24:09 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container csi-attacher ready: true, restart count 0 Nov 4 23:26:28.532: INFO: pod-subpath-test-emptydir-hr4r started at 2019-11-04 23:25:03 +0000 UTC (1+2 container statuses recorded) Nov 4 23:26:28.532: INFO: Init container init-volume-emptydir-hr4r ready: true, restart count 0 Nov 4 23:26:28.532: INFO: Container test-container-subpath-emptydir-hr4r ready: true, restart count 2 Nov 4 23:26:28.532: INFO: Container test-container-volume-emptydir-hr4r ready: true, restart count 0 Nov 4 23:26:28.532: INFO: nfs-server started at 2019-11-04 23:25:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container nfs-server ready: true, restart count 0 Nov 4 23:26:28.532: INFO: security-context-7d278896-ec9a-4054-b6ca-d39bc766c1f8 started at 2019-11-04 23:25:54 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:26:28.532: INFO: kube-proxy-gkpm5 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:26:28.532: INFO: blobfuse-flexvol-installer-kfjfx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:26:28.532: INFO: keyvault-flexvolume-b7nvg started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:26:28.532: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:24:34 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container csi-provisioner ready: true, restart count 0 Nov 4 23:26:28.532: INFO: metrics-server-58ff8c5ddf-g2hh5 started at 2019-11-04 23:10:24 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container metrics-server ready: true, restart count 0 Nov 4 23:26:28.532: INFO: pod-secrets-14a1e335-0f57-4cb3-a284-5c9a56af4101 started at 2019-11-04 23:21:36 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container creates-volume-test ready: false, restart count 0 Nov 4 23:26:28.532: INFO: security-context-9dc773c7-be6b-4db5-92c1-da4910c11f57 started at 2019-11-04 23:25:12 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.532: INFO: Container write-pod ready: true, restart count 0 Nov 4 23:26:28.533: INFO: security-context-729a5e7d-d220-4487-9b1a-ca0a2cd57e68 started at 2019-11-04 23:25:53 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.533: INFO: Container write-pod ready: false, restart count 0 W1104 23:26:28.535924 30387 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:26:28.577: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:26:28.577: INFO: Logging node info for node k8s-master-11489250-0 Nov 4 23:26:28.580: INFO: Node Info: &Node{ObjectMeta:{k8s-master-11489250-0 /api/v1/nodes/k8s-master-11489250-0 c7e8559d-81e4-4401-b9ca-034b4af0cc76 24684 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_DS2_v2 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:0 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:master kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-master-11489250-0 kubernetes.io/os:linux kubernetes.io/role:master node-role.kubernetes.io/master:] map[node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.0.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachines/k8s-master-11489250-0,Unschedulable:false,Taints:[]Taint{Taint{Key:node-role.kubernetes.io/master,Value:true,Effect:NoSchedule,TimeAdded:<nil>,},},ConfigSource:nil,PodCIDRs:[10.244.0.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{7284359168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{6497927168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:25:32 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:25:32 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:25:32 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:25:32 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.255.5,},NodeAddress{Type:Hostname,Address:k8s-master-11489250-0,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:4b2e1465590843f69a05114d1f1735bd,SystemUUID:885E2CBD-DE7B-DE41-AC15-18FB50C2BFBA,BootID:1ddb5423-95a4-4f58-9386-79ef6bca0f71,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[k8sprowinternal.azurecr.io/azure-cloud-controller-manager@sha256:823d2ccf43dfd34db70b91241aa07ab6579db11ffe31cc07fd0fdd752388497c k8sprowinternal.azurecr.io/azure-cloud-controller-manager:1191484695150333952-3d6cd6ff],SizeBytes:92595467,},ContainerImage{Names:[k8s.gcr.io/kube-addon-manager-amd64@sha256:382c220b3531d9f95bf316a16b7282cc2ef929cd8a89a9dd3f5933edafc41a8e k8s.gcr.io/kube-addon-manager-amd64:v9.0.1],SizeBytes:83076194,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:26:28.580: INFO: Logging kubelet events for node k8s-master-11489250-0 Nov 4 23:26:28.585: INFO: Logging pods the kubelet thinks is on node k8s-master-11489250-0 Nov 4 23:26:28.613: INFO: kube-apiserver-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.613: INFO: Container kube-apiserver ready: true, restart count 0 Nov 4 23:26:28.613: INFO: kube-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.613: INFO: Container kube-controller-manager ready: true, restart count 0 Nov 4 23:26:28.613: INFO: kube-scheduler-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.613: INFO: Container kube-scheduler ready: true, restart count 0 Nov 4 23:26:28.613: INFO: azure-ip-masq-agent-hhzdb started at 2019-11-04 23:10:03 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.613: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:26:28.613: INFO: kube-proxy-knwmt started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.613: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:26:28.613: INFO: cloud-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.613: INFO: Container cloud-controller-manager ready: true, restart count 0 Nov 4 23:26:28.613: INFO: kube-addon-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:26:28.613: INFO: Container kube-addon-manager ready: true, restart count 0 W1104 23:26:28.616712 30387 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:26:28.646: INFO: Latency metrics for node k8s-master-11489250-0 Nov 4 23:26:28.646: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready �[1mSTEP�[0m: Destroying namespace "persistent-local-volumes-test-9210" for this suite.
Find security-context-45392744-e942-455f-9eeb-b4fc225717f7 mentions in log files
go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sPersistentVolumes\-local\s\s\[Volume\stype\:\sblockfswithoutformat\]\sSet\sfsGroup\sfor\slocal\svolume\sshould\sset\ssame\sfsGroup\sfor\stwo\spods\ssimultaneously\s\[Slow\]$'
test/e2e/storage/persistent_volumes-local.go:268 Nov 4 23:21:16.923: Unexpected error: <*errors.errorString | 0xc001c091b0>: { s: "pod \"security-context-723ba789-7857-4662-9f60-27e650c3f4ad\" is not Running: timed out waiting for the condition", } pod "security-context-723ba789-7857-4662-9f60-27e650c3f4ad" is not Running: timed out waiting for the condition occurred test/e2e/storage/persistent_volumes-local.go:775from junit_11.xml
[BeforeEach] [sig-storage] PersistentVolumes-local test/e2e/framework/framework.go:147 �[1mSTEP�[0m: Creating a kubernetes client Nov 4 23:18:03.699: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Building a namespace api object, basename persistent-local-volumes-test �[1mSTEP�[0m: Binding the e2e-test-privileged-psp PodSecurityPolicy to the default service account in persistent-local-volumes-test-1048 �[1mSTEP�[0m: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-storage] PersistentVolumes-local test/e2e/storage/persistent_volumes-local.go:153 [BeforeEach] [Volume type: blockfswithoutformat] test/e2e/storage/persistent_volumes-local.go:189 �[1mSTEP�[0m: Initializing test volumes �[1mSTEP�[0m: Creating block device on node "k8s-agentpool1-11489250-vmss000000" using path "/tmp/local-volume-test-29a06a1c-8ef8-4da1-a278-455db257b41f" Nov 4 23:18:45.898: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c mkdir -p /tmp/local-volume-test-29a06a1c-8ef8-4da1-a278-455db257b41f && dd if=/dev/zero of=/tmp/local-volume-test-29a06a1c-8ef8-4da1-a278-455db257b41f/file bs=4096 count=5120 && losetup -f /tmp/local-volume-test-29a06a1c-8ef8-4da1-a278-455db257b41f/file] Namespace:persistent-local-volumes-test-1048 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-b4fnf ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:18:45.898: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json Nov 4 23:18:46.178: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c E2E_LOOP_DEV=$(losetup | grep /tmp/local-volume-test-29a06a1c-8ef8-4da1-a278-455db257b41f/file | awk '{ print $1 }') 2>&1 > /dev/null && echo ${E2E_LOOP_DEV}] Namespace:persistent-local-volumes-test-1048 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-b4fnf ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:18:46.178: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Creating local PVCs and PVs Nov 4 23:18:46.424: INFO: Creating a PV followed by a PVC Nov 4 23:18:46.440: INFO: Waiting for PV local-pvrs6d7 to bind to PVC pvc-sgsgp Nov 4 23:18:46.440: INFO: Waiting up to 3m0s for PersistentVolumeClaims [pvc-sgsgp] to have phase Bound Nov 4 23:18:46.446: INFO: PersistentVolumeClaim pvc-sgsgp found but phase is Pending instead of Bound. Nov 4 23:18:48.466: INFO: PersistentVolumeClaim pvc-sgsgp found and phase=Bound (2.025778349s) Nov 4 23:18:48.466: INFO: Waiting up to 3m0s for PersistentVolume local-pvrs6d7 to have phase Bound Nov 4 23:18:48.477: INFO: PersistentVolume local-pvrs6d7 found and phase=Bound (11.474495ms) [BeforeEach] Set fsGroup for local volume test/e2e/storage/persistent_volumes-local.go:255 [It] should set same fsGroup for two pods simultaneously [Slow] test/e2e/storage/persistent_volumes-local.go:268 �[1mSTEP�[0m: Create first pod and check fsGroup is set �[1mSTEP�[0m: Creating a pod Nov 4 23:19:16.524: INFO: Running '/usr/local/bin/kubectl --server=https://kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886.westus2.cloudapp.azure.com --kubeconfig=/workspace/aks722706072/kubeconfig/kubeconfig.westus2.json exec security-context-d384a8cb-384a-4820-a7d1-ec1418724c64 --namespace=persistent-local-volumes-test-1048 -- stat -c %g /mnt/volume1' Nov 4 23:19:16.907: INFO: stderr: "" Nov 4 23:19:16.907: INFO: stdout: "1234\n" �[1mSTEP�[0m: Create second pod with same fsGroup and check fsGroup is correct �[1mSTEP�[0m: Creating a pod Nov 4 23:21:16.923: FAIL: Unexpected error: <*errors.errorString | 0xc001c091b0>: { s: "pod \"security-context-723ba789-7857-4662-9f60-27e650c3f4ad\" is not Running: timed out waiting for the condition", } pod "security-context-723ba789-7857-4662-9f60-27e650c3f4ad" is not Running: timed out waiting for the condition occurred [AfterEach] [Volume type: blockfswithoutformat] test/e2e/storage/persistent_volumes-local.go:198 �[1mSTEP�[0m: Cleaning up PVC and PV Nov 4 23:21:16.923: INFO: Deleting PersistentVolumeClaim "pvc-sgsgp" Nov 4 23:21:16.927: INFO: Deleting PersistentVolume "local-pvrs6d7" Nov 4 23:21:16.933: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c E2E_LOOP_DEV=$(losetup | grep /tmp/local-volume-test-29a06a1c-8ef8-4da1-a278-455db257b41f/file | awk '{ print $1 }') 2>&1 > /dev/null && echo ${E2E_LOOP_DEV}] Namespace:persistent-local-volumes-test-1048 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-b4fnf ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:21:16.933: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Tear down block device "/dev/loop5" on node "k8s-agentpool1-11489250-vmss000000" at path /tmp/local-volume-test-29a06a1c-8ef8-4da1-a278-455db257b41f/file Nov 4 23:21:17.187: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c losetup -d /dev/loop5] Namespace:persistent-local-volumes-test-1048 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-b4fnf ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:21:17.187: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Removing the test directory /tmp/local-volume-test-29a06a1c-8ef8-4da1-a278-455db257b41f Nov 4 23:21:17.390: INFO: ExecWithOptions {Command:[nsenter --mount=/rootfs/proc/1/ns/mnt -- sh -c rm -r /tmp/local-volume-test-29a06a1c-8ef8-4da1-a278-455db257b41f] Namespace:persistent-local-volumes-test-1048 PodName:hostexec-k8s-agentpool1-11489250-vmss000000-b4fnf ContainerName:agnhost Stdin:<nil> CaptureStdout:true CaptureStderr:true PreserveWhitespace:true} Nov 4 23:21:17.390: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json [AfterEach] [sig-storage] PersistentVolumes-local test/e2e/framework/framework.go:148 �[1mSTEP�[0m: Collecting events from namespace "persistent-local-volumes-test-1048". �[1mSTEP�[0m: Found 11 events. Nov 4 23:21:17.616: INFO: At 0001-01-01 00:00:00 +0000 UTC - event for security-context-723ba789-7857-4662-9f60-27e650c3f4ad: {default-scheduler } Scheduled: Successfully assigned persistent-local-volumes-test-1048/security-context-723ba789-7857-4662-9f60-27e650c3f4ad to k8s-agentpool1-11489250-vmss000000 Nov 4 23:21:17.616: INFO: At 0001-01-01 00:00:00 +0000 UTC - event for security-context-d384a8cb-384a-4820-a7d1-ec1418724c64: {default-scheduler } Scheduled: Successfully assigned persistent-local-volumes-test-1048/security-context-d384a8cb-384a-4820-a7d1-ec1418724c64 to k8s-agentpool1-11489250-vmss000000 Nov 4 23:21:17.616: INFO: At 2019-11-04 23:18:08 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-b4fnf: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "gcr.io/kubernetes-e2e-test-images/agnhost:2.6" Nov 4 23:21:17.616: INFO: At 2019-11-04 23:18:13 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-b4fnf: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "gcr.io/kubernetes-e2e-test-images/agnhost:2.6" Nov 4 23:21:17.616: INFO: At 2019-11-04 23:18:14 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-b4fnf: {kubelet k8s-agentpool1-11489250-vmss000000} Created: Created container agnhost Nov 4 23:21:17.616: INFO: At 2019-11-04 23:18:16 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-b4fnf: {kubelet k8s-agentpool1-11489250-vmss000000} Started: Started container agnhost Nov 4 23:21:17.616: INFO: At 2019-11-04 23:18:54 +0000 UTC - event for security-context-d384a8cb-384a-4820-a7d1-ec1418724c64: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "docker.io/library/busybox:1.29" Nov 4 23:21:17.616: INFO: At 2019-11-04 23:18:56 +0000 UTC - event for security-context-d384a8cb-384a-4820-a7d1-ec1418724c64: {kubelet k8s-agentpool1-11489250-vmss000000} Pulled: Successfully pulled image "docker.io/library/busybox:1.29" Nov 4 23:21:17.616: INFO: At 2019-11-04 23:18:56 +0000 UTC - event for security-context-d384a8cb-384a-4820-a7d1-ec1418724c64: {kubelet k8s-agentpool1-11489250-vmss000000} Created: Created container write-pod Nov 4 23:21:17.616: INFO: At 2019-11-04 23:18:57 +0000 UTC - event for security-context-d384a8cb-384a-4820-a7d1-ec1418724c64: {kubelet k8s-agentpool1-11489250-vmss000000} Started: Started container write-pod Nov 4 23:21:17.616: INFO: At 2019-11-04 23:19:20 +0000 UTC - event for security-context-723ba789-7857-4662-9f60-27e650c3f4ad: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "docker.io/library/busybox:1.29" Nov 4 23:21:17.619: INFO: POD NODE PHASE GRACE CONDITIONS Nov 4 23:21:17.619: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-b4fnf k8s-agentpool1-11489250-vmss000000 Running [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:18:03 +0000 UTC } {Ready True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:18:17 +0000 UTC } {ContainersReady True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:18:17 +0000 UTC } {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:18:03 +0000 UTC }] Nov 4 23:21:17.619: INFO: security-context-723ba789-7857-4662-9f60-27e650c3f4ad k8s-agentpool1-11489250-vmss000000 Pending [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:19:16 +0000 UTC } {Ready False 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:19:16 +0000 UTC ContainersNotReady containers with unready status: [write-pod]} {ContainersReady False 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:19:16 +0000 UTC ContainersNotReady containers with unready status: [write-pod]} {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:19:16 +0000 UTC }] Nov 4 23:21:17.619: INFO: security-context-d384a8cb-384a-4820-a7d1-ec1418724c64 k8s-agentpool1-11489250-vmss000000 Running [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:18:49 +0000 UTC } {Ready True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:18:57 +0000 UTC } {ContainersReady True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:18:57 +0000 UTC } {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:18:48 +0000 UTC }] Nov 4 23:21:17.619: INFO: Nov 4 23:21:17.621: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:21:17.624: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000000 /api/v1/nodes/k8s-agentpool1-11489250-vmss000000 4d779b63-b743-40ed-9ec9-08ee7dd28ab4 17753 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 attach-limit-csi-csi-mock-volumes-5459:csi-mock-volumes-5459 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000000 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000000] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-5778":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3215":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3527":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-7631":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-2219":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-4772":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-7421":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-volumemode-5039":"k8s-agentpool1-11489250-vmss000000"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.2.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/0,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.2.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:20:43 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:20:43 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:20:43 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:20:43 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.4,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000000,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5eb5b251426b48e38a0513ab8a4e5fc0,SystemUUID:CB87A4F7-2661-444E-8AB3-C1A284BA9714,BootID:42192202-1583-496a-b5ff-b9c6d63be18f,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[k8s.gcr.io/kubernetes-dashboard-amd64@sha256:0ae6b69432e78069c5ce2bcde0fe409c5c4d6f0f4d9cd50a17974fea38898747 k8s.gcr.io/kubernetes-dashboard-amd64:v1.10.1],SizeBytes:121711221,},ContainerImage{Names:[gcr.io/kubernetes-helm/tiller@sha256:f6d8f4ab9ba993b5f5b60a6edafe86352eabe474ffeb84cb6c79b8866dce45d1 gcr.io/kubernetes-helm/tiller:v2.11.0],SizeBytes:71821984,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:0efcb424f1dde9b9fb11a1a14f2e48ab47e1c3f08bc3a929990dcfcb1f7ab34f quay.io/k8scsi/csi-provisioner:v1.4.0-rc1],SizeBytes:54431016,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:0aba670b4d9d6b2e720bbf575d733156c676b693ca26501235444490300db838 quay.io/k8scsi/csi-attacher:v1.1.0],SizeBytes:42839085,},ContainerImage{Names:[k8s.gcr.io/coredns@sha256:e83beb5e43f8513fa735e77ffc5859640baea30a882a11cc75c4c3244a737d3c k8s.gcr.io/coredns:1.5.0],SizeBytes:42488424,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[kubernetes.io/csi/csi-hostpath-multivolume-5778^67eb6fdd-ff59-11e9-89ea-66927135cf58 kubernetes.io/csi/csi-hostpath-multivolume-5778^68ea5bb9-ff59-11e9-89ea-66927135cf58 kubernetes.io/csi/csi-hostpath-v0-provisioning-7421^69e65d2e-ff59-11e9-af32-000d3ac3012d],VolumesAttached:[]AttachedVolume{AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-5778^68ea5bb9-ff59-11e9-89ea-66927135cf58,DevicePath:,},AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-v0-provisioning-7421^69e65d2e-ff59-11e9-af32-000d3ac3012d,DevicePath:,},AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-5778^67eb6fdd-ff59-11e9-89ea-66927135cf58,DevicePath:,},},Config:nil,},} Nov 4 23:21:17.624: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:21:17.628: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000000 Nov 4 23:21:17.668: INFO: blobfuse-flexvol-installer-8shkx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:21:17.668: INFO: pod-subpath-test-local-preprovisionedpv-jgwl started at 2019-11-04 23:19:15 +0000 UTC (1+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Init container init-volume-local-preprovisionedpv-jgwl ready: false, restart count 0 Nov 4 23:21:17.668: INFO: Container test-container-subpath-local-preprovisionedpv-jgwl ready: false, restart count 0 Nov 4 23:21:17.668: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:18:08 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container csi-provisioner ready: true, restart count 0 Nov 4 23:21:17.668: INFO: keyvault-flexvolume-xzbqt started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:21:17.668: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-rl4t5 started at 2019-11-04 23:18:58 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:21:17.668: INFO: csi-hostpathplugin-m4blc started at 2019-11-04 23:19:31 +0000 UTC (0+2 container statuses recorded) Nov 4 23:21:17.668: INFO: Container driver-registrar ready: false, restart count 0 Nov 4 23:21:17.668: INFO: Container hostpath ready: false, restart count 0 Nov 4 23:21:17.668: INFO: affinity-lb-esipp-g5zr4 started at 2019-11-04 23:18:21 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container affinity-lb-esipp ready: true, restart count 0 Nov 4 23:21:17.668: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:19:31 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container csi-attacher ready: false, restart count 0 Nov 4 23:21:17.668: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:20:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container csi-attacher ready: false, restart count 0 Nov 4 23:21:17.668: INFO: pod-subpath-test-local-preprovisionedpv-hss8 started at 2019-11-04 23:17:46 +0000 UTC (1+2 container statuses recorded) Nov 4 23:21:17.668: INFO: Init container init-volume-local-preprovisionedpv-hss8 ready: true, restart count 0 Nov 4 23:21:17.668: INFO: Container test-container-subpath-local-preprovisionedpv-hss8 ready: true, restart count 2 Nov 4 23:21:17.668: INFO: Container test-container-volume-local-preprovisionedpv-hss8 ready: true, restart count 0 Nov 4 23:21:17.668: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-p7vrz started at 2019-11-04 23:18:38 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:21:17.668: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-sjdmv started at 2019-11-04 23:18:39 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:21:17.668: INFO: csi-snapshotter-0 started at 2019-11-04 23:20:45 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container csi-snapshotter ready: false, restart count 0 Nov 4 23:21:17.668: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-k2s7p started at 2019-11-04 23:19:25 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:21:17.668: INFO: azure-ip-masq-agent-nk6ts started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:21:17.668: INFO: coredns-87f5d796-n67d4 started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container coredns ready: true, restart count 0 Nov 4 23:21:17.668: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-kl9c5 started at 2019-11-04 23:17:34 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:21:17.668: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-tjwzp started at 2019-11-04 23:19:34 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:21:17.668: INFO: local-io-client started at 2019-11-04 23:19:02 +0000 UTC (1+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Init container local-io-init ready: false, restart count 0 Nov 4 23:21:17.668: INFO: Container local-io-client ready: false, restart count 0 Nov 4 23:21:17.668: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-djj5h started at 2019-11-04 23:19:18 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:21:17.668: INFO: csi-hostpath-resizer-0 started at 2019-11-04 23:18:05 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container csi-resizer ready: true, restart count 0 Nov 4 23:21:17.668: INFO: pod-subpath-test-csi-hostpath-v0-dynamicpv-l2cl started at 2019-11-04 23:18:31 +0000 UTC (1+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Init container init-volume-csi-hostpath-v0-dynamicpv-l2cl ready: true, restart count 0 Nov 4 23:21:17.668: INFO: Container test-container-subpath-csi-hostpath-v0-dynamicpv-l2cl ready: false, restart count 0 Nov 4 23:21:17.668: INFO: csi-hostpath-resizer-0 started at 2019-11-04 23:20:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container csi-resizer ready: false, restart count 0 Nov 4 23:21:17.668: INFO: kube-proxy-4q46s started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:21:17.668: INFO: security-context-d384a8cb-384a-4820-a7d1-ec1418724c64 started at 2019-11-04 23:18:49 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container write-pod ready: true, restart count 0 Nov 4 23:21:17.668: INFO: csi-mockplugin-0 started at 2019-11-04 23:18:51 +0000 UTC (0+3 container statuses recorded) Nov 4 23:21:17.668: INFO: Container csi-provisioner ready: false, restart count 0 Nov 4 23:21:17.668: INFO: Container driver-registrar ready: false, restart count 0 Nov 4 23:21:17.668: INFO: Container mock ready: false, restart count 0 Nov 4 23:21:17.668: INFO: tiller-deploy-7559b6b885-5lm2k started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container tiller ready: true, restart count 0 Nov 4 23:21:17.668: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-qw76m started at 2019-11-04 23:18:03 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:21:17.668: INFO: pod-subpath-test-local-preprovisionedpv-hn6q started at 2019-11-04 23:19:15 +0000 UTC (1+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Init container init-volume-local-preprovisionedpv-hn6q ready: false, restart count 0 Nov 4 23:21:17.668: INFO: Container test-container-subpath-local-preprovisionedpv-hn6q ready: false, restart count 0 Nov 4 23:21:17.668: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:18:05 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container csi-provisioner ready: true, restart count 0 Nov 4 23:21:17.668: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:18:08 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container csi-attacher ready: true, restart count 0 Nov 4 23:21:17.668: INFO: netserver-0 started at 2019-11-04 23:19:21 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container webserver ready: false, restart count 0 Nov 4 23:21:17.668: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-b4fnf started at 2019-11-04 23:18:03 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:21:17.668: INFO: csi-mockplugin-attacher-0 started at 2019-11-04 23:18:51 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container csi-attacher ready: true, restart count 0 Nov 4 23:21:17.668: INFO: csi-snapshotter-0 started at 2019-11-04 23:18:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container csi-snapshotter ready: true, restart count 0 Nov 4 23:21:17.668: INFO: csi-hostpathplugin-qq6dr started at 2019-11-04 23:18:09 +0000 UTC (0+2 container statuses recorded) Nov 4 23:21:17.668: INFO: Container driver-registrar ready: true, restart count 0 Nov 4 23:21:17.668: INFO: Container hostpath ready: true, restart count 0 Nov 4 23:21:17.668: INFO: security-context-65df58ae-3532-4b6e-82fa-94442128a5f9 started at 2019-11-04 23:19:19 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:21:17.668: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-6gzjh started at 2019-11-04 23:19:42 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:21:17.668: INFO: kubernetes-dashboard-65966766b9-lvtsz started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container kubernetes-dashboard ready: true, restart count 0 Nov 4 23:21:17.668: INFO: pod-subpath-test-hostpath-r4hn started at 2019-11-04 23:19:09 +0000 UTC (1+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Init container init-volume-hostpath-r4hn ready: false, restart count 0 Nov 4 23:21:17.668: INFO: Container test-container-subpath-hostpath-r4hn ready: false, restart count 0 Nov 4 23:21:17.668: INFO: csi-hostpathplugin-0 started at 2019-11-04 23:20:44 +0000 UTC (0+3 container statuses recorded) Nov 4 23:21:17.668: INFO: Container hostpath ready: false, restart count 0 Nov 4 23:21:17.668: INFO: Container liveness-probe ready: false, restart count 0 Nov 4 23:21:17.668: INFO: Container node-driver-registrar ready: false, restart count 0 Nov 4 23:21:17.668: INFO: security-context-723ba789-7857-4662-9f60-27e650c3f4ad started at 2019-11-04 23:19:16 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:21:17.668: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:18:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container csi-attacher ready: true, restart count 0 Nov 4 23:21:17.668: INFO: csi-hostpathplugin-0 started at 2019-11-04 23:18:05 +0000 UTC (0+3 container statuses recorded) Nov 4 23:21:17.668: INFO: Container hostpath ready: true, restart count 0 Nov 4 23:21:17.668: INFO: Container liveness-probe ready: true, restart count 0 Nov 4 23:21:17.668: INFO: Container node-driver-registrar ready: true, restart count 0 Nov 4 23:21:17.668: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:19:31 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container csi-provisioner ready: false, restart count 0 Nov 4 23:21:17.668: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:20:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.668: INFO: Container csi-provisioner ready: false, restart count 0 W1104 23:21:17.671123 30439 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:21:17.744: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:21:17.744: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:21:17.747: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000001 /api/v1/nodes/k8s-agentpool1-11489250-vmss000001 2d9f0ab9-c990-46a3-b3bc-7808950553bf 18057 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:1 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000001 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000001] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-3014":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6697":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-3251":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-4810":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-6369":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-2817":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-5016":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-6812":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-855":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumeio-7968":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumemode-6226":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumeio-9022":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumemode-551":"k8s-agentpool1-11489250-vmss000001"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.1.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/1,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.1.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:20:53 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:20:53 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:20:53 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:20:53 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.5,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000001,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5456dda39b3d435cb066867813114df8,SystemUUID:6D0288FF-6F23-3E4D-916E-D89B5AFE73FD,BootID:eeee8a92-9ca0-4335-88b5-e62705f3f746,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[k8s.gcr.io/metrics-server-amd64@sha256:49a9f12f7067d11f42c803dbe61ed2c1299959ad85cb315b25ff7eef8e6b8892 k8s.gcr.io/metrics-server-amd64:v0.2.1],SizeBytes:42541759,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[nginx@sha256:485b610fefec7ff6c463ced9623314a04ed67e3945b9c08d7e53a47f6d108dc7 nginx:1.14-alpine],SizeBytes:16032814,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[kubernetes.io/csi/csi-hostpath-v0-provisioning-855^892064a9-ff59-11e9-b790-000d3ac3032f],VolumesAttached:[]AttachedVolume{AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-v0-provisioning-855^892064a9-ff59-11e9-b790-000d3ac3032f,DevicePath:,},},Config:nil,},} Nov 4 23:21:17.747: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:21:17.752: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000001 Nov 4 23:21:17.760: INFO: pod-secrets-5fc93528-3b4f-4cba-9ecc-b246ac7f9eda started at 2019-11-04 23:16:58 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.760: INFO: Container creates-volume-test ready: false, restart count 0 Nov 4 23:21:17.760: INFO: azure-ip-masq-agent-tdbp9 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.760: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:21:17.760: INFO: emptydir-io-client started at 2019-11-04 23:20:45 +0000 UTC (1+1 container statuses recorded) Nov 4 23:21:17.760: INFO: Init container emptydir-io-init ready: true, restart count 0 Nov 4 23:21:17.760: INFO: Container emptydir-io-client ready: true, restart count 0 Nov 4 23:21:17.760: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:19:14 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.760: INFO: Container csi-attacher ready: true, restart count 0 Nov 4 23:21:17.760: INFO: forbid-1572909600-qzhfp started at 2019-11-04 23:20:05 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.760: INFO: Container c ready: true, restart count 0 Nov 4 23:21:17.760: INFO: csi-hostpathplugin-rjbfr started at 2019-11-04 23:19:14 +0000 UTC (0+2 container statuses recorded) Nov 4 23:21:17.760: INFO: Container driver-registrar ready: true, restart count 0 Nov 4 23:21:17.760: INFO: Container hostpath ready: true, restart count 0 Nov 4 23:21:17.760: INFO: affinity-lb-esipp-wxt9l started at 2019-11-04 23:18:21 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.760: INFO: Container affinity-lb-esipp ready: true, restart count 0 Nov 4 23:21:17.760: INFO: security-context-f70217d9-b9bb-44e7-8ff8-32bb061080aa started at 2019-11-04 23:20:00 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.760: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:21:17.760: INFO: keyvault-flexvolume-b7nvg started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.760: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:21:17.760: INFO: kube-proxy-gkpm5 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.760: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:21:17.760: INFO: blobfuse-flexvol-installer-kfjfx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.760: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:21:17.760: INFO: metrics-server-58ff8c5ddf-g2hh5 started at 2019-11-04 23:10:24 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.760: INFO: Container metrics-server ready: true, restart count 0 Nov 4 23:21:17.760: INFO: pod-subpath-test-local-preprovisionedpv-zdjw started at 2019-11-04 23:20:00 +0000 UTC (1+2 container statuses recorded) Nov 4 23:21:17.760: INFO: Init container init-volume-local-preprovisionedpv-zdjw ready: true, restart count 0 Nov 4 23:21:17.760: INFO: Container test-container-subpath-local-preprovisionedpv-zdjw ready: true, restart count 3 Nov 4 23:21:17.760: INFO: Container test-container-volume-local-preprovisionedpv-zdjw ready: true, restart count 0 Nov 4 23:21:17.760: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-299qv started at 2019-11-04 23:18:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.760: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:21:17.760: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-j9nqg started at 2019-11-04 23:19:36 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.760: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:21:17.760: INFO: netserver-1 started at 2019-11-04 23:19:21 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.760: INFO: Container webserver ready: true, restart count 0 Nov 4 23:21:17.760: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-nz55q started at 2019-11-04 23:21:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.760: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:21:17.760: INFO: pod-subpath-test-local-preprovisionedpv-slq6 started at 2019-11-04 23:19:01 +0000 UTC (1+2 container statuses recorded) Nov 4 23:21:17.760: INFO: Init container init-volume-local-preprovisionedpv-slq6 ready: true, restart count 0 Nov 4 23:21:17.760: INFO: Container test-container-subpath-local-preprovisionedpv-slq6 ready: false, restart count 3 Nov 4 23:21:17.760: INFO: Container test-container-volume-local-preprovisionedpv-slq6 ready: false, restart count 0 Nov 4 23:21:17.760: INFO: hostexec-k8s-agentpool1-11489250-vmss000001-xrvwm started at 2019-11-04 23:19:38 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.760: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:21:17.760: INFO: pod-subpath-test-csi-hostpath-v0-dynamicpv-9j7n started at 2019-11-04 23:19:24 +0000 UTC (1+2 container statuses recorded) Nov 4 23:21:17.760: INFO: Init container init-volume-csi-hostpath-v0-dynamicpv-9j7n ready: true, restart count 0 Nov 4 23:21:17.760: INFO: Container test-container-subpath-csi-hostpath-v0-dynamicpv-9j7n ready: true, restart count 3 Nov 4 23:21:17.760: INFO: Container test-container-volume-csi-hostpath-v0-dynamicpv-9j7n ready: true, restart count 0 Nov 4 23:21:17.760: INFO: affinity-lb-esipp-rpmrz started at 2019-11-04 23:18:21 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.760: INFO: Container affinity-lb-esipp ready: true, restart count 0 Nov 4 23:21:17.760: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:19:14 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.760: INFO: Container csi-provisioner ready: true, restart count 0 Nov 4 23:21:17.760: INFO: pod-back-off-image started at 2019-11-04 23:18:10 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:17.760: INFO: Container back-off ready: false, restart count 4 W1104 23:21:17.763269 30439 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:21:18.124: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:21:18.124: INFO: Logging node info for node k8s-master-11489250-0 Nov 4 23:21:18.127: INFO: Node Info: &Node{ObjectMeta:{k8s-master-11489250-0 /api/v1/nodes/k8s-master-11489250-0 c7e8559d-81e4-4401-b9ca-034b4af0cc76 17671 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_DS2_v2 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:0 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:master kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-master-11489250-0 kubernetes.io/os:linux kubernetes.io/role:master node-role.kubernetes.io/master:] map[node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.0.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachines/k8s-master-11489250-0,Unschedulable:false,Taints:[]Taint{Taint{Key:node-role.kubernetes.io/master,Value:true,Effect:NoSchedule,TimeAdded:<nil>,},},ConfigSource:nil,PodCIDRs:[10.244.0.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{7284359168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{6497927168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:20:32 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:20:32 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:20:32 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:20:32 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.255.5,},NodeAddress{Type:Hostname,Address:k8s-master-11489250-0,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:4b2e1465590843f69a05114d1f1735bd,SystemUUID:885E2CBD-DE7B-DE41-AC15-18FB50C2BFBA,BootID:1ddb5423-95a4-4f58-9386-79ef6bca0f71,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[k8sprowinternal.azurecr.io/azure-cloud-controller-manager@sha256:823d2ccf43dfd34db70b91241aa07ab6579db11ffe31cc07fd0fdd752388497c k8sprowinternal.azurecr.io/azure-cloud-controller-manager:1191484695150333952-3d6cd6ff],SizeBytes:92595467,},ContainerImage{Names:[k8s.gcr.io/kube-addon-manager-amd64@sha256:382c220b3531d9f95bf316a16b7282cc2ef929cd8a89a9dd3f5933edafc41a8e k8s.gcr.io/kube-addon-manager-amd64:v9.0.1],SizeBytes:83076194,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:21:18.127: INFO: Logging kubelet events for node k8s-master-11489250-0 Nov 4 23:21:18.131: INFO: Logging pods the kubelet thinks is on node k8s-master-11489250-0 Nov 4 23:21:18.156: INFO: kube-apiserver-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:18.156: INFO: Container kube-apiserver ready: true, restart count 0 Nov 4 23:21:18.156: INFO: kube-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:18.156: INFO: Container kube-controller-manager ready: true, restart count 0 Nov 4 23:21:18.156: INFO: kube-scheduler-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:18.156: INFO: Container kube-scheduler ready: true, restart count 0 Nov 4 23:21:18.156: INFO: azure-ip-masq-agent-hhzdb started at 2019-11-04 23:10:03 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:18.156: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:21:18.156: INFO: kube-proxy-knwmt started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:18.156: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:21:18.156: INFO: cloud-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:18.156: INFO: Container cloud-controller-manager ready: true, restart count 0 Nov 4 23:21:18.156: INFO: kube-addon-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:21:18.156: INFO: Container kube-addon-manager ready: true, restart count 0 W1104 23:21:18.160863 30439 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:21:18.187: INFO: Latency metrics for node k8s-master-11489250-0 Nov 4 23:21:18.187: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready �[1mSTEP�[0m: Destroying namespace "persistent-local-volumes-test-1048" for this suite.
Find security-context-723ba789-7857-4662-9f60-27e650c3f4ad mentions in log files
go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sPersistentVolumes\-local\s\s\[Volume\stype\:\sdir\-link\]\sSet\sfsGroup\sfor\slocal\svolume\sshould\sset\ssame\sfsGroup\sfor\stwo\spods\ssimultaneously\s\[Slow\]$'
test/e2e/storage/persistent_volumes-local.go:189 Nov 4 23:29:14.926: Unexpected error: <*errors.errorString | 0xc0000d5090>: { s: "timed out waiting for the condition", } timed out waiting for the condition occurred test/e2e/storage/utils/host_exec.go:104from junit_20.xml
[BeforeEach] [sig-storage] PersistentVolumes-local test/e2e/framework/framework.go:147 �[1mSTEP�[0m: Creating a kubernetes client Nov 4 23:24:14.701: INFO: >>> kubeConfig: /workspace/aks722706072/kubeconfig/kubeconfig.westus2.json �[1mSTEP�[0m: Building a namespace api object, basename persistent-local-volumes-test �[1mSTEP�[0m: Binding the e2e-test-privileged-psp PodSecurityPolicy to the default service account in persistent-local-volumes-test-7376 �[1mSTEP�[0m: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-storage] PersistentVolumes-local test/e2e/storage/persistent_volumes-local.go:153 [BeforeEach] [Volume type: dir-link] test/e2e/storage/persistent_volumes-local.go:189 �[1mSTEP�[0m: Initializing test volumes Nov 4 23:29:14.926: FAIL: Unexpected error: <*errors.errorString | 0xc0000d5090>: { s: "timed out waiting for the condition", } timed out waiting for the condition occurred [AfterEach] [Volume type: dir-link] test/e2e/storage/persistent_volumes-local.go:198 �[1mSTEP�[0m: Cleaning up PVC and PV [AfterEach] [sig-storage] PersistentVolumes-local test/e2e/framework/framework.go:148 �[1mSTEP�[0m: Collecting events from namespace "persistent-local-volumes-test-7376". �[1mSTEP�[0m: Found 1 events. Nov 4 23:29:14.929: INFO: At 2019-11-04 23:24:43 +0000 UTC - event for hostexec-k8s-agentpool1-11489250-vmss000000-pgtp8: {kubelet k8s-agentpool1-11489250-vmss000000} Pulling: Pulling image "gcr.io/kubernetes-e2e-test-images/agnhost:2.6" Nov 4 23:29:14.931: INFO: POD NODE PHASE GRACE CONDITIONS Nov 4 23:29:14.931: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-pgtp8 k8s-agentpool1-11489250-vmss000000 Pending [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:14 +0000 UTC } {Ready False 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:14 +0000 UTC ContainersNotReady containers with unready status: [agnhost]} {ContainersReady False 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:14 +0000 UTC ContainersNotReady containers with unready status: [agnhost]} {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2019-11-04 23:24:14 +0000 UTC }] Nov 4 23:29:14.931: INFO: Nov 4 23:29:14.934: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:14.938: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000000 /api/v1/nodes/k8s-agentpool1-11489250-vmss000000 4d779b63-b743-40ed-9ec9-08ee7dd28ab4 26295 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000000 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000000] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-1271":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-multivolume-5778":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3215":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-3527":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-4405":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-provisioning-7631":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-multivolume-2637":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-2219":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-4772":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-v0-provisioning-7421":"k8s-agentpool1-11489250-vmss000000","csi-hostpath-volumemode-5039":"k8s-agentpool1-11489250-vmss000000","csi-mock-csi-mock-volumes-5459":"csi-mock-csi-mock-volumes-5459"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.2.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/0,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.2.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:34 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:28:15 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.4,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000000,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5eb5b251426b48e38a0513ab8a4e5fc0,SystemUUID:CB87A4F7-2661-444E-8AB3-C1A284BA9714,BootID:42192202-1583-496a-b5ff-b9c6d63be18f,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[k8s.gcr.io/kubernetes-dashboard-amd64@sha256:0ae6b69432e78069c5ce2bcde0fe409c5c4d6f0f4d9cd50a17974fea38898747 k8s.gcr.io/kubernetes-dashboard-amd64:v1.10.1],SizeBytes:121711221,},ContainerImage{Names:[gcr.io/kubernetes-helm/tiller@sha256:f6d8f4ab9ba993b5f5b60a6edafe86352eabe474ffeb84cb6c79b8866dce45d1 gcr.io/kubernetes-helm/tiller:v2.11.0],SizeBytes:71821984,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:0efcb424f1dde9b9fb11a1a14f2e48ab47e1c3f08bc3a929990dcfcb1f7ab34f quay.io/k8scsi/csi-provisioner:v1.4.0-rc1],SizeBytes:54431016,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:0aba670b4d9d6b2e720bbf575d733156c676b693ca26501235444490300db838 quay.io/k8scsi/csi-attacher:v1.1.0],SizeBytes:42839085,},ContainerImage{Names:[k8s.gcr.io/coredns@sha256:e83beb5e43f8513fa735e77ffc5859640baea30a882a11cc75c4c3244a737d3c k8s.gcr.io/coredns:1.5.0],SizeBytes:42488424,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[quay.io/k8scsi/mock-driver@sha256:e0eed916b7d970bad2b7d9875f9ad16932f987f0f3d91ec5d86da68b0b5cc9d1 quay.io/k8scsi/mock-driver:v2.1.0],SizeBytes:16226335,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:13daf82fb99e951a4bff8ae5fc7c17c3a8fe7130be6400990d8f6076c32d4599 quay.io/k8scsi/csi-node-driver-registrar:v1.1.0],SizeBytes:15815995,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/google-containers/startup-script@sha256:be96df6845a2af0eb61b17817ed085ce41048e4044c541da7580570b61beff3e gcr.io/google-containers/startup-script:v1],SizeBytes:12528443,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause@sha256:f78411e19d84a252e53bff71a4407a5686c46983a2c2eeed83929b888179acea k8s.gcr.io/pause-amd64:3.1 k8s.gcr.io/pause:3.1],SizeBytes:742472,},},VolumesInUse:[kubernetes.io/csi/csi-hostpath-multivolume-1271^1f0de69b-ff5a-11e9-a283-9eaad548a827 kubernetes.io/csi/csi-hostpath-multivolume-1271^205df607-ff5a-11e9-a283-9eaad548a827],VolumesAttached:[]AttachedVolume{AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-1271^1f0de69b-ff5a-11e9-a283-9eaad548a827,DevicePath:,},AttachedVolume{Name:kubernetes.io/csi/csi-hostpath-multivolume-1271^205df607-ff5a-11e9-a283-9eaad548a827,DevicePath:,},},Config:nil,},} Nov 4 23:29:14.938: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:14.943: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:14.983: INFO: blobfuse-flexvol-installer-8shkx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:29:14.983: INFO: csi-snapshotter-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container csi-snapshotter ready: true, restart count 0 Nov 4 23:29:14.983: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-94ngc started at 2019-11-04 23:24:49 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:14.983: INFO: keyvault-flexvolume-xzbqt started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:29:14.983: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-cvktv started at 2019-11-04 23:24:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:14.983: INFO: csi-hostpathplugin-0 started at 2019-11-04 23:23:00 +0000 UTC (0+3 container statuses recorded) Nov 4 23:29:14.983: INFO: Container hostpath ready: true, restart count 0 Nov 4 23:29:14.983: INFO: Container liveness-probe ready: true, restart count 0 Nov 4 23:29:14.983: INFO: Container node-driver-registrar ready: true, restart count 0 Nov 4 23:29:14.983: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-jv6k6 started at 2019-11-04 23:23:55 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:29:14.983: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-gk47b started at 2019-11-04 23:24:44 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:14.983: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-m9tnz started at 2019-11-04 23:26:17 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:14.983: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:26:41 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container csi-attacher ready: false, restart count 0 Nov 4 23:29:14.983: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-rt52w started at 2019-11-04 23:26:46 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:14.983: INFO: hostpath-symlink-prep-provisioning-4995 started at 2019-11-04 23:24:58 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container init-volume-provisioning-4995 ready: false, restart count 0 Nov 4 23:29:14.983: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container csi-provisioner ready: true, restart count 0 Nov 4 23:29:14.983: INFO: csi-hostpathplugin-p7nrj started at 2019-11-04 23:26:42 +0000 UTC (0+2 container statuses recorded) Nov 4 23:29:14.983: INFO: Container driver-registrar ready: false, restart count 0 Nov 4 23:29:14.983: INFO: Container hostpath ready: false, restart count 0 Nov 4 23:29:14.983: INFO: azure-ip-masq-agent-nk6ts started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:29:14.983: INFO: coredns-87f5d796-n67d4 started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container coredns ready: true, restart count 0 Nov 4 23:29:14.983: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-x7m4h started at 2019-11-04 23:26:28 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:14.983: INFO: csi-hostpath-resizer-0 started at 2019-11-04 23:23:01 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container csi-resizer ready: true, restart count 0 Nov 4 23:29:14.983: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-dwxr9 started at 2019-11-04 23:23:12 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:29:14.983: INFO: security-context-7fbb72ad-72e5-4ac2-a31f-3b581f1df154 started at 2019-11-04 23:24:46 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:29:14.983: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-f7sh6 started at 2019-11-04 23:26:35 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:14.983: INFO: csi-hostpath-attacher-0 started at 2019-11-04 23:23:00 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container csi-attacher ready: true, restart count 0 Nov 4 23:29:14.983: INFO: kube-proxy-4q46s started at 2019-11-04 23:10:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:29:14.983: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-pgtp8 started at 2019-11-04 23:24:14 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container agnhost ready: false, restart count 0 Nov 4 23:29:14.983: INFO: csi-hostpath-provisioner-0 started at 2019-11-04 23:26:43 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container csi-provisioner ready: false, restart count 0 Nov 4 23:29:14.983: INFO: pod-subpath-test-local-preprovisionedpv-pbjf started at 2019-11-04 23:24:33 +0000 UTC (1+2 container statuses recorded) Nov 4 23:29:14.983: INFO: Init container init-volume-local-preprovisionedpv-pbjf ready: false, restart count 0 Nov 4 23:29:14.983: INFO: Container test-container-subpath-local-preprovisionedpv-pbjf ready: false, restart count 0 Nov 4 23:29:14.983: INFO: Container test-container-volume-local-preprovisionedpv-pbjf ready: false, restart count 0 Nov 4 23:29:14.983: INFO: tiller-deploy-7559b6b885-5lm2k started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container tiller ready: true, restart count 0 Nov 4 23:29:14.983: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-4mznt started at 2019-11-04 23:22:59 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container agnhost ready: true, restart count 0 Nov 4 23:29:14.983: INFO: pod-subpath-test-hostpathsymlink-kmsd started at 2019-11-04 23:23:19 +0000 UTC (1+2 container statuses recorded) Nov 4 23:29:14.983: INFO: Init container init-volume-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:29:14.983: INFO: Container test-container-subpath-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:29:14.983: INFO: Container test-container-volume-hostpathsymlink-kmsd ready: true, restart count 0 Nov 4 23:29:14.983: INFO: security-context-32e5a9df-35d4-4d74-9394-deba9a253642 started at 2019-11-04 23:25:05 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container write-pod ready: false, restart count 0 Nov 4 23:29:14.983: INFO: kubernetes-dashboard-65966766b9-lvtsz started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container kubernetes-dashboard ready: true, restart count 0 Nov 4 23:29:14.983: INFO: pod-subpath-test-local-preprovisionedpv-94cz started at 2019-11-04 23:24:16 +0000 UTC (1+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Init container init-volume-local-preprovisionedpv-94cz ready: false, restart count 0 Nov 4 23:29:14.983: INFO: Container test-container-subpath-local-preprovisionedpv-94cz ready: false, restart count 0 Nov 4 23:29:14.983: INFO: pod-subpath-test-local-preprovisionedpv-6jbf started at 2019-11-04 23:24:18 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container test-container-subpath-local-preprovisionedpv-6jbf ready: false, restart count 0 Nov 4 23:29:14.983: INFO: hostexec-k8s-agentpool1-11489250-vmss000000-8rwpq started at 2019-11-04 23:23:34 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:14.983: INFO: Container agnhost ready: true, restart count 0 W1104 23:29:14.986378 30410 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:29:15.018: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000000 Nov 4 23:29:15.018: INFO: Logging node info for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:15.020: INFO: Node Info: &Node{ObjectMeta:{k8s-agentpool1-11489250-vmss000001 /api/v1/nodes/k8s-agentpool1-11489250-vmss000001 2d9f0ab9-c990-46a3-b3bc-7808950553bf 26413 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[agentpool:agentpool1 beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_D4s_v3 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:1 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:agent kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-agentpool1-11489250-vmss000001 kubernetes.io/os:linux kubernetes.io/role:agent node-role.kubernetes.io/agent: storageprofile:managed storagetier:Premium_LRS topology.hostpath.csi/node:k8s-agentpool1-11489250-vmss000001] map[csi.volume.kubernetes.io/nodeid:{"csi-hostpath-multivolume-3014":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6609":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-multivolume-6697":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-3251":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-4810":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-546":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-provisioning-6369":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-multivolume-7618":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-2817":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-5016":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-6812":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-provisioning-855":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumeio-7968":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-v0-volumemode-6226":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumeio-9022":"k8s-agentpool1-11489250-vmss000001","csi-hostpath-volumemode-551":"k8s-agentpool1-11489250-vmss000001"} node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.1.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachineScaleSets/k8s-agentpool1-11489250-vmss/virtualMachines/1,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[10.244.1.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16797044736 0} {<nil>} 16403364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{4 0} {<nil>} 4 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{16010612736 0} {<nil>} 15635364Ki BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:38 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:28:44 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.0.5,},NodeAddress{Type:Hostname,Address:k8s-agentpool1-11489250-vmss000001,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:5456dda39b3d435cb066867813114df8,SystemUUID:6D0288FF-6F23-3E4D-916E-D89B5AFE73FD,BootID:eeee8a92-9ca0-4335-88b5-e62705f3f746,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[quay.io/kubernetes_incubator/nfs-provisioner@sha256:df762117e3c891f2d2ddff46ecb0776ba1f9f3c44cfd7739b0683bcd7a7954a8 quay.io/kubernetes_incubator/nfs-provisioner:v2.2.2],SizeBytes:391772778,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/volume/nfs@sha256:c2ad734346f608a5f7d69cfded93c4e8094069320657bd372d12ba21dea3ea71 gcr.io/kubernetes-e2e-test-images/volume/nfs:1.0],SizeBytes:225358913,},ContainerImage{Names:[httpd@sha256:eb8ccf084cf3e80eece1add239effefd171eb39adbc154d33c14260d905d4060 httpd:2.4.38-alpine],SizeBytes:123781643,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/agnhost@sha256:4057a5580c7b59c4fe10d8ab2732c9dec35eea80fd41f7bafc7bd5acc7edf727 gcr.io/kubernetes-e2e-test-images/agnhost:2.6],SizeBytes:57345321,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:3a14f801f330d5eacee11f544d2c2c7cc4a733835e25b59887053358108cea69 quay.io/k8scsi/csi-provisioner:v1.4.0],SizeBytes:54456157,},ContainerImage{Names:[quay.io/k8scsi/csi-provisioner@sha256:b23381325dc242cb761861514195efc600f6a403fcd20a2ac4c6b26704def66f quay.io/k8scsi/csi-provisioner:v0.4.1],SizeBytes:53938589,},ContainerImage{Names:[quay.io/k8scsi/csi-snapshotter@sha256:e3d3e742e32d00488fdb401045b9b1d033d7ca0ab6e760f77b24750fc95e5f70 quay.io/k8scsi/csi-snapshotter:v2.0.0-rc1],SizeBytes:51703561,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:6fe3b8b1f8a1b3706fe740a278266cef53a9308d9b1ae736a46684c0d0cb52e1 quay.io/k8scsi/csi-attacher:v0.4.1],SizeBytes:49452185,},ContainerImage{Names:[quay.io/k8scsi/driver-registrar@sha256:b7c6cdbd3ad9e585f79365a5b9f5a83551629c2a3235ed0825d7629371963c10 quay.io/k8scsi/driver-registrar:v0.4.1],SizeBytes:47425903,},ContainerImage{Names:[quay.io/k8scsi/csi-attacher@sha256:d3e2c5fb1d887bed2e6e8f931c65209b16cf7c28b40eaf7812268f9839908790 quay.io/k8scsi/csi-attacher:v2.0.0],SizeBytes:46143101,},ContainerImage{Names:[quay.io/k8scsi/csi-resizer@sha256:eff2d6a215efd9450d90796265fc4d8832a54a3a098df06edae6ff3a5072b08f quay.io/k8scsi/csi-resizer:v0.3.0],SizeBytes:46014212,},ContainerImage{Names:[k8s.gcr.io/metrics-server-amd64@sha256:49a9f12f7067d11f42c803dbe61ed2c1299959ad85cb315b25ff7eef8e6b8892 k8s.gcr.io/metrics-server-amd64:v0.2.1],SizeBytes:42541759,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:fbeda41bf37be05c92f1db044dbee68eb2d5621fae020c4a28334c20d58063ed quay.io/k8scsi/hostpathplugin:v1.2.0],SizeBytes:28767401,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume@sha256:4fd30d43947d4a54fc89ead7985beecfd3c9b2a93a0655a373b1608ab90bd5af mcr.microsoft.com/k8s/flexvolume/keyvault-flexvolume:v0.0.7],SizeBytes:22909487,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64@sha256:3b36bd80b97c532a774e7f6246797b8575d97037982f353476c703ba6686c75c gcr.io/kubernetes-e2e-test-images/regression-issue-74839-amd64:1.0],SizeBytes:19227369,},ContainerImage{Names:[quay.io/k8scsi/hostpathplugin@sha256:0aa496f3e7ff7240abbf306e4244a75c5e59cbf2e4dbc246a6db2ca1bc67c6b1 quay.io/k8scsi/hostpathplugin:v0.4.1],SizeBytes:18583451,},ContainerImage{Names:[quay.io/k8scsi/csi-node-driver-registrar@sha256:89cdb2a20bdec89b75e2fbd82a67567ea90b719524990e772f2704b19757188d quay.io/k8scsi/csi-node-driver-registrar:v1.2.0],SizeBytes:17057647,},ContainerImage{Names:[nginx@sha256:485b610fefec7ff6c463ced9623314a04ed67e3945b9c08d7e53a47f6d108dc7 nginx:1.14-alpine],SizeBytes:16032814,},ContainerImage{Names:[quay.io/k8scsi/livenessprobe@sha256:dde617756e0f602adc566ab71fd885f1dad451ad3fb063ac991c95a2ff47aea5 quay.io/k8scsi/livenessprobe:v1.1.0],SizeBytes:14967303,},ContainerImage{Names:[gcr.io/kubernetes-e2e-test-images/mounttest@sha256:c0bd6f0755f42af09a68c9a47fb993136588a76b3200ec305796b60d629d85d2 gcr.io/kubernetes-e2e-test-images/mounttest:1.0],SizeBytes:1563521,},ContainerImage{Names:[mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume@sha256:23d8c6033f02a1ecad05127ebdc931bb871264228661bc122704b0974e4d9fdd mcr.microsoft.com/k8s/flexvolume/blobfuse-flexvolume:1.0.8],SizeBytes:1159025,},ContainerImage{Names:[busybox@sha256:8ccbac733d19c0dd4d70b4f0c1e12245b5fa3ad24758a11035ee505c629c0796 busybox:1.29],SizeBytes:1154361,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:29:15.021: INFO: Logging kubelet events for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:15.025: INFO: Logging pods the kubelet thinks is on node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:15.033: INFO: pod-configmaps-b12ea30b-ab74-4455-95d7-ad4513d9d70b started at 2019-11-04 23:24:24 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:15.033: INFO: Container createcm-volume-test ready: false, restart count 0 Nov 4 23:29:15.033: INFO: back-off-cap started at 2019-11-04 23:25:56 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:15.033: INFO: Container back-off-cap ready: false, restart count 4 Nov 4 23:29:15.033: INFO: azure-ip-masq-agent-tdbp9 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:15.033: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:29:15.033: INFO: nfs-server started at 2019-11-04 23:25:06 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:15.033: INFO: Container nfs-server ready: true, restart count 0 Nov 4 23:29:15.033: INFO: kube-proxy-gkpm5 started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:15.033: INFO: Container kube-proxy ready: true, restart count 0 Nov 4 23:29:15.033: INFO: blobfuse-flexvol-installer-kfjfx started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:15.033: INFO: Container blobfuse-flexvol-installer ready: true, restart count 0 Nov 4 23:29:15.033: INFO: keyvault-flexvolume-b7nvg started at 2019-11-04 23:10:23 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:15.033: INFO: Container keyvault-flexvolume ready: true, restart count 0 Nov 4 23:29:15.033: INFO: metrics-server-58ff8c5ddf-g2hh5 started at 2019-11-04 23:10:24 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:15.033: INFO: Container metrics-server ready: true, restart count 0 W1104 23:29:15.036493 30410 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:29:15.071: INFO: Latency metrics for node k8s-agentpool1-11489250-vmss000001 Nov 4 23:29:15.071: INFO: Logging node info for node k8s-master-11489250-0 Nov 4 23:29:15.073: INFO: Node Info: &Node{ObjectMeta:{k8s-master-11489250-0 /api/v1/nodes/k8s-master-11489250-0 c7e8559d-81e4-4401-b9ca-034b4af0cc76 26367 0 2019-11-04 23:09:40 +0000 UTC <nil> <nil> map[beta.kubernetes.io/arch:amd64 beta.kubernetes.io/instance-type:Standard_DS2_v2 beta.kubernetes.io/os:linux failure-domain.beta.kubernetes.io/region:westus2 failure-domain.beta.kubernetes.io/zone:0 kubernetes.azure.com/cluster:kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886 kubernetes.azure.com/role:master kubernetes.io/arch:amd64 kubernetes.io/hostname:k8s-master-11489250-0 kubernetes.io/os:linux kubernetes.io/role:master node-role.kubernetes.io/master:] map[node.alpha.kubernetes.io/ttl:0 volumes.kubernetes.io/controller-managed-attach-detach:true] [] [] []},Spec:NodeSpec{PodCIDR:10.244.0.0/24,DoNotUseExternalID:,ProviderID:azure:///subscriptions/940f88ce-a64b-4e73-a258-9931349b9789/resourceGroups/kubetest-e99452b2-ff53-11e9-8e6b-0242efd38886/providers/Microsoft.Compute/virtualMachines/k8s-master-11489250-0,Unschedulable:false,Taints:[]Taint{Taint{Key:node-role.kubernetes.io/master,Value:true,Effect:NoSchedule,TimeAdded:<nil>,},},ConfigSource:nil,PodCIDRs:[10.244.0.0/24],},Status:NodeStatus{Capacity:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{31036776448 0} {<nil>} BinarySI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{7284359168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Allocatable:ResourceList{cpu: {{2 0} {<nil>} 2 DecimalSI},ephemeral-storage: {{27933098757 0} {<nil>} 27933098757 DecimalSI},hugepages-1Gi: {{0 0} {<nil>} 0 DecimalSI},hugepages-2Mi: {{0 0} {<nil>} 0 DecimalSI},memory: {{6497927168 0} {<nil>} BinarySI},pods: {{110 0} {<nil>} 110 DecimalSI},},Phase:,Conditions:[]NodeCondition{NodeCondition{Type:NetworkUnavailable,Status:False,LastHeartbeatTime:2019-11-04 23:10:23 +0000 UTC,LastTransitionTime:2019-11-04 23:10:23 +0000 UTC,Reason:RouteCreated,Message:RouteController created a route,},NodeCondition{Type:MemoryPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientMemory,Message:kubelet has sufficient memory available,},NodeCondition{Type:DiskPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasNoDiskPressure,Message:kubelet has no disk pressure,},NodeCondition{Type:PIDPressure,Status:False,LastHeartbeatTime:2019-11-04 23:28:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:32 +0000 UTC,Reason:KubeletHasSufficientPID,Message:kubelet has sufficient PID available,},NodeCondition{Type:Ready,Status:True,LastHeartbeatTime:2019-11-04 23:28:33 +0000 UTC,LastTransitionTime:2019-11-04 23:09:59 +0000 UTC,Reason:KubeletReady,Message:kubelet is posting ready status. AppArmor enabled,},},Addresses:[]NodeAddress{NodeAddress{Type:InternalIP,Address:10.240.255.5,},NodeAddress{Type:Hostname,Address:k8s-master-11489250-0,},},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:10250,},},NodeInfo:NodeSystemInfo{MachineID:4b2e1465590843f69a05114d1f1735bd,SystemUUID:885E2CBD-DE7B-DE41-AC15-18FB50C2BFBA,BootID:1ddb5423-95a4-4f58-9386-79ef6bca0f71,KernelVersion:4.15.0-1061-azure,OSImage:Ubuntu 16.04.6 LTS,ContainerRuntimeVersion:docker://3.0.6,KubeletVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,KubeProxyVersion:v1.18.0-alpha.0.134+07d03325d3a9b3,OperatingSystem:linux,Architecture:amd64,},Images:[]ContainerImage{ContainerImage{Names:[k8sprowinternal.azurecr.io/hyperkube-amd64@sha256:3f62d6cdd4ea5d86153c55cffb3e112253638e0c81f1947995feb97e9315afc3 k8sprowinternal.azurecr.io/hyperkube-amd64:azure-e2e-1191484695150333952-863c5593],SizeBytes:604874830,},ContainerImage{Names:[k8sprowinternal.azurecr.io/azure-cloud-controller-manager@sha256:823d2ccf43dfd34db70b91241aa07ab6579db11ffe31cc07fd0fdd752388497c k8sprowinternal.azurecr.io/azure-cloud-controller-manager:1191484695150333952-3d6cd6ff],SizeBytes:92595467,},ContainerImage{Names:[k8s.gcr.io/kube-addon-manager-amd64@sha256:382c220b3531d9f95bf316a16b7282cc2ef929cd8a89a9dd3f5933edafc41a8e k8s.gcr.io/kube-addon-manager-amd64:v9.0.1],SizeBytes:83076194,},ContainerImage{Names:[k8s.gcr.io/ip-masq-agent-amd64@sha256:269e0fb9d53fd37f7a135d6a55ea265a67279ba218aa148323f015cf70167340 k8s.gcr.io/ip-masq-agent-amd64:v2.3.0],SizeBytes:50144412,},ContainerImage{Names:[k8s.gcr.io/pause-amd64@sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610 k8s.gcr.io/pause-amd64:3.1],SizeBytes:742472,},},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,},} Nov 4 23:29:15.073: INFO: Logging kubelet events for node k8s-master-11489250-0 Nov 4 23:29:15.079: INFO: Logging pods the kubelet thinks is on node k8s-master-11489250-0 Nov 4 23:29:15.108: INFO: cloud-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:15.108: INFO: Container cloud-controller-manager ready: true, restart count 0 Nov 4 23:29:15.108: INFO: kube-addon-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:15.108: INFO: Container kube-addon-manager ready: true, restart count 0 Nov 4 23:29:15.108: INFO: kube-apiserver-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:15.108: INFO: Container kube-apiserver ready: true, restart count 0 Nov 4 23:29:15.108: INFO: kube-controller-manager-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:15.108: INFO: Container kube-controller-manager ready: true, restart count 0 Nov 4 23:29:15.108: INFO: kube-scheduler-k8s-master-11489250-0 started at 2019-11-04 23:09:29 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:15.108: INFO: Container kube-scheduler ready: true, restart count 0 Nov 4 23:29:15.108: INFO: azure-ip-masq-agent-hhzdb started at 2019-11-04 23:10:03 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:15.108: INFO: Container azure-ip-masq-agent ready: true, restart count 0 Nov 4 23:29:15.108: INFO: kube-proxy-knwmt started at 2019-11-04 23:10:04 +0000 UTC (0+1 container statuses recorded) Nov 4 23:29:15.108: INFO: Container kube-proxy ready: true, restart count 0 W1104 23:29:15.111445 30410 metrics_grabber.go:79] Master node is not registered. Grabbing metrics from Scheduler, ControllerManager and ClusterAutoscaler is disabled. Nov 4 23:29:15.129: INFO: Latency metrics for node k8s-master-11489250-0 Nov 4 23:29:15.129: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready �[1mSTEP�[0m: Destroying namespace "persistent-local-volumes-test-7376" for this suite.
Filter through log files
Build
Check APIReachability
Deferred TearDown
DumpClusterLogs
IsUp
Kubernetes e2e suite [k8s.io] Pods should cap back-off at MaxContainerBackOff [Slow][NodeConformance]
Kubernetes e2e suite [k8s.io] Pods should have their auto-restart back-off timer reset on image update [Slow][NodeConformance]
Kubernetes e2e suite [k8s.io] Variable Expansion should fail substituting values in a volume subpath with absolute path [sig-storage][Slow]
Kubernetes e2e suite [k8s.io] Variable Expansion should fail substituting values in a volume subpath with backticks [sig-storage][Slow]
Kubernetes e2e suite [k8s.io] Variable Expansion should not change the subpath mount on a container restart if the environment variable changes [sig-storage][Slow]
Kubernetes e2e suite [k8s.io] Variable Expansion should succeed in writing subpaths in container [sig-storage][Slow]
Kubernetes e2e suite [k8s.io] Variable Expansion should verify that a failing subpath expansion can be modified during the lifecycle of a container [sig-storage][Slow]
Kubernetes e2e suite [sig-api-machinery] Servers with support for API chunking should support continue listing from the last key if the original version has been compacted away, though the list is inconsistent [Slow]
Kubernetes e2e suite [sig-apps] CronJob should not schedule jobs when suspended [Slow]
Kubernetes e2e suite [sig-apps] CronJob should not schedule new jobs when ForbidConcurrent [Slow]
Kubernetes e2e suite [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] Burst scaling should run to completion even with unhealthy pods [Slow] [Conformance]
Kubernetes e2e suite [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] Scaling should happen in predictable order and halt if any stateful pod is unhealthy [Slow] [Conformance]
Kubernetes e2e suite [sig-network] Network should resolve connrection reset issue #74839 [Slow]
Kubernetes e2e suite [sig-network] Networking Granular Checks: Services should update nodePort: http [Slow]
Kubernetes e2e suite [sig-network] Networking Granular Checks: Services should update nodePort: udp [Slow]
Kubernetes e2e suite [sig-network] Services should be able to switch session affinity for LoadBalancer service with ESIPP off [Slow] [DisabledForLargeClusters] [LinuxOnly]
Kubernetes e2e suite [sig-network] Services should be able to switch session affinity for LoadBalancer service with ESIPP on [Slow] [DisabledForLargeClusters] [LinuxOnly]
Kubernetes e2e suite [sig-network] Services should handle load balancer cleanup finalizer for service [Slow]
Kubernetes e2e suite [sig-network] Services should have session affinity work for LoadBalancer service with ESIPP off [Slow] [DisabledForLargeClusters] [LinuxOnly]
Kubernetes e2e suite [sig-network] Services should have session affinity work for LoadBalancer service with ESIPP on [Slow] [DisabledForLargeClusters] [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] CSI mock volume CSI volume limit information using mock driver should report attach limit when limit is bigger than 0 [Slow]
Kubernetes e2e suite [sig-storage] ConfigMap Should fail non-optional pod creation due to configMap object does not exist [Slow]
Kubernetes e2e suite [sig-storage] ConfigMap Should fail non-optional pod creation due to the key in the configMap object does not exist [Slow]
Kubernetes e2e suite [sig-storage] Dynamic Provisioning DynamicProvisioner External should let an external dynamic provisioner create and delete persistent volumes [Slow]
Kubernetes e2e suite [sig-storage] Dynamic Provisioning DynamicProvisioner [Slow] should provision storage with different parameters
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]
Kubernetes e2e suite [sig-storage] PersistentVolumes NFS with multiple PVs and PVCs all in same ns should create 4 PVs and 2 PVCs: test write access [Slow]
Kubernetes e2e suite [sig-storage] PersistentVolumes-local Local volume that cannot be mounted [Slow] should fail due to non-existent path
Kubernetes e2e suite [sig-storage] PersistentVolumes-local Local volume that cannot be mounted [Slow] should fail due to wrong node
Kubernetes e2e suite [sig-storage] PersistentVolumes-local StatefulSet with pod affinity [Slow] should use volumes on one node when pod has affinity
Kubernetes e2e suite [sig-storage] PersistentVolumes-local StatefulSet with pod affinity [Slow] should use volumes on one node when pod management is parallel and pod has affinity
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Set fsGroup for local volume should set fsGroup for one pod [Slow]
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Set fsGroup for local volume should set fsGroup for one pod [Slow]
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Set fsGroup for local volume should set fsGroup for one pod [Slow]
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Set fsGroup for local volume should set fsGroup for one pod [Slow]
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir-link] Set fsGroup for local volume should set fsGroup for one pod [Slow]
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir-link] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir] Set fsGroup for local volume should set fsGroup for one pod [Slow]
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: tmpfs] Set fsGroup for local volume should set fsGroup for one pod [Slow]
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: tmpfs] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]
Kubernetes e2e suite [sig-storage] Projected configMap Should fail non-optional pod creation due to configMap object does not exist [Slow]
Kubernetes e2e suite [sig-storage] Projected configMap Should fail non-optional pod creation due to the key in the configMap object does not exist [Slow]
Kubernetes e2e suite [sig-storage] Projected secret Should fail non-optional pod creation due to secret object does not exist [Slow]
Kubernetes e2e suite [sig-storage] Projected secret Should fail non-optional pod creation due to the key in the secret object does not exist [Slow]
Kubernetes e2e suite [sig-storage] Secrets Should fail non-optional pod creation due to secret object does not exist [Slow]
Kubernetes e2e suite [sig-storage] Secrets Should fail non-optional pod creation due to the key in the secret object does not exist [Slow]
TearDown
TearDown Previous
Test
Timeout
Up
kubectl version
list nodes
test setup
Kubernetes e2e suite Recreate [Feature:Recreate] recreate nodes and ensure they function upon restart
Kubernetes e2e suite [k8s.io] Cluster size autoscaler scalability [Slow] CA ignores unschedulable pods while scheduling schedulable pods [Feature:ClusterAutoscalerScalability6]
Kubernetes e2e suite [k8s.io] Cluster size autoscaler scalability [Slow] should scale down empty nodes [Feature:ClusterAutoscalerScalability3]
Kubernetes e2e suite [k8s.io] Cluster size autoscaler scalability [Slow] should scale down underutilized nodes [Feature:ClusterAutoscalerScalability4]
Kubernetes e2e suite [k8s.io] Cluster size autoscaler scalability [Slow] should scale up at all [Feature:ClusterAutoscalerScalability1]
Kubernetes e2e suite [k8s.io] Cluster size autoscaler scalability [Slow] should scale up twice [Feature:ClusterAutoscalerScalability2]
Kubernetes e2e suite [k8s.io] Cluster size autoscaler scalability [Slow] shouldn't scale down with underutilized nodes due to host port conflicts [Feature:ClusterAutoscalerScalability5]
Kubernetes e2e suite [k8s.io] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart exec hook properly [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart http hook properly [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop exec hook properly [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop http hook properly [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Container Runtime blackbox test on terminated container should report termination message [LinuxOnly] as empty when pod succeeds and TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Container Runtime blackbox test on terminated container should report termination message [LinuxOnly] from file when pod succeeds and TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Container Runtime blackbox test on terminated container should report termination message [LinuxOnly] from log output if TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Container Runtime blackbox test on terminated container should report termination message [LinuxOnly] if TerminationMessagePath is set [NodeConformance]
Kubernetes e2e suite [k8s.io] Container Runtime blackbox test on terminated container should report termination message [LinuxOnly] if TerminationMessagePath is set as non-root user and at a non-default path [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Container Runtime blackbox test when running a container with a new image should be able to pull from private registry with secret [NodeConformance]
Kubernetes e2e suite [k8s.io] Container Runtime blackbox test when running a container with a new image should be able to pull image [NodeConformance]
Kubernetes e2e suite [k8s.io] Container Runtime blackbox test when running a container with a new image should not be able to pull from private registry without secret [NodeConformance]
Kubernetes e2e suite [k8s.io] Container Runtime blackbox test when running a container with a new image should not be able to pull image from invalid registry [NodeConformance]
Kubernetes e2e suite [k8s.io] Container Runtime blackbox test when starting a container that exits should run with the expected status [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Docker Containers should be able to override the image's default arguments (docker cmd) [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Docker Containers should be able to override the image's default command (docker entrypoint) [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Docker Containers should be able to override the image's default command and arguments [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Docker Containers should use the image defaults if command and args are blank [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Downward API [Serial] [Disruptive] [NodeFeature:EphemeralStorage] Downward API tests for local ephemeral storage should provide container's limits.ephemeral-storage and requests.ephemeral-storage as env vars
Kubernetes e2e suite [k8s.io] Downward API [Serial] [Disruptive] [NodeFeature:EphemeralStorage] Downward API tests for local ephemeral storage should provide default limits.ephemeral-storage from node allocatable
Kubernetes e2e suite [k8s.io] GKE local SSD [Feature:GKELocalSSD] should write and read from node local SSD [Feature:GKELocalSSD]
Kubernetes e2e suite [k8s.io] GKE node pools [Feature:GKENodePool] should create a cluster with multiple node pools [Feature:GKENodePool]
Kubernetes e2e suite [k8s.io] InitContainer [NodeConformance] should invoke init containers on a RestartAlways pod [Conformance]
Kubernetes e2e suite [k8s.io] InitContainer [NodeConformance] should invoke init containers on a RestartNever pod [Conformance]
Kubernetes e2e suite [k8s.io] InitContainer [NodeConformance] should not start app containers and fail the pod if init containers fail on a RestartNever pod [Conformance]
Kubernetes e2e suite [k8s.io] InitContainer [NodeConformance] should not start app containers if init containers fail on a RestartAlways pod [Conformance]
Kubernetes e2e suite [k8s.io] Kubelet when scheduling a busybox Pod with hostAliases should write entries to /etc/hosts [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Kubelet when scheduling a busybox command in a pod should print the output to logs [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Kubelet when scheduling a busybox command that always fails in a pod should be possible to delete [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Kubelet when scheduling a busybox command that always fails in a pod should have an terminated reason [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Kubelet when scheduling a read only busybox container should not write to root filesystem [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] KubeletManagedEtcHosts should test kubelet managed /etc/hosts file [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Lease lease API should be available [Conformance]
Kubernetes e2e suite [k8s.io] NodeLease when the NodeLease feature is enabled the kubelet should create and update a lease in the kube-node-lease namespace
Kubernetes e2e suite [k8s.io] NodeLease when the NodeLease feature is enabled the kubelet should report node status infrequently
Kubernetes e2e suite [k8s.io] Pods should allow activeDeadlineSeconds to be updated [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Pods should be submitted and removed [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Pods should be updated [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Pods should contain environment variables for services [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Pods should get a host IP [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Pods should support pod readiness gates [NodeFeature:PodReadinessGate]
Kubernetes e2e suite [k8s.io] Pods should support remote command execution over websockets [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Pods should support retrieving logs from the container over websockets [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] PrivilegedPod [NodeConformance] should enable privileged commands [LinuxOnly]
Kubernetes e2e suite [k8s.io] Probing container should *not* be restarted with a /healthz http liveness probe [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Probing container should *not* be restarted with a exec "cat /tmp/health" liveness probe [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Probing container should *not* be restarted with a non-local redirect http liveness probe
Kubernetes e2e suite [k8s.io] Probing container should *not* be restarted with a tcp:8080 liveness probe [NodeConformance]
Kubernetes e2e suite [k8s.io] Probing container should be restarted with a /healthz http liveness probe [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Probing container should be restarted with a docker exec liveness probe with timeout
Kubernetes e2e suite [k8s.io] Probing container should be restarted with a exec "cat /tmp/health" liveness probe [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Probing container should be restarted with a local redirect http liveness probe
Kubernetes e2e suite [k8s.io] Probing container should have monotonically increasing restart count [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Probing container with readiness probe should not be ready before initial delay and never restart [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Probing container with readiness probe that fails should never be ready and never restart [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Security Context When creating a container with runAsNonRoot should not run with an explicit root user ID [LinuxOnly]
Kubernetes e2e suite [k8s.io] Security Context When creating a container with runAsNonRoot should not run without a specified user ID
Kubernetes e2e suite [k8s.io] Security Context When creating a container with runAsNonRoot should run with an explicit non-root user ID [LinuxOnly]
Kubernetes e2e suite [k8s.io] Security Context When creating a container with runAsNonRoot should run with an image specified user ID
Kubernetes e2e suite [k8s.io] Security Context When creating a container with runAsUser should run the container with uid 0 [LinuxOnly] [NodeConformance]
Kubernetes e2e suite [k8s.io] Security Context When creating a container with runAsUser should run the container with uid 65534 [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Security Context When creating a pod with privileged should run the container as privileged when true [LinuxOnly] [NodeFeature:HostAccess]
Kubernetes e2e suite [k8s.io] Security Context When creating a pod with privileged should run the container as unprivileged when false [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Security Context When creating a pod with readOnlyRootFilesystem should run the container with readonly rootfs when readOnlyRootFilesystem=true [LinuxOnly] [NodeConformance]
Kubernetes e2e suite [k8s.io] Security Context When creating a pod with readOnlyRootFilesystem should run the container with writable rootfs when readOnlyRootFilesystem=false [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when not explicitly set and uid != 0 [LinuxOnly] [NodeConformance]
Kubernetes e2e suite [k8s.io] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when true [LinuxOnly] [NodeConformance]
Kubernetes e2e suite [k8s.io] Security Context when creating containers with AllowPrivilegeEscalation should not allow privilege escalation when false [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Sysctls [LinuxOnly] [NodeFeature:Sysctls] should not launch unsafe, but not explicitly enabled sysctls on the node
Kubernetes e2e suite [k8s.io] Sysctls [LinuxOnly] [NodeFeature:Sysctls] should reject invalid sysctls
Kubernetes e2e suite [k8s.io] Sysctls [LinuxOnly] [NodeFeature:Sysctls] should support sysctls
Kubernetes e2e suite [k8s.io] Sysctls [LinuxOnly] [NodeFeature:Sysctls] should support unsafe sysctls which are actually whitelisted
Kubernetes e2e suite [k8s.io] Variable Expansion should allow composing env vars into new env vars [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Variable Expansion should allow substituting values in a container's args [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Variable Expansion should allow substituting values in a container's command [NodeConformance] [Conformance]
Kubernetes e2e suite [k8s.io] Variable Expansion should allow substituting values in a volume subpath [sig-storage]
Kubernetes e2e suite [k8s.io] [Feature:Example] [k8s.io] Downward API should create a pod that prints his name and namespace
Kubernetes e2e suite [k8s.io] [Feature:Example] [k8s.io] Liveness liveness pods should be automatically restarted
Kubernetes e2e suite [k8s.io] [Feature:Example] [k8s.io] Secret should create a pod that reads a secret
Kubernetes e2e suite [k8s.io] [Feature:TTLAfterFinished][NodeAlphaFeature:TTLAfterFinished] job should be deleted once it finishes after TTL seconds
Kubernetes e2e suite [k8s.io] [sig-cloud-provider] [Feature:CloudProvider][Disruptive] Nodes should be deleted on API server if it doesn't exist in the cloud provider
Kubernetes e2e suite [k8s.io] [sig-node] AppArmor load AppArmor profiles can disable an AppArmor profile, using unconfined
Kubernetes e2e suite [k8s.io] [sig-node] AppArmor load AppArmor profiles should enforce an AppArmor profile
Kubernetes e2e suite [k8s.io] [sig-node] Events should be sent by kubelets and the scheduler about pods scheduling and running [Conformance]
Kubernetes e2e suite [k8s.io] [sig-node] Kubelet [Serial] [Slow] [k8s.io] [sig-node] experimental resource usage tracking [Feature:ExperimentalResourceUsageTracking] resource tracking for 100 pods per node
Kubernetes e2e suite [k8s.io] [sig-node] Kubelet [Serial] [Slow] [k8s.io] [sig-node] regular resource usage tracking [Feature:RegularResourceUsageTracking] resource tracking for 0 pods per node
Kubernetes e2e suite [k8s.io] [sig-node] Kubelet [Serial] [Slow] [k8s.io] [sig-node] regular resource usage tracking [Feature:RegularResourceUsageTracking] resource tracking for 100 pods per node
Kubernetes e2e suite [k8s.io] [sig-node] Mount propagation should propagate mounts to the host
Kubernetes e2e suite [k8s.io] [sig-node] NodeProblemDetector [DisabledForLargeClusters] should run without error
Kubernetes e2e suite [k8s.io] [sig-node] Pod garbage collector [Feature:PodGarbageCollector] [Slow] should handle the creation of 1000 pods
Kubernetes e2e suite [k8s.io] [sig-node] Pods Extended [k8s.io] Delete Grace Period should be submitted and removed [Conformance]
Kubernetes e2e suite [k8s.io] [sig-node] Pods Extended [k8s.io] Pods Set QOS Class should be set on Pods with matching resource requests and limits for memory and cpu [Conformance]
Kubernetes e2e suite [k8s.io] [sig-node] PreStop graceful pod terminated should wait until preStop hook completes the process [Flaky]
Kubernetes e2e suite [k8s.io] [sig-node] PreStop should call prestop when killing a pod [Conformance]
Kubernetes e2e suite [k8s.io] [sig-node] SSH should SSH to all nodes and run commands
Kubernetes e2e suite [k8s.io] [sig-node] Security Context should support container.SecurityContext.RunAsUser And container.SecurityContext.RunAsGroup [LinuxOnly]
Kubernetes e2e suite [k8s.io] [sig-node] Security Context should support container.SecurityContext.RunAsUser [LinuxOnly]
Kubernetes e2e suite [k8s.io] [sig-node] Security Context should support pod.Spec.SecurityContext.RunAsUser And pod.Spec.SecurityContext.RunAsGroup [LinuxOnly]
Kubernetes e2e suite [k8s.io] [sig-node] Security Context should support pod.Spec.SecurityContext.RunAsUser [LinuxOnly]
Kubernetes e2e suite [k8s.io] [sig-node] Security Context should support pod.Spec.SecurityContext.SupplementalGroups [LinuxOnly]
Kubernetes e2e suite [k8s.io] [sig-node] Security Context should support seccomp alpha runtime/default annotation [Feature:Seccomp] [LinuxOnly]
Kubernetes e2e suite [k8s.io] [sig-node] Security Context should support seccomp alpha unconfined annotation on the container [Feature:Seccomp] [LinuxOnly]
Kubernetes e2e suite [k8s.io] [sig-node] Security Context should support seccomp alpha unconfined annotation on the pod [Feature:Seccomp] [LinuxOnly]
Kubernetes e2e suite [k8s.io] [sig-node] Security Context should support seccomp default which is unconfined [Feature:Seccomp] [LinuxOnly]
Kubernetes e2e suite [k8s.io] [sig-node] Security Context should support volume SELinux relabeling [Flaky] [LinuxOnly]
Kubernetes e2e suite [k8s.io] [sig-node] Security Context should support volume SELinux relabeling when using hostIPC [Flaky] [LinuxOnly]
Kubernetes e2e suite [k8s.io] [sig-node] Security Context should support volume SELinux relabeling when using hostPID [Flaky] [LinuxOnly]
Kubernetes e2e suite [k8s.io] [sig-node] crictl should be able to run crictl on the node
Kubernetes e2e suite [k8s.io] [sig-node] kubelet [k8s.io] [sig-node] Clean up pods on node kubelet should be able to delete 10 pods per node in 1m0s.
Kubernetes e2e suite [k8s.io] [sig-node] kubelet [k8s.io] [sig-node] host cleanup with volume mounts [sig-storage][HostCleanup][Flaky] Host cleanup after disrupting NFS volume [NFS] after stopping the nfs-server and deleting the (active) client pod, the NFS mount and the pod's UID directory should be removed.
Kubernetes e2e suite [k8s.io] [sig-node] kubelet [k8s.io] [sig-node] host cleanup with volume mounts [sig-storage][HostCleanup][Flaky] Host cleanup after disrupting NFS volume [NFS] after stopping the nfs-server and deleting the (sleeping) client pod, the NFS mount and the pod's UID directory should be removed.
Kubernetes e2e suite [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] listing mutating webhooks should work [Conformance]
Kubernetes e2e suite [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] listing validating webhooks should work [Conformance]
Kubernetes e2e suite [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a mutating webhook should work [Conformance]
Kubernetes e2e suite [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a validating webhook should work [Conformance]
Kubernetes e2e suite [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny attaching pod [Conformance]
Kubernetes e2e suite [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny custom resource creation, update and deletion [Conformance]
Kubernetes e2e suite [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny pod and configmap creation [Conformance]
Kubernetes e2e suite [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should deny crd creation [Conformance]
Kubernetes e2e suite [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should honor timeout [Conformance]
Kubernetes e2e suite [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should include webhook resources in discovery documents [Conformance]
Kubernetes e2e suite [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate configmap [Conformance]
Kubernetes e2e suite [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource [Conformance]
Kubernetes e2e suite [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource with different stored version [Conformance]
Kubernetes e2e suite [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource with pruning [Conformance]
Kubernetes e2e suite [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate pod and apply defaults after mutation [Conformance]
Kubernetes e2e suite [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should not be able to mutate or prevent deletion of webhook configuration objects [Conformance]
Kubernetes e2e suite [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should unconditionally reject operations on fail closed webhook [Conformance]
Kubernetes e2e suite [sig-api-machinery] Aggregator Should be able to support the 1.10 Sample API Server using the current Aggregator [Conformance]
Kubernetes e2e suite [sig-api-machinery] CustomResourceConversionWebhook [Privileged:ClusterAdmin] should be able to convert a non homogeneous list of CRs [Conformance]
Kubernetes e2e suite [sig-api-machinery] CustomResourceConversionWebhook [Privileged:ClusterAdmin] should be able to convert from CR v1 to CR v2 [Conformance]
Kubernetes e2e suite [sig-api-machinery] CustomResourceDefinition Watch [Privileged:ClusterAdmin] CustomResourceDefinition Watch watch on custom resource definition objects [Conformance]
Kubernetes e2e suite [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition creating/deleting custom resource definition objects works [Conformance]
Kubernetes e2e suite [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition getting/updating/patching custom resource definition status sub-resource works [Conformance]
Kubernetes e2e suite [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition listing custom resource definition objects works [Conformance]
Kubernetes e2e suite [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] should include custom resource definition resources in discovery documents [Conformance]
Kubernetes e2e suite [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] removes definition from spec when one version gets changed to not be served [Conformance]
Kubernetes e2e suite [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] updates the published spec when one version gets renamed [Conformance]
Kubernetes e2e suite [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD preserving unknown fields at the schema root [Conformance]
Kubernetes e2e suite [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD preserving unknown fields in an embedded object [Conformance]
Kubernetes e2e suite [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD with validation schema [Conformance]
Kubernetes e2e suite [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD without validation schema [Conformance]
Kubernetes e2e suite [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of different groups [Conformance]
Kubernetes e2e suite [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of same group and version but different kinds [Conformance]
Kubernetes e2e suite [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of same group but different versions [Conformance]
Kubernetes e2e suite [sig-api-machinery] Discovery Custom resource should have storage version hash
Kubernetes e2e suite [sig-api-machinery] Etcd failure [Disruptive] should recover from SIGKILL
Kubernetes e2e suite [sig-api-machinery] Etcd failure [Disruptive] should recover from network partition with master
Kubernetes e2e suite [sig-api-machinery] Garbage collector should delete RS created by deployment when not orphaning [Conformance]
Kubernetes e2e suite [sig-api-machinery] Garbage collector should delete jobs and pods created by cronjob
Kubernetes e2e suite [sig-api-machinery] Garbage collector should delete pods created by rc when not orphaning [Conformance]
Kubernetes e2e suite [sig-api-machinery] Garbage collector should keep the rc around until all its pods are deleted if the deleteOptions says so [Conformance]
Kubernetes e2e suite [sig-api-machinery] Garbage collector should not be blocked by dependency circle [Conformance]
Kubernetes e2e suite [sig-api-machinery] Garbage collector should not delete dependents that have both valid owner and owner that's waiting for dependents to be deleted [Conformance]
Kubernetes e2e suite [sig-api-machinery] Garbage collector should orphan RS created by deployment when deleteOptions.PropagationPolicy is Orphan [Conformance]
Kubernetes e2e suite [sig-api-machinery] Garbage collector should orphan pods created by rc if delete options say so [Conformance]
Kubernetes e2e suite [sig-api-machinery] Garbage collector should orphan pods created by rc if deleteOptions.OrphanDependents is nil
Kubernetes e2e suite [sig-api-machinery] Garbage collector should support cascading deletion of custom resources
Kubernetes e2e suite [sig-api-machinery] Garbage collector should support orphan deletion of custom resources
Kubernetes e2e suite [sig-api-machinery] Generated clientset should create pods, set the deletionTimestamp and deletionGracePeriodSeconds of the pod
Kubernetes e2e suite [sig-api-machinery] Generated clientset should create v1beta1 cronJobs, delete cronJobs, watch cronJobs
Kubernetes e2e suite [sig-api-machinery] Namespaces [Serial] should always delete fast (ALL of 100 namespaces in 150 seconds) [Feature:ComprehensiveNamespaceDraining]
Kubernetes e2e suite [sig-api-machinery] Namespaces [Serial] should delete fast enough (90 percent of 100 namespaces in 150 seconds)
Kubernetes e2e suite [sig-api-machinery] Namespaces [Serial] should ensure that all pods are removed when a namespace is deleted [Conformance]
Kubernetes e2e suite [sig-api-machinery] Namespaces [Serial] should ensure that all services are removed when a namespace is deleted [Conformance]
Kubernetes e2e suite [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's multiple priority class scope (quota set to pod count: 2) against 2 pods with same priority classes.
Kubernetes e2e suite [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (cpu, memory quota set) against a pod with same priority class.
Kubernetes e2e suite [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against 2 pods with different priority class.
Kubernetes e2e suite [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against 2 pods with same priority class.
Kubernetes e2e suite [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with different priority class (ScopeSelectorOpExists).
Kubernetes e2e suite [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with different priority class (ScopeSelectorOpNotIn).
Kubernetes e2e suite [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with same priority class.
Kubernetes e2e suite [sig-api-machinery] ResourceQuota [Feature:ScopeSelectors] should verify ResourceQuota with best effort scope using scope-selectors.
Kubernetes e2e suite [sig-api-machinery] ResourceQuota [Feature:ScopeSelectors] should verify ResourceQuota with terminating scopes through scope selectors.
Kubernetes e2e suite [sig-api-machinery] ResourceQuota should be able to update and delete ResourceQuota. [Conformance]
Kubernetes e2e suite [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a configMap. [Conformance]
Kubernetes e2e suite [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a custom resource.
Kubernetes e2e suite [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a persistent volume claim with a storage class. [sig-storage]
Kubernetes e2e suite [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a persistent volume claim. [sig-storage]
Kubernetes e2e suite [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a pod. [Conformance]
Kubernetes e2e suite [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a replica set. [Conformance]
Kubernetes e2e suite [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a replication controller. [Conformance]
Kubernetes e2e suite [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a secret. [Conformance]
Kubernetes e2e suite [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a service. [Conformance]
Kubernetes e2e suite [sig-api-machinery] ResourceQuota should create a ResourceQuota and ensure its status is promptly calculated. [Conformance]
Kubernetes e2e suite [sig-api-machinery] ResourceQuota should verify ResourceQuota with best effort scope. [Conformance]
Kubernetes e2e suite [sig-api-machinery] ResourceQuota should verify ResourceQuota with terminating scopes. [Conformance]
Kubernetes e2e suite [sig-api-machinery] Secrets should be consumable from pods in env vars [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-api-machinery] Secrets should be consumable via the environment [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-api-machinery] Secrets should fail to create secret due to empty secret key [Conformance]
Kubernetes e2e suite [sig-api-machinery] Servers with support for API chunking should return chunks of results for list calls
Kubernetes e2e suite [sig-api-machinery] Servers with support for Table transformation should return a 406 for a backend which does not implement metadata [Conformance]
Kubernetes e2e suite [sig-api-machinery] Servers with support for Table transformation should return chunks of table results for list calls
Kubernetes e2e suite [sig-api-machinery] Servers with support for Table transformation should return generic metadata details across all namespaces for nodes
Kubernetes e2e suite [sig-api-machinery] Servers with support for Table transformation should return pod details
Kubernetes e2e suite [sig-api-machinery] Watchers should be able to restart watching from the last resource version observed by the previous watch [Conformance]
Kubernetes e2e suite [sig-api-machinery] Watchers should be able to start watching from a specific resource version [Conformance]
Kubernetes e2e suite [sig-api-machinery] Watchers should observe add, update, and delete watch notifications on configmaps [Conformance]
Kubernetes e2e suite [sig-api-machinery] Watchers should observe an object deletion if it stops meeting the requirements of the selector [Conformance]
Kubernetes e2e suite [sig-api-machinery] Watchers should receive events on concurrent watches in same order [Conformance]
Kubernetes e2e suite [sig-apps] CronJob should delete successful/failed finished jobs with limit of one job
Kubernetes e2e suite [sig-apps] CronJob should not emit unexpected warnings
Kubernetes e2e suite [sig-apps] CronJob should remove from active list jobs that have been deleted
Kubernetes e2e suite [sig-apps] CronJob should replace jobs when ReplaceConcurrent
Kubernetes e2e suite [sig-apps] CronJob should schedule multiple jobs concurrently
Kubernetes e2e suite [sig-apps] Daemon set [Serial] should not update pod when spec was updated and update strategy is OnDelete
Kubernetes e2e suite [sig-apps] Daemon set [Serial] should retry creating failed daemon pods [Conformance]
Kubernetes e2e suite [sig-apps] Daemon set [Serial] should rollback without unnecessary restarts [Conformance]
Kubernetes e2e suite [sig-apps] Daemon set [Serial] should run and stop complex daemon [Conformance]
Kubernetes e2e suite [sig-apps] Daemon set [Serial] should run and stop complex daemon with node affinity
Kubernetes e2e suite [sig-apps] Daemon set [Serial] should run and stop simple daemon [Conformance]
Kubernetes e2e suite [sig-apps] Daemon set [Serial] should update pod when spec was updated and update strategy is RollingUpdate [Conformance]
Kubernetes e2e suite [sig-apps] DaemonRestart [Disruptive] Controller Manager should not create/delete replicas across restart
Kubernetes e2e suite [sig-apps] DaemonRestart [Disruptive] Kubelet should not restart containers across restart
Kubernetes e2e suite [sig-apps] DaemonRestart [Disruptive] Scheduler should continue assigning pods to nodes across restart
Kubernetes e2e suite [sig-apps] Deployment RecreateDeployment should delete old pods and create new ones [Conformance]
Kubernetes e2e suite [sig-apps] Deployment RollingUpdateDeployment should delete old pods and create new ones [Conformance]
Kubernetes e2e suite [sig-apps] Deployment deployment reaping should cascade to its replica sets and pods
Kubernetes e2e suite [sig-apps] Deployment deployment should delete old replica sets [Conformance]
Kubernetes e2e suite [sig-apps] Deployment deployment should support proportional scaling [Conformance]
Kubernetes e2e suite [sig-apps] Deployment deployment should support rollover [Conformance]
Kubernetes e2e suite [sig-apps] Deployment iterative rollouts should eventually progress
Kubernetes e2e suite [sig-apps] Deployment should not disrupt a cloud load-balancer's connectivity during rollout
Kubernetes e2e suite [sig-apps] Deployment test Deployment ReplicaSet orphaning and adoption regarding controllerRef
Kubernetes e2e suite [sig-apps] DisruptionController evictions: enough pods, absolute => should allow an eviction
Kubernetes e2e suite [sig-apps] DisruptionController evictions: enough pods, replicaSet, percentage => should allow an eviction
Kubernetes e2e suite [sig-apps] DisruptionController evictions: maxUnavailable allow single eviction, percentage => should allow an eviction
Kubernetes e2e suite [sig-apps] DisruptionController evictions: maxUnavailable deny evictions, integer => should not allow an eviction
Kubernetes e2e suite [sig-apps] DisruptionController evictions: no PDB => should allow an eviction
Kubernetes e2e suite [sig-apps] DisruptionController evictions: too few pods, absolute => should not allow an eviction
Kubernetes e2e suite [sig-apps] DisruptionController evictions: too few pods, replicaSet, percentage => should not allow an eviction
Kubernetes e2e suite [sig-apps] DisruptionController should block an eviction until the PDB is updated to allow it
Kubernetes e2e suite [sig-apps] DisruptionController should create a PodDisruptionBudget
Kubernetes e2e suite [sig-apps] DisruptionController should update PodDisruptionBudget status
Kubernetes e2e suite [sig-apps] Job should adopt matching orphans and release non-matching pods [Conformance]
Kubernetes e2e suite [sig-apps] Job should delete a job [Conformance]
Kubernetes e2e suite [sig-apps] Job should fail to exceed backoffLimit
Kubernetes e2e suite [sig-apps] Job should fail when exceeds active deadline
Kubernetes e2e suite [sig-apps] Job should remove pods when job is deleted
Kubernetes e2e suite [sig-apps] Job should run a job to completion when tasks sometimes fail and are locally restarted [Conformance]
Kubernetes e2e suite [sig-apps] Job should run a job to completion when tasks sometimes fail and are not locally restarted
Kubernetes e2e suite [sig-apps] Job should run a job to completion when tasks succeed
Kubernetes e2e suite [sig-apps] Network Partition [Disruptive] [Slow] [k8s.io] Pods should be evicted from unready Node [Feature:TaintEviction] All pods on the unreachable node should be marked as NotReady upon the node turn NotReady AND all pods should be evicted after eviction timeout passes
Kubernetes e2e suite [sig-apps] Network Partition [Disruptive] [Slow] [k8s.io] Pods should return to running and ready state after network partition is healed All pods on the unreachable node should be marked as NotReady upon the node turn NotReady AND all pods should be mark back to Ready when the node get back to Ready before pod eviction timeout
Kubernetes e2e suite [sig-apps] Network Partition [Disruptive] [Slow] [k8s.io] [Job] should create new pods when node is partitioned
Kubernetes e2e suite [sig-apps] Network Partition [Disruptive] [Slow] [k8s.io] [ReplicationController] should eagerly create replacement pod during network partition when termination grace is non-zero
Kubernetes e2e suite [sig-apps] Network Partition [Disruptive] [Slow] [k8s.io] [ReplicationController] should recreate pods scheduled on the unreachable node AND allow scheduling of pods on a node after it rejoins the cluster
Kubernetes e2e suite [sig-apps] Network Partition [Disruptive] [Slow] [k8s.io] [StatefulSet] should come back up if node goes down [Slow] [Disruptive]
Kubernetes e2e suite [sig-apps] Network Partition [Disruptive] [Slow] [k8s.io] [StatefulSet] should not reschedule stateful pods if there is a network partition [Slow] [Disruptive]
Kubernetes e2e suite [sig-apps] ReplicaSet should adopt matching pods on creation and release no longer matching pods [Conformance]
Kubernetes e2e suite [sig-apps] ReplicaSet should serve a basic image on each replica with a private image
Kubernetes e2e suite [sig-apps] ReplicaSet should serve a basic image on each replica with a public image [Conformance]
Kubernetes e2e suite [sig-apps] ReplicaSet should surface a failure condition on a common issue like exceeded quota
Kubernetes e2e suite [sig-apps] ReplicationController should adopt matching pods on creation [Conformance]
Kubernetes e2e suite [sig-apps] ReplicationController should release no longer matching pods [Conformance]
Kubernetes e2e suite [sig-apps] ReplicationController should serve a basic image on each replica with a private image
Kubernetes e2e suite [sig-apps] ReplicationController should serve a basic image on each replica with a public image [Conformance]
Kubernetes e2e suite [sig-apps] ReplicationController should surface a failure condition on a common issue like exceeded quota [Conformance]
Kubernetes e2e suite [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] Should recreate evicted statefulset [Conformance]
Kubernetes e2e suite [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should adopt matching orphans and release non-matching pods
Kubernetes e2e suite [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should have a working scale subresource [Conformance]
Kubernetes e2e suite [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should implement legacy replacement when the update strategy is OnDelete
Kubernetes e2e suite [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should not deadlock when a pod's predecessor fails
Kubernetes e2e suite [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should perform canary updates and phased rolling updates of template modifications [Conformance]
Kubernetes e2e suite [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should perform rolling updates and roll backs of template modifications [Conformance]
Kubernetes e2e suite [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should perform rolling updates and roll backs of template modifications with PVCs
Kubernetes e2e suite [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should provide basic identity
Kubernetes e2e suite [sig-apps] StatefulSet [k8s.io] Deploy clustered applications [Feature:StatefulSet] [Slow] should creating a working CockroachDB cluster
Kubernetes e2e suite [sig-apps] StatefulSet [k8s.io] Deploy clustered applications [Feature:StatefulSet] [Slow] should creating a working mysql cluster
Kubernetes e2e suite [sig-apps] StatefulSet [k8s.io] Deploy clustered applications [Feature:StatefulSet] [Slow] should creating a working redis cluster
Kubernetes e2e suite [sig-apps] StatefulSet [k8s.io] Deploy clustered applications [Feature:StatefulSet] [Slow] should creating a working zookeeper cluster
Kubernetes e2e suite [sig-auth] Advanced Audit [DisabledForLargeClusters][Flaky] should audit API calls to create and delete custom resource definition.
Kubernetes e2e suite [sig-auth] Advanced Audit [DisabledForLargeClusters][Flaky] should audit API calls to create, get, update, patch, delete, list, watch configmaps.
Kubernetes e2e suite [sig-auth] Advanced Audit [DisabledForLargeClusters][Flaky] should audit API calls to create, get, update, patch, delete, list, watch deployments.
Kubernetes e2e suite [sig-auth] Advanced Audit [DisabledForLargeClusters][Flaky] should audit API calls to create, get, update, patch, delete, list, watch pods.
Kubernetes e2e suite [sig-auth] Advanced Audit [DisabledForLargeClusters][Flaky] should audit API calls to create, get, update, patch, delete, list, watch secrets.
Kubernetes e2e suite [sig-auth] Advanced Audit [DisabledForLargeClusters][Flaky] should audit API calls to get a pod with unauthorized user.
Kubernetes e2e suite [sig-auth] Advanced Audit [DisabledForLargeClusters][Flaky] should list pods as impersonated user.
Kubernetes e2e suite [sig-auth] Certificates API should support building a client with a CSR
Kubernetes e2e suite [sig-auth] Metadata Concealment should run a check-metadata-concealment job to completion
Kubernetes e2e suite [sig-auth] PodSecurityPolicy should allow pods under the privileged policy.PodSecurityPolicy
Kubernetes e2e suite [sig-auth] PodSecurityPolicy should enforce the restricted policy.PodSecurityPolicy
Kubernetes e2e suite [sig-auth] PodSecurityPolicy should forbid pod creation when no PSP is available
Kubernetes e2e suite [sig-auth] ServiceAccounts should allow opting out of API token automount [Conformance]
Kubernetes e2e suite [sig-auth] ServiceAccounts should ensure a single API token exists
Kubernetes e2e suite [sig-auth] ServiceAccounts should mount an API token into pods [Conformance]
Kubernetes e2e suite [sig-auth] ServiceAccounts should support InClusterConfig with token rotation [Slow] [Feature:TokenRequestProjection]
Kubernetes e2e suite [sig-auth] [Feature:DynamicAudit] should dynamically audit API calls
Kubernetes e2e suite [sig-auth] [Feature:NodeAuthenticator] The kubelet can delegate ServiceAccount tokens to the API server
Kubernetes e2e suite [sig-auth] [Feature:NodeAuthenticator] The kubelet's main port 10250 should reject requests with no credentials
Kubernetes e2e suite [sig-auth] [Feature:NodeAuthorizer] A node shouldn't be able to create another node
Kubernetes e2e suite [sig-auth] [Feature:NodeAuthorizer] A node shouldn't be able to delete another node
Kubernetes e2e suite [sig-auth] [Feature:NodeAuthorizer] Getting a non-existent configmap should exit with the Forbidden error, not a NotFound error
Kubernetes e2e suite [sig-auth] [Feature:NodeAuthorizer] Getting a non-existent secret should exit with the Forbidden error, not a NotFound error
Kubernetes e2e suite [sig-auth] [Feature:NodeAuthorizer] Getting a secret for a workload the node has access to should succeed
Kubernetes e2e suite [sig-auth] [Feature:NodeAuthorizer] Getting an existing configmap should exit with the Forbidden error
Kubernetes e2e suite [sig-auth] [Feature:NodeAuthorizer] Getting an existing secret should exit with the Forbidden error
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] Should be able to scale a node group down to 0[Feature:ClusterSizeAutoscalingScaleDown]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] Should be able to scale a node group up from 0[Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] Should not scale GPU pool up if pod does not require GPUs [GpuType:] [Feature:ClusterSizeAutoscalingGpu]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] Should scale down GPU pool from 1 [GpuType:] [Feature:ClusterSizeAutoscalingGpu]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] Should scale up GPU pool from 0 [GpuType:] [Feature:ClusterSizeAutoscalingGpu]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] Should scale up GPU pool from 1 [GpuType:] [Feature:ClusterSizeAutoscalingGpu]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] Shouldn't perform scale up operation and should list unhealthy status if most of the cluster is broken[Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] should add node to the particular mig [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] should be able to scale down by draining multiple pods one by one as dictated by pdb[Feature:ClusterSizeAutoscalingScaleDown]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] should be able to scale down by draining system pods with pdb[Feature:ClusterSizeAutoscalingScaleDown]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] should be able to scale down when rescheduling a pod is required and pdb allows for it[Feature:ClusterSizeAutoscalingScaleDown]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] should correctly scale down after a node is not needed [Feature:ClusterSizeAutoscalingScaleDown]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] should correctly scale down after a node is not needed and one node is broken [Feature:ClusterSizeAutoscalingScaleDown]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] should correctly scale down after a node is not needed when there is non autoscaled pool[Feature:ClusterSizeAutoscalingScaleDown]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] should disable node pool autoscaling [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pending pods are small [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pending pods are small and one node is broken [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pending pods are small and there is another node pool that is not autoscaled [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pod requesting EmptyDir volume is pending [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pod requesting volume is pending [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pods are pending due to host port conflict [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pods are pending due to pod anti-affinity [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] should scale down when expendable pod is running [Feature:ClusterSizeAutoscalingScaleDown]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] should scale up correct target pool [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] should scale up when non expendable pod is created [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] shouldn't be able to scale down when rescheduling a pod is required, but pdb doesn't allow drain[Feature:ClusterSizeAutoscalingScaleDown]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] shouldn't increase cluster size if pending pod is too large [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] shouldn't scale down when non expendable pod is running [Feature:ClusterSizeAutoscalingScaleDown]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] shouldn't scale up when expendable pod is created [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] shouldn't scale up when expendable pod is preempted [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [sig-autoscaling] Cluster size autoscaling [Slow] shouldn't trigger additional scale-ups during processing scale-up [Feature:ClusterSizeAutoscalingScaleUp]
Kubernetes e2e suite [sig-autoscaling] DNS horizontal autoscaling [DisabledForLargeClusters] kube-dns-autoscaler should scale kube-dns pods in both nonfaulty and faulty scenarios
Kubernetes e2e suite [sig-autoscaling] DNS horizontal autoscaling [Serial] [Slow] kube-dns-autoscaler should scale kube-dns pods when cluster size changed
Kubernetes e2e suite [sig-autoscaling] [Feature:ClusterSizeAutoscalingScaleUp] [Slow] Autoscaling [sig-autoscaling] Autoscaling a service from 1 pod and 3 nodes to 8 pods and >=4 nodes takes less than 15 minutes
Kubernetes e2e suite [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] ReplicationController light Should scale from 1 pod to 2 pods
Kubernetes e2e suite [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] ReplicationController light Should scale from 2 pods to 1 pod [Slow]
Kubernetes e2e suite [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] Deployment Should scale from 1 pod to 3 pods and from 3 to 5
Kubernetes e2e suite [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] Deployment Should scale from 5 pods to 3 pods and from 3 to 1
Kubernetes e2e suite [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] ReplicaSet Should scale from 1 pod to 3 pods and from 3 to 5
Kubernetes e2e suite [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] ReplicaSet Should scale from 5 pods to 3 pods and from 3 to 1
Kubernetes e2e suite [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] ReplicationController Should scale from 1 pod to 3 pods and from 3 to 5 and verify decision stability
Kubernetes e2e suite [sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] ReplicationController Should scale from 5 pods to 3 pods and from 3 to 1 and verify decision stability
Kubernetes e2e suite [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with Custom Metric of type Object from Stackdriver [Feature:CustomMetricsAutoscaling]
Kubernetes e2e suite [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with Custom Metric of type Pod from Stackdriver [Feature:CustomMetricsAutoscaling]
Kubernetes e2e suite [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with Custom Metric of type Pod from Stackdriver with Prometheus [Feature:CustomMetricsAutoscaling]
Kubernetes e2e suite [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with External Metric with target average value from Stackdriver [Feature:CustomMetricsAutoscaling]
Kubernetes e2e suite [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with External Metric with target value from Stackdriver [Feature:CustomMetricsAutoscaling]
Kubernetes e2e suite [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale up with two External metrics from Stackdriver [Feature:CustomMetricsAutoscaling]
Kubernetes e2e suite [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale up with two metrics of type Pod from Stackdriver [Feature:CustomMetricsAutoscaling]
Kubernetes e2e suite [sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 should support forwarding over websockets
Kubernetes e2e suite [sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 that expects NO client request should support a client that connects, sends DATA, and disconnects
Kubernetes e2e suite [sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 that expects a client request should support a client that connects, sends DATA, and disconnects
Kubernetes e2e suite [sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 that expects a client request should support a client that connects, sends NO DATA, and disconnects
Kubernetes e2e suite [sig-cli] Kubectl Port forwarding With a server listening on localhost should support forwarding over websockets
Kubernetes e2e suite [sig-cli] Kubectl Port forwarding With a server listening on localhost that expects NO client request should support a client that connects, sends DATA, and disconnects
Kubernetes e2e suite [sig-cli] Kubectl Port forwarding With a server listening on localhost that expects a client request should support a client that connects, sends DATA, and disconnects
Kubernetes e2e suite [sig-cli] Kubectl Port forwarding With a server listening on localhost that expects a client request should support a client that connects, sends NO DATA, and disconnects
Kubernetes e2e suite [sig-cli] Kubectl alpha client Kubectl run CronJob should create a CronJob
Kubernetes e2e suite [sig-cli] Kubectl client Guestbook application should create and stop a working application [Conformance]
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl api-versions should check if v1 is in available api versions [Conformance]
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl apply apply set/view last-applied
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl apply should apply a new configuration to an existing RC
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl apply should reuse port when apply to an existing SVC
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl client-side validation should create/apply a CR with unknown fields for CRD with no validation schema
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl client-side validation should create/apply a valid CR for CRD with validation schema
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl client-side validation should create/apply a valid CR with arbitrary-extra properties for CRD with partially-specified validation schema
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl cluster-info dump should check if cluster-info dump succeeds
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl cluster-info should check if Kubernetes master services is included in cluster-info [Conformance]
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl copy should copy a file from a running Pod
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl create quota should create a quota with scopes
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl create quota should create a quota without scopes
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl create quota should reject quota with invalid scopes
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl describe should check if kubectl describe prints relevant information for cronjob
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl describe should check if kubectl describe prints relevant information for rc and pods [Conformance]
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl expose should create services for rc [Conformance]
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl get componentstatuses should get componentstatuses
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl label should update the label on a resource [Conformance]
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl logs should be able to retrieve and filter logs [Conformance]
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl patch should add annotations for pods in rc [Conformance]
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl replace should update a single-container pod's image [Conformance]
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl rolling-update should support rolling-update to same image [Conformance]
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl run --rm job should create a job from an image, then delete the job [Conformance]
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl run CronJob should create a CronJob
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl run default should create an rc or deployment from an image [Conformance]
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl run deployment should create a deployment from an image [Conformance]
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl run job should create a job from an image when restart is OnFailure [Conformance]
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl run pod should create a pod from an image when restart is Never [Conformance]
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl run rc should create an rc from an image [Conformance]
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl taint [Serial] should remove all the taints with the same key off a node
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl taint [Serial] should update the taint on a node
Kubernetes e2e suite [sig-cli] Kubectl client Kubectl version should check is all data is printed [Conformance]
Kubernetes e2e suite [sig-cli] Kubectl client Proxy server should support --unix-socket=/path [Conformance]
Kubernetes e2e suite [sig-cli] Kubectl client Proxy server should support proxy with --port 0 [Conformance]
Kubernetes e2e suite [sig-cli] Kubectl client Simple pod should contain last line of the log
Kubernetes e2e suite [sig-cli] Kubectl client Simple pod should handle in-cluster config
Kubernetes e2e suite [sig-cli] Kubectl client Simple pod should return command exit codes
Kubernetes e2e suite [sig-cli] Kubectl client Simple pod should support exec
Kubernetes e2e suite [sig-cli] Kubectl client Simple pod should support exec through an HTTP proxy
Kubernetes e2e suite [sig-cli] Kubectl client Simple pod should support exec through kubectl proxy
Kubernetes e2e suite [sig-cli] Kubectl client Simple pod should support exec using resource/name
Kubernetes e2e suite [sig-cli] Kubectl client Simple pod should support inline execution and attach
Kubernetes e2e suite [sig-cli] Kubectl client Simple pod should support port-forward
Kubernetes e2e suite [sig-cli] Kubectl client Update Demo should create and stop a replication controller [Conformance]
Kubernetes e2e suite [sig-cli] Kubectl client Update Demo should do a rolling update of a replication controller [Conformance]
Kubernetes e2e suite [sig-cli] Kubectl client Update Demo should scale a replication controller [Conformance]
Kubernetes e2e suite [sig-cluster-lifecycle] [Feature:BootstrapTokens] should delete the signed bootstrap tokens from clusterInfo ConfigMap when bootstrap token is deleted
Kubernetes e2e suite [sig-cluster-lifecycle] [Feature:BootstrapTokens] should delete the token secret when the secret expired
Kubernetes e2e suite [sig-cluster-lifecycle] [Feature:BootstrapTokens] should not delete the token secret when the secret is not expired
Kubernetes e2e suite [sig-cluster-lifecycle] [Feature:BootstrapTokens] should resign the bootstrap tokens when the clusterInfo ConfigMap updated [Serial][Disruptive]
Kubernetes e2e suite [sig-cluster-lifecycle] [Feature:BootstrapTokens] should sign the new added bootstrap tokens
Kubernetes e2e suite [sig-instrumentation] Cadvisor should be healthy on every node.
Kubernetes e2e suite [sig-instrumentation] Cluster level logging implemented by Stackdriver [Feature:StackdriverLogging] [Soak] should ingest logs from applications running for a prolonged amount of time
Kubernetes e2e suite [sig-instrumentation] Cluster level logging implemented by Stackdriver should ingest events [Feature:StackdriverLogging]
Kubernetes e2e suite [sig-instrumentation] Cluster level logging implemented by Stackdriver should ingest logs [Feature:StackdriverLogging]
Kubernetes e2e suite [sig-instrumentation] Cluster level logging implemented by Stackdriver should ingest system logs from all nodes [Feature:StackdriverLogging]
Kubernetes e2e suite [sig-instrumentation] Cluster level logging using Elasticsearch [Feature:Elasticsearch] should check that logs from containers are ingested into Elasticsearch
Kubernetes e2e suite [sig-instrumentation] Kibana Logging Instances Is Alive [Feature:Elasticsearch] should check that the Kibana logging instance is alive
Kubernetes e2e suite [sig-instrumentation] Logging soak [Performance] [Slow] [Disruptive] should survive logging 1KB every 1s seconds, for a duration of 2m0s
Kubernetes e2e suite [sig-instrumentation] MetricsGrabber should grab all metrics from API server.
Kubernetes e2e suite [sig-instrumentation] MetricsGrabber should grab all metrics from a ControllerManager.
Kubernetes e2e suite [sig-instrumentation] MetricsGrabber should grab all metrics from a Kubelet.
Kubernetes e2e suite [sig-instrumentation] MetricsGrabber should grab all metrics from a Scheduler.
Kubernetes e2e suite [sig-instrumentation] Stackdriver Monitoring should have accelerator metrics [Feature:StackdriverAcceleratorMonitoring]
Kubernetes e2e suite [sig-instrumentation] Stackdriver Monitoring should have cluster metrics [Feature:StackdriverMonitoring]
Kubernetes e2e suite [sig-instrumentation] Stackdriver Monitoring should run Custom Metrics - Stackdriver Adapter for external metrics [Feature:StackdriverExternalMetrics]
Kubernetes e2e suite [sig-instrumentation] Stackdriver Monitoring should run Custom Metrics - Stackdriver Adapter for new resource model [Feature:StackdriverCustomMetrics]
Kubernetes e2e suite [sig-instrumentation] Stackdriver Monitoring should run Custom Metrics - Stackdriver Adapter for old resource model [Feature:StackdriverCustomMetrics]
Kubernetes e2e suite [sig-instrumentation] Stackdriver Monitoring should run Stackdriver Metadata Agent [Feature:StackdriverMetadataAgent]
Kubernetes e2e suite [sig-network] ClusterDns [Feature:Example] should create pod that uses dns
Kubernetes e2e suite [sig-network] DNS configMap federations [Feature:Federation] should be able to change federation configuration [Slow][Serial]
Kubernetes e2e suite [sig-network] DNS configMap nameserver [Feature:Networking-IPv6] [LinuxOnly] Change stubDomain should be able to change stubDomain configuration [Slow][Serial]
Kubernetes e2e suite [sig-network] DNS configMap nameserver [Feature:Networking-IPv6] [LinuxOnly] Forward PTR lookup should forward PTR records lookup to upstream nameserver [Slow][Serial]
Kubernetes e2e suite [sig-network] DNS configMap nameserver [Feature:Networking-IPv6] [LinuxOnly] Forward external name lookup should forward externalname lookup to upstream nameserver [Slow][Serial]
Kubernetes e2e suite [sig-network] DNS configMap nameserver [IPv4] Change stubDomain should be able to change stubDomain configuration [Slow][Serial]
Kubernetes e2e suite [sig-network] DNS configMap nameserver [IPv4] Forward PTR lookup should forward PTR records lookup to upstream nameserver [Slow][Serial]
Kubernetes e2e suite [sig-network] DNS configMap nameserver [IPv4] Forward external name lookup should forward externalname lookup to upstream nameserver [Slow][Serial]
Kubernetes e2e suite [sig-network] DNS should provide /etc/hosts entries for the cluster [LinuxOnly] [Conformance]
Kubernetes e2e suite [sig-network] DNS should provide DNS for ExternalName services [Conformance]
Kubernetes e2e suite [sig-network] DNS should provide DNS for pods for Hostname [LinuxOnly] [Conformance]
Kubernetes e2e suite [sig-network] DNS should provide DNS for pods for Subdomain [Conformance]
Kubernetes e2e suite [sig-network] DNS should provide DNS for services [Conformance]
Kubernetes e2e suite [sig-network] DNS should provide DNS for the cluster [Conformance]
Kubernetes e2e suite [sig-network] DNS should provide DNS for the cluster [Provider:GCE]
Kubernetes e2e suite [sig-network] DNS should resolve DNS of partial qualified names for services [LinuxOnly] [Conformance]
Kubernetes e2e suite [sig-network] DNS should resolve DNS of partial qualified names for the cluster [LinuxOnly]
Kubernetes e2e suite [sig-network] DNS should support configurable pod DNS nameservers [Conformance]
Kubernetes e2e suite [sig-network] DNS should support configurable pod resolv.conf
Kubernetes e2e suite [sig-network] ESIPP [Slow] [DisabledForLargeClusters] should handle updates to ExternalTrafficPolicy field
Kubernetes e2e suite [sig-network] ESIPP [Slow] [DisabledForLargeClusters] should only target nodes with endpoints
Kubernetes e2e suite [sig-network] ESIPP [Slow] [DisabledForLargeClusters] should work for type=LoadBalancer
Kubernetes e2e suite [sig-network] ESIPP [Slow] [DisabledForLargeClusters] should work for type=NodePort
Kubernetes e2e suite [sig-network] ESIPP [Slow] [DisabledForLargeClusters] should work from pods
Kubernetes e2e suite [sig-network] Firewall rule [Slow] [Serial] should create valid firewall rules for LoadBalancer type service
Kubernetes e2e suite [sig-network] Firewall rule should have correct firewall rules for e2e cluster
Kubernetes e2e suite [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:Ingress] multicluster ingress should get instance group annotation
Kubernetes e2e suite [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:Ingress] should conform to Ingress spec
Kubernetes e2e suite [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:Ingress] should create ingress with pre-shared certificate
Kubernetes e2e suite [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:Ingress] should support multiple TLS certs
Kubernetes e2e suite [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] rolling update backend pods should not cause service disruption
Kubernetes e2e suite [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] should be able to create a ClusterIP service
Kubernetes e2e suite [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] should be able to switch between IG and NEG modes
Kubernetes e2e suite [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] should conform to Ingress spec
Kubernetes e2e suite [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] should create NEGs for all ports with the Ingress annotation, and NEGs for the standalone annotation otherwise
Kubernetes e2e suite [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] should sync endpoints for both Ingress-referenced NEG and standalone NEG
Kubernetes e2e suite [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] should sync endpoints to NEG
Kubernetes e2e suite [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:kubemci] should conform to Ingress spec
Kubernetes e2e suite [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:kubemci] should create ingress with backend HTTPS
Kubernetes e2e suite [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:kubemci] should create ingress with pre-shared certificate
Kubernetes e2e suite [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:kubemci] should remove clusters as expected
Kubernetes e2e suite [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:kubemci] should support https-only annotation
Kubernetes e2e suite [sig-network] Loadbalancing: L7 GCE [Slow] [Feature:kubemci] single and multi-cluster ingresses should be able to exist together
Kubernetes e2e suite [sig-network] Loadbalancing: L7 Scalability GCE [Slow] [Serial] [Feature:IngressScale] Creating and updating ingresses should happen promptly with small/medium/large amount of ingresses
Kubernetes e2e suite [sig-network] Loadbalancing: L7 [Slow] Nginx should conform to Ingress spec
Kubernetes e2e suite [sig-network] Network should set TCP CLOSE_WAIT timeout
Kubernetes e2e suite [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy]
Kubernetes e2e suite [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow egress access to server in CIDR block [Feature:NetworkPolicy]
Kubernetes e2e suite [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy]
Kubernetes e2e suite [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow ingress access from updated namespace [Feature:NetworkPolicy]
Kubernetes e2e suite [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow ingress access from updated pod [Feature:NetworkPolicy]
Kubernetes e2e suite [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy]
Kubernetes e2e suite [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce egress policy allowing traffic to a server in a different namespace based on PodSelector and NamespaceSelector [Feature:NetworkPolicy]
Kubernetes e2e suite [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce multiple egress policies with egress allow-all policy taking precedence [Feature:NetworkPolicy]
Kubernetes e2e suite [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce multiple ingress policies with ingress allow-all policy taking precedence [Feature:NetworkPolicy]
Kubernetes e2e suite [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce multiple, stacked policies with overlapping podSelectors [Feature:NetworkPolicy]
Kubernetes e2e suite [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policies to check ingress and egress policies can be controlled independently based on PodSelector [Feature:NetworkPolicy]
Kubernetes e2e suite [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on NamespaceSelector with MatchExpressions[Feature:NetworkPolicy]
Kubernetes e2e suite [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy]
Kubernetes e2e suite [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on PodSelector or NamespaceSelector [Feature:NetworkPolicy]
Kubernetes e2e suite [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on PodSelector with MatchExpressions[Feature:NetworkPolicy]
Kubernetes e2e suite [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on Ports [Feature:NetworkPolicy]
Kubernetes e2e suite [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy to allow traffic from pods within server namespace based on PodSelector [Feature:NetworkPolicy]
Kubernetes e2e suite [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy to allow traffic only from a different namespace, based on NamespaceSelector [Feature:NetworkPolicy]
Kubernetes e2e suite [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy to allow traffic only from a pod in a different namespace based on PodSelector and NamespaceSelector [Feature:NetworkPolicy]
Kubernetes e2e suite [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce updated policy [Feature:NetworkPolicy]
Kubernetes e2e suite [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy]
Kubernetes e2e suite [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should support a 'default-deny' policy [Feature:NetworkPolicy]
Kubernetes e2e suite [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should support allow-all policy [Feature:NetworkPolicy]
Kubernetes e2e suite [sig-network] Networking Granular Checks: Pods should function for intra-pod communication: http [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-network] Networking Granular Checks: Pods should function for intra-pod communication: udp [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-network] Networking Granular Checks: Pods should function for node-pod communication: http [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-network] Networking Granular Checks: Pods should function for node-pod communication: udp [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-network] Networking Granular Checks: Services should function for client IP based session affinity: http [LinuxOnly]
Kubernetes e2e suite [sig-network] Networking Granular Checks: Services should function for client IP based session affinity: udp [LinuxOnly]
Kubernetes e2e suite [sig-network] Networking Granular Checks: Services should function for endpoint-Service: http
Kubernetes e2e suite [sig-network] Networking Granular Checks: Services should function for endpoint-Service: udp
Kubernetes e2e suite [sig-network] Networking Granular Checks: Services should function for node-Service: http
Kubernetes e2e suite [sig-network] Networking Granular Checks: Services should function for node-Service: udp
Kubernetes e2e suite [sig-network] Networking Granular Checks: Services should function for pod-Service: http
Kubernetes e2e suite [sig-network] Networking Granular Checks: Services should function for pod-Service: udp
Kubernetes e2e suite [sig-network] Networking Granular Checks: Services should update endpoints: http
Kubernetes e2e suite [sig-network] Networking Granular Checks: Services should update endpoints: udp
Kubernetes e2e suite [sig-network] Networking IPerf IPv4 [Experimental] [Feature:Networking-IPv4] [Slow] [Feature:Networking-Performance] should transfer ~ 1GB onto the service endpoint 1 servers (maximum of 1 clients)
Kubernetes e2e suite [sig-network] Networking IPerf IPv6 [Experimental] [Feature:Networking-IPv6] [Slow] [Feature:Networking-Performance] [LinuxOnly] should transfer ~ 1GB onto the service endpoint 1 servers (maximum of 1 clients)
Kubernetes e2e suite [sig-network] Networking should check kube-proxy urls
Kubernetes e2e suite [sig-network] Networking should provide Internet connection for containers [Feature:Networking-IPv4]
Kubernetes e2e suite [sig-network] Networking should provide Internet connection for containers [Feature:Networking-IPv6][Experimental][LinuxOnly]
Kubernetes e2e suite [sig-network] Networking should provide unchanging, static URL paths for kubernetes api services
Kubernetes e2e suite [sig-network] Networking should recreate its iptables rules if they are deleted [Disruptive]
Kubernetes e2e suite [sig-network] NoSNAT [Feature:NoSNAT] [Slow] Should be able to send traffic between Pods without SNAT
Kubernetes e2e suite [sig-network] Proxy version v1 should proxy logs on node using proxy subresource [Conformance]
Kubernetes e2e suite [sig-network] Proxy version v1 should proxy logs on node with explicit kubelet port using proxy subresource [Conformance]
Kubernetes e2e suite [sig-network] Proxy version v1 should proxy through a service and a pod [Conformance]
Kubernetes e2e suite [sig-network] Service endpoints latency should not be very high [Conformance]
Kubernetes e2e suite [sig-network] Services [Feature:GCEAlphaFeature][Slow] should be able to create and tear down a standard-tier load balancer [Slow]
Kubernetes e2e suite [sig-network] Services should allow pods to hairpin back to themselves through services
Kubernetes e2e suite [sig-network] Services should be able to change the type and ports of a service [Slow] [DisabledForLargeClusters]
Kubernetes e2e suite [sig-network] Services should be able to change the type from ClusterIP to ExternalName [Conformance]
Kubernetes e2e suite [sig-network] Services should be able to change the type from ExternalName to ClusterIP [Conformance]
Kubernetes e2e suite [sig-network] Services should be able to change the type from ExternalName to NodePort [Conformance]
Kubernetes e2e suite [sig-network] Services should be able to change the type from NodePort to ExternalName [Conformance]
Kubernetes e2e suite [sig-network] Services should be able to create a functioning NodePort service [Conformance]
Kubernetes e2e suite [sig-network] Services should be able to create an internal type load balancer [Slow] [DisabledForLargeClusters]
Kubernetes e2e suite [sig-network] Services should be able to switch session affinity for NodePort service [LinuxOnly]
Kubernetes e2e suite [sig-network] Services should be able to switch session affinity for service with type clusterIP [LinuxOnly]
Kubernetes e2e suite [sig-network] Services should be able to up and down services
Kubernetes e2e suite [sig-network] Services should be able to update service type to NodePort listening on same port number but different protocols
Kubernetes e2e suite [sig-network] Services should be rejected when no endpoints exist
Kubernetes e2e suite [sig-network] Services should check NodePort out-of-range
Kubernetes e2e suite [sig-network] Services should create endpoints for unready pods
Kubernetes e2e suite [sig-network] Services should have session affinity work for NodePort service [LinuxOnly]
Kubernetes e2e suite [sig-network] Services should have session affinity work for service with type clusterIP [LinuxOnly]
Kubernetes e2e suite [sig-network] Services should implement service.kubernetes.io/headless
Kubernetes e2e suite [sig-network] Services should implement service.kubernetes.io/service-proxy-name
Kubernetes e2e suite [sig-network] Services should only allow access from service loadbalancer source ranges [Slow]
Kubernetes e2e suite [sig-network] Services should preserve source pod IP for traffic thru service cluster IP [LinuxOnly]
Kubernetes e2e suite [sig-network] Services should prevent NodePort collisions
Kubernetes e2e suite [sig-network] Services should provide secure master service [Conformance]
Kubernetes e2e suite [sig-network] Services should reconcile LB health check interval [Slow][Serial]
Kubernetes e2e suite [sig-network] Services should release NodePorts on delete
Kubernetes e2e suite [sig-network] Services should serve a basic endpoint from pods [Conformance]
Kubernetes e2e suite [sig-network] Services should serve multiport endpoints from pods [Conformance]
Kubernetes e2e suite [sig-network] Services should work after restarting apiserver [Disruptive]
Kubernetes e2e suite [sig-network] Services should work after restarting kube-proxy [Disruptive]
Kubernetes e2e suite [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] should be able to reach pod on ipv4 and ipv6 ip [Feature:IPv6DualStackAlphaFeature:Phase2]
Kubernetes e2e suite [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] should create pod, add ipv6 and ipv4 ip to pod ips
Kubernetes e2e suite [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] should create service with cluster ip from primary service range [Feature:IPv6DualStackAlphaFeature:Phase2]
Kubernetes e2e suite [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] should create service with ipv4 cluster ip [Feature:IPv6DualStackAlphaFeature:Phase2]
Kubernetes e2e suite [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] should create service with ipv6 cluster ip [Feature:IPv6DualStackAlphaFeature:Phase2]
Kubernetes e2e suite [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] should have ipv4 and ipv6 internal node ip
Kubernetes e2e suite [sig-network] [Feature:IPv6DualStackAlphaFeature] [LinuxOnly] should have ipv4 and ipv6 node podCIDRs
Kubernetes e2e suite [sig-network] [Feature:PerformanceDNS][Serial] Should answer DNS query for maximum number of services per cluster
Kubernetes e2e suite [sig-network] [sig-windows] Networking Granular Checks: Pods should function for intra-pod communication: http
Kubernetes e2e suite [sig-network] [sig-windows] Networking Granular Checks: Pods should function for intra-pod communication: udp
Kubernetes e2e suite [sig-network] [sig-windows] Networking Granular Checks: Pods should function for node-pod communication: http
Kubernetes e2e suite [sig-network] [sig-windows] Networking Granular Checks: Pods should function for node-pod communication: udp
Kubernetes e2e suite [sig-node] ConfigMap should be consumable via environment variable [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-node] ConfigMap should be consumable via the environment [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-node] ConfigMap should fail to create ConfigMap with empty key [Conformance]
Kubernetes e2e suite [sig-node] ConfigMap should update ConfigMap successfully
Kubernetes e2e suite [sig-node] Downward API should provide container's limits.cpu/memory and requests.cpu/memory as env vars [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-node] Downward API should provide default limits.cpu/memory from node allocatable [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-node] Downward API should provide host IP and pod IP as an env var if pod uses host network [LinuxOnly]
Kubernetes e2e suite [sig-node] Downward API should provide host IP as an env var [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-node] Downward API should provide pod UID as env vars [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-node] Downward API should provide pod name, namespace and IP address as env vars [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-node] RuntimeClass should reject a Pod requesting a RuntimeClass with an unconfigured handler
Kubernetes e2e suite [sig-node] RuntimeClass should reject a Pod requesting a RuntimeClass with conflicting node selector
Kubernetes e2e suite [sig-node] RuntimeClass should reject a Pod requesting a deleted RuntimeClass
Kubernetes e2e suite [sig-node] RuntimeClass should reject a Pod requesting a non-existent RuntimeClass
Kubernetes e2e suite [sig-node] RuntimeClass should run a Pod requesting a RuntimeClass with a configured handler [NodeFeature:RuntimeHandler]
Kubernetes e2e suite [sig-node] RuntimeClass should run a Pod requesting a RuntimeClass with scheduling [NodeFeature:RuntimeHandler] [Disruptive]
Kubernetes e2e suite [sig-scheduling] GPUDevicePluginAcrossRecreate [Feature:Recreate] run Nvidia GPU Device Plugin tests with a recreation
Kubernetes e2e suite [sig-scheduling] LimitRange should create a LimitRange with defaults and ensure pod has those defaults applied.
Kubernetes e2e suite [sig-scheduling] Multi-AZ Cluster Volumes [sig-storage] should only be allowed to provision PDs in zones where nodes exist
Kubernetes e2e suite [sig-scheduling] Multi-AZ Cluster Volumes [sig-storage] should schedule pods in the same zones as statically provisioned PVs
Kubernetes e2e suite [sig-scheduling] Multi-AZ Clusters should spread the pods of a replication controller across zones
Kubernetes e2e suite [sig-scheduling] Multi-AZ Clusters should spread the pods of a service across zones
Kubernetes e2e suite [sig-scheduling] NoExecuteTaintManager Multiple Pods [Serial] evicts pods with minTolerationSeconds [Disruptive] [Conformance]
Kubernetes e2e suite [sig-scheduling] NoExecuteTaintManager Multiple Pods [Serial] only evicts pods without tolerations from tainted nodes
Kubernetes e2e suite [sig-scheduling] NoExecuteTaintManager Single Pod [Serial] doesn't evict pod with tolerations from tainted nodes
Kubernetes e2e suite [sig-scheduling] NoExecuteTaintManager Single Pod [Serial] eventually evict pod with finite tolerations from tainted nodes
Kubernetes e2e suite [sig-scheduling] NoExecuteTaintManager Single Pod [Serial] evicts pods from tainted nodes
Kubernetes e2e suite [sig-scheduling] NoExecuteTaintManager Single Pod [Serial] removing taint cancels eviction [Disruptive] [Conformance]
Kubernetes e2e suite [sig-scheduling] PreemptionExecutionPath runs ReplicaSets to verify preemption running path
Kubernetes e2e suite [sig-scheduling] SchedulerPredicates [Serial] validates MaxPods limit number of pods that are allowed to run [Slow]
Kubernetes e2e suite [sig-scheduling] SchedulerPredicates [Serial] validates local ephemeral storage resource limits of pods that are allowed to run [Feature:LocalStorageCapacityIsolation]
Kubernetes e2e suite [sig-scheduling] SchedulerPredicates [Serial] validates resource limits of pods that are allowed to run [Conformance]
Kubernetes e2e suite [sig-scheduling] SchedulerPredicates [Serial] validates that NodeAffinity is respected if not matching
Kubernetes e2e suite [sig-scheduling] SchedulerPredicates [Serial] validates that NodeSelector is respected if matching [Conformance]
Kubernetes e2e suite [sig-scheduling] SchedulerPredicates [Serial] validates that NodeSelector is respected if not matching [Conformance]
Kubernetes e2e suite [sig-scheduling] SchedulerPredicates [Serial] validates that required NodeAffinity setting is respected if matching
Kubernetes e2e suite [sig-scheduling] SchedulerPredicates [Serial] validates that taints-tolerations is respected if matching
Kubernetes e2e suite [sig-scheduling] SchedulerPredicates [Serial] validates that taints-tolerations is respected if not matching
Kubernetes e2e suite [sig-scheduling] SchedulerPredicates [Serial] validates that there exists conflict between pods with same hostPort and protocol but one using 0.0.0.0 hostIP [Conformance]
Kubernetes e2e suite [sig-scheduling] SchedulerPredicates [Serial] validates that there is no conflict between pods with same hostPort but different hostIP and protocol [Conformance]
Kubernetes e2e suite [sig-scheduling] SchedulerPreemption [Serial] validates basic preemption works
Kubernetes e2e suite [sig-scheduling] SchedulerPreemption [Serial] validates lower priority pod preemption by critical pod
Kubernetes e2e suite [sig-scheduling] SchedulerPriorities [Serial] Pod should avoid nodes that have avoidPod annotation
Kubernetes e2e suite [sig-scheduling] SchedulerPriorities [Serial] Pod should be preferably scheduled to nodes pod can tolerate
Kubernetes e2e suite [sig-scheduling] SchedulerPriorities [Serial] Pod should be scheduled to node that don't match the PodAntiAffinity terms
Kubernetes e2e suite [sig-scheduling] [Feature:GPUDevicePlugin] run Nvidia GPU Device Plugin tests
Kubernetes e2e suite [sig-service-catalog] [Feature:PodPreset] PodPreset should create a pod preset
Kubernetes e2e suite [sig-service-catalog] [Feature:PodPreset] PodPreset should not modify the pod on conflict
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Slow][Serial]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic Snapshot] snapshottable should create snapshot with defaults [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: inline ephemeral CSI volume] ephemeral should create read-only inline ephemeral volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: inline ephemeral CSI volume] ephemeral should create read/write inline ephemeral volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: inline ephemeral CSI volume] ephemeral should support multiple inline ephemeral volumes
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: inline ephemeral CSI volume] ephemeral should support two pods which share the same volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Slow][Serial]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic Snapshot] snapshottable should create snapshot with defaults [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: inline ephemeral CSI volume] ephemeral should create read-only inline ephemeral volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: inline ephemeral CSI volume] ephemeral should create read/write inline ephemeral volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: inline ephemeral CSI volume] ephemeral should support multiple inline ephemeral volumes
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: inline ephemeral CSI volume] ephemeral should support two pods which share the same volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Slow][Serial]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic Snapshot] snapshottable should create snapshot with defaults [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: inline ephemeral CSI volume] ephemeral should create read-only inline ephemeral volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: inline ephemeral CSI volume] ephemeral should create read/write inline ephemeral volume
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: inline ephemeral CSI volume] ephemeral should support multiple inline ephemeral volumes
Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: inline ephemeral CSI volume] ephemeral should support two pods which share the same volume
Kubernetes e2e suite [sig-storage] CSI mock volume CSI Volume expansion should expand volume by restarting pod if attach=off, nodeExpansion=on
Kubernetes e2e suite [sig-storage] CSI mock volume CSI Volume expansion should expand volume by restarting pod if attach=on, nodeExpansion=on
Kubernetes e2e suite [sig-storage] CSI mock volume CSI Volume expansion should expand volume without restarting pod if nodeExpansion=off
Kubernetes e2e suite [sig-storage] CSI mock volume CSI Volume expansion should not expand volume if resizingOnDriver=off, resizingOnSC=on
Kubernetes e2e suite [sig-storage] CSI mock volume CSI attach test using mock driver should not require VolumeAttach for drivers without attachment
Kubernetes e2e suite [sig-storage] CSI mock volume CSI attach test using mock driver should preserve attachment policy when no CSIDriver present
Kubernetes e2e suite [sig-storage] CSI mock volume CSI attach test using mock driver should require VolumeAttach for drivers with attachment
Kubernetes e2e suite [sig-storage] CSI mock volume CSI online volume expansion should expand volume without restarting pod if attach=off, nodeExpansion=on
Kubernetes e2e suite [sig-storage] CSI mock volume CSI online volume expansion should expand volume without restarting pod if attach=on, nodeExpansion=on
Kubernetes e2e suite [sig-storage] CSI mock volume CSI workload information using mock driver contain ephemeral=true when using inline volume
Kubernetes e2e suite [sig-storage] CSI mock volume CSI workload information using mock driver should be passed when podInfoOnMount=true
Kubernetes e2e suite [sig-storage] CSI mock volume CSI workload information using mock driver should not be passed when CSIDriver does not exist
Kubernetes e2e suite [sig-storage] CSI mock volume CSI workload information using mock driver should not be passed when podInfoOnMount=false
Kubernetes e2e suite [sig-storage] CSI mock volume CSI workload information using mock driver should not be passed when podInfoOnMount=nil
Kubernetes e2e suite [sig-storage] ConfigMap binary data should be reflected in volume [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] ConfigMap optional updates should be reflected in volume [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] ConfigMap should be consumable from pods in volume [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] ConfigMap should be consumable from pods in volume as non-root [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] ConfigMap should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]
Kubernetes e2e suite [sig-storage] ConfigMap should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeFeature:FSGroup]
Kubernetes e2e suite [sig-storage] ConfigMap should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] ConfigMap should be consumable from pods in volume with mappings [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] ConfigMap should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] ConfigMap should be consumable from pods in volume with mappings as non-root [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] ConfigMap should be consumable from pods in volume with mappings as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]
Kubernetes e2e suite [sig-storage] ConfigMap should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] ConfigMap updates should be reflected in volume [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Detaching volumes should not work when mount is in progress [Slow]
Kubernetes e2e suite [sig-storage] Downward API volume should provide container's cpu limit [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Downward API volume should provide container's cpu request [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Downward API volume should provide container's memory limit [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Downward API volume should provide container's memory request [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Downward API volume should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Downward API volume should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Downward API volume should provide podname as non-root with fsgroup [LinuxOnly] [NodeFeature:FSGroup]
Kubernetes e2e suite [sig-storage] Downward API volume should provide podname as non-root with fsgroup and defaultMode [LinuxOnly] [NodeFeature:FSGroup]
Kubernetes e2e suite [sig-storage] Downward API volume should provide podname only [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Downward API volume should set DefaultMode on files [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Downward API volume should set mode on item file [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Downward API volume should update annotations on modification [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Downward API volume should update labels on modification [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Dynamic Provisioning DynamicProvisioner Default should be disabled by changing the default annotation [Serial] [Disruptive]
Kubernetes e2e suite [sig-storage] Dynamic Provisioning DynamicProvisioner Default should be disabled by removing the default annotation [Serial] [Disruptive]
Kubernetes e2e suite [sig-storage] Dynamic Provisioning DynamicProvisioner Default should create and delete default persistent volumes [Slow]
Kubernetes e2e suite [sig-storage] Dynamic Provisioning DynamicProvisioner [Slow] deletion should be idempotent
Kubernetes e2e suite [sig-storage] Dynamic Provisioning DynamicProvisioner [Slow] should not provision a volume in an unmanaged GCE zone.
Kubernetes e2e suite [sig-storage] Dynamic Provisioning DynamicProvisioner [Slow] should provision storage with non-default reclaim policy Retain
Kubernetes e2e suite [sig-storage] Dynamic Provisioning DynamicProvisioner [Slow] should test that deleting a claim before the volume is provisioned deletes the volume.
Kubernetes e2e suite [sig-storage] Dynamic Provisioning Invalid AWS KMS key should report an error and create no PV
Kubernetes e2e suite [sig-storage] Dynamic Provisioning [k8s.io] GlusterDynamicProvisioner should create and delete persistent volumes [fast]
Kubernetes e2e suite [sig-storage] EmptyDir volumes pod should support shared volumes between containers [Conformance]
Kubernetes e2e suite [sig-storage] EmptyDir volumes should support (non-root,0644,default) [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] EmptyDir volumes should support (non-root,0644,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] EmptyDir volumes should support (non-root,0666,default) [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] EmptyDir volumes should support (non-root,0666,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] EmptyDir volumes should support (non-root,0777,default) [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] EmptyDir volumes should support (non-root,0777,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] EmptyDir volumes should support (root,0644,default) [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] EmptyDir volumes should support (root,0644,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] EmptyDir volumes should support (root,0666,default) [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] EmptyDir volumes should support (root,0666,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] EmptyDir volumes should support (root,0777,default) [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] EmptyDir volumes should support (root,0777,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] EmptyDir volumes volume on default medium should have the correct mode [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] EmptyDir volumes volume on tmpfs should have the correct mode [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] files with FSGroup ownership should support (root,0644,tmpfs)
Kubernetes e2e suite [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] new files should be created with FSGroup ownership when container is non-root
Kubernetes e2e suite [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] new files should be created with FSGroup ownership when container is root
Kubernetes e2e suite [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] nonexistent volume subPath should have the correct mode and owner using FSGroup
Kubernetes e2e suite [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] volume on default medium should have the correct mode using FSGroup
Kubernetes e2e suite [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] volume on tmpfs should have the correct mode using FSGroup
Kubernetes e2e suite [sig-storage] EmptyDir wrapper volumes should not cause race condition when used for configmaps [Serial] [Conformance]
Kubernetes e2e suite [sig-storage] EmptyDir wrapper volumes should not cause race condition when used for git_repo [Serial] [Slow]
Kubernetes e2e suite [sig-storage] EmptyDir wrapper volumes should not conflict [Conformance]
Kubernetes e2e suite [sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : configmap
Kubernetes e2e suite [sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : projected
Kubernetes e2e suite [sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : secret
Kubernetes e2e suite [sig-storage] Flexvolumes should be mountable when attachable
Kubernetes e2e suite [sig-storage] Flexvolumes should be mountable when non-attachable
Kubernetes e2e suite [sig-storage] GCP Volumes GlusterFS should be mountable
Kubernetes e2e suite [sig-storage] GCP Volumes NFSv3 should be mountable for NFSv3
Kubernetes e2e suite [sig-storage] GCP Volumes NFSv4 should be mountable for NFSv4
Kubernetes e2e suite [sig-storage] GenericPersistentVolume[Disruptive] When kubelet restarts Should test that a file written to the mount before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] GenericPersistentVolume[Disruptive] When kubelet restarts Should test that a volume mounted to a pod that is deleted while the kubelet is down unmounts when the kubelet returns.
Kubernetes e2e suite [sig-storage] GenericPersistentVolume[Disruptive] When kubelet restarts Should test that a volume mounted to a pod that is force deleted while the kubelet is down unmounts when the kubelet returns.
Kubernetes e2e suite [sig-storage] HostPath should give a volume the correct mode [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] HostPath should support r/w [NodeConformance]
Kubernetes e2e suite [sig-storage] HostPath should support subPath [NodeConformance]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Slow][Serial]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Slow][Serial]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Slow][Serial]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Slow][Serial]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Slow][Serial]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Slow][Serial]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Slow][Serial]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Slow][Serial]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Slow][Serial]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Slow][Serial]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Slow][Serial]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Slow][Serial]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Slow][Serial]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Slow][Serial]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Slow][Serial]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Slow][Serial]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Slow][Serial]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Slow][Serial]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Slow][Serial]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Slow][Serial]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: rbd][Feature:Volumes][Serial] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Slow][Serial]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume
Kubernetes e2e suite [sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data
Kubernetes e2e suite [sig-storage] Mounted flexvolume expand[Slow] Should verify mounted flex volumes can be resized
Kubernetes e2e suite [sig-storage] Mounted flexvolume volume expand [Slow] [Feature:ExpandInUsePersistentVolumes] should be resizable when mounted
Kubernetes e2e suite [sig-storage] Mounted volume expand Should verify mounted devices can be resized
Kubernetes e2e suite [sig-storage] NFSPersistentVolumes[Disruptive][Flaky] when kube-controller-manager restarts should delete a bound PVC from a clientPod, restart the kube-control-manager, and ensure the kube-controller-manager does not crash
Kubernetes e2e suite [sig-storage] NFSPersistentVolumes[Disruptive][Flaky] when kubelet restarts Should test that a file written to the mount before kubelet restart is readable after restart.
Kubernetes e2e suite [sig-storage] NFSPersistentVolumes[Disruptive][Flaky] when kubelet restarts Should test that a volume mounted to a pod that is deleted while the kubelet is down unmounts when the kubelet returns.
Kubernetes e2e suite [sig-storage] NFSPersistentVolumes[Disruptive][Flaky] when kubelet restarts Should test that a volume mounted to a pod that is force deleted while the kubelet is down unmounts when the kubelet returns.
Kubernetes e2e suite [sig-storage] Node Poweroff [Feature:vsphere] [Slow] [Disruptive] verify volume status after node power off
Kubernetes e2e suite [sig-storage] Node Unregister [Feature:vsphere] [Slow] [Disruptive] node unregister
Kubernetes e2e suite [sig-storage] PV Protection Verify "immediate" deletion of a PV that is not bound to a PVC
Kubernetes e2e suite [sig-storage] PV Protection Verify that PV bound to a PVC is not removed immediately
Kubernetes e2e suite [sig-storage] PVC Protection Verify "immediate" deletion of a PVC that is not in active use by a pod
Kubernetes e2e suite [sig-storage] PVC Protection Verify that PVC in active use by a pod is not removed immediately
Kubernetes e2e suite [sig-storage] PVC Protection Verify that scheduling of a pod that uses PVC that is being deleted fails and the pod becomes Unschedulable
Kubernetes e2e suite [sig-storage] PersistentVolumes Default StorageClass pods that use multiple volumes should be reschedulable [Slow]
Kubernetes e2e suite [sig-storage] PersistentVolumes GCEPD should test that deleting a PVC before the pod does not cause pod deletion to fail on PD detach
Kubernetes e2e suite [sig-storage] PersistentVolumes GCEPD should test that deleting the Namespace of a PVC and Pod causes the successful detach of Persistent Disk
Kubernetes e2e suite [sig-storage] PersistentVolumes GCEPD should test that deleting the PV before the pod does not cause pod deletion to fail on PD detach
Kubernetes e2e suite [sig-storage] PersistentVolumes NFS when invoking the Recycle reclaim policy should test that a PV becomes Available and is clean after the PVC is deleted.
Kubernetes e2e suite [sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PV and a pre-bound PVC: test write access
Kubernetes e2e suite [sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PVC and a pre-bound PV: test write access
Kubernetes e2e suite [sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PVC and non-pre-bound PV: test write access
Kubernetes e2e suite [sig-storage] PersistentVolumes NFS with Single PV - PVC pairs should create a non-pre-bound PV and PVC: test write access
Kubernetes e2e suite [sig-storage] PersistentVolumes NFS with multiple PVs and PVCs all in same ns should create 2 PVs and 4 PVCs: test write access
Kubernetes e2e suite [sig-storage] PersistentVolumes NFS with multiple PVs and PVCs all in same ns should create 3 PVs and 3 PVCs: test write access
Kubernetes e2e suite [sig-storage] PersistentVolumes [Feature:LabelSelector] [sig-storage] Selector-Label Volume Binding:vsphere should bind volume with claim for given label
Kubernetes e2e suite [sig-storage] PersistentVolumes [Feature:ReclaimPolicy] [sig-storage] persistentvolumereclaim:vsphere should delete persistent volume when reclaimPolicy set to delete and associated claim is deleted
Kubernetes e2e suite [sig-storage] PersistentVolumes [Feature:ReclaimPolicy] [sig-storage] persistentvolumereclaim:vsphere should not detach and unmount PV when associated pvc with delete as reclaimPolicy is deleted when it is in use by the pod
Kubernetes e2e suite [sig-storage] PersistentVolumes [Feature:ReclaimPolicy] [sig-storage] persistentvolumereclaim:vsphere should retain persistent volume when reclaimPolicy set to retain when associated claim is deleted
Kubernetes e2e suite [sig-storage] PersistentVolumes-local Pod with node different from PV's NodeAffinity should fail scheduling due to different NodeAffinity
Kubernetes e2e suite [sig-storage] PersistentVolumes-local Pod with node different from PV's NodeAffinity should fail scheduling due to different NodeSelector
Kubernetes e2e suite [sig-storage] PersistentVolumes-local Pods sharing a single local PV [Serial] all pods should be running
Kubernetes e2e suite [sig-storage] PersistentVolumes-local StatefulSet with pod affinity [Slow] should use volumes spread across nodes when pod has anti-affinity
Kubernetes e2e suite [sig-storage] PersistentVolumes-local StatefulSet with pod affinity [Slow] should use volumes spread across nodes when pod management is parallel and pod has anti-affinity
Kubernetes e2e suite [sig-storage] PersistentVolumes-local Stress with local volumes [Serial] should be able to process many pods and reuse local volumes
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: block] One pod requesting one prebound PVC should be able to mount volume and read from pod1
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: block] One pod requesting one prebound PVC should be able to mount volume and write from pod1
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: block] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: block] Set fsGroup for local volume should set fsGroup for one pod [Slow]
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: block] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: block] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: block] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] One pod requesting one prebound PVC should be able to mount volume and read from pod1
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] One pod requesting one prebound PVC should be able to mount volume and write from pod1
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] One pod requesting one prebound PVC should be able to mount volume and read from pod1
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] One pod requesting one prebound PVC should be able to mount volume and write from pod1
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] One pod requesting one prebound PVC should be able to mount volume and read from pod1
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] One pod requesting one prebound PVC should be able to mount volume and write from pod1
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] One pod requesting one prebound PVC should be able to mount volume and read from pod1
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] One pod requesting one prebound PVC should be able to mount volume and write from pod1
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir-link] One pod requesting one prebound PVC should be able to mount volume and read from pod1
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir-link] One pod requesting one prebound PVC should be able to mount volume and write from pod1
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir-link] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir-link] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir-link] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir] One pod requesting one prebound PVC should be able to mount volume and read from pod1
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir] One pod requesting one prebound PVC should be able to mount volume and write from pod1
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: dir] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] One pod requesting one prebound PVC should be able to mount volume and read from pod1
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] One pod requesting one prebound PVC should be able to mount volume and write from pod1
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Set fsGroup for local volume should set fsGroup for one pod [Slow]
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: tmpfs] One pod requesting one prebound PVC should be able to mount volume and read from pod1
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: tmpfs] One pod requesting one prebound PVC should be able to mount volume and write from pod1
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: tmpfs] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: tmpfs] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2
Kubernetes e2e suite [sig-storage] PersistentVolumes-local [Volume type: tmpfs] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2
Kubernetes e2e suite [sig-storage] PersistentVolumes:vsphere should test that a file written to the vspehre volume mount before kubelet restart can be read after restart [Disruptive]
Kubernetes e2e suite [sig-storage] PersistentVolumes:vsphere should test that a vspehre volume mounted to a pod that is deleted while the kubelet is down unmounts when the kubelet returns [Disruptive]
Kubernetes e2e suite [sig-storage] PersistentVolumes:vsphere should test that deleting a PVC before the pod does not cause pod deletion to fail on vsphere volume detach
Kubernetes e2e suite [sig-storage] PersistentVolumes:vsphere should test that deleting the Namespace of a PVC and Pod causes the successful detach of vsphere volume
Kubernetes e2e suite [sig-storage] PersistentVolumes:vsphere should test that deleting the PV before the pod does not cause pod deletion to fail on vspehre volume detach
Kubernetes e2e suite [sig-storage] Pod Disks detach in a disrupted environment [Slow] [Disruptive] when node is deleted
Kubernetes e2e suite [sig-storage] Pod Disks detach in a disrupted environment [Slow] [Disruptive] when node's API object is deleted
Kubernetes e2e suite [sig-storage] Pod Disks detach in a disrupted environment [Slow] [Disruptive] when pod is evicted
Kubernetes e2e suite [sig-storage] Pod Disks schedule a pod w/ RW PD(s) mounted to 1 or more containers, write to PD, verify content, delete pod, and repeat in rapid succession [Slow] using 1 containers and 2 PDs
Kubernetes e2e suite [sig-storage] Pod Disks schedule a pod w/ RW PD(s) mounted to 1 or more containers, write to PD, verify content, delete pod, and repeat in rapid succession [Slow] using 4 containers and 1 PDs
Kubernetes e2e suite [sig-storage] Pod Disks schedule pods each with a PD, delete pod and verify detach [Slow] for RW PD with pod delete grace period of "default (30s)"
Kubernetes e2e suite [sig-storage] Pod Disks schedule pods each with a PD, delete pod and verify detach [Slow] for RW PD with pod delete grace period of "immediate (0s)"
Kubernetes e2e suite [sig-storage] Pod Disks schedule pods each with a PD, delete pod and verify detach [Slow] for read-only PD with pod delete grace period of "default (30s)"
Kubernetes e2e suite [sig-storage] Pod Disks schedule pods each with a PD, delete pod and verify detach [Slow] for read-only PD with pod delete grace period of "immediate (0s)"
Kubernetes e2e suite [sig-storage] Pod Disks should be able to delete a non-existent PD without error
Kubernetes e2e suite [sig-storage] Projected combined should project all components that make up the projection API [Projection][NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected configMap optional updates should be reflected in volume [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected configMap should be consumable from pods in volume [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected configMap should be consumable from pods in volume as non-root [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected configMap should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]
Kubernetes e2e suite [sig-storage] Projected configMap should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeFeature:FSGroup]
Kubernetes e2e suite [sig-storage] Projected configMap should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected configMap should be consumable from pods in volume with mappings [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected configMap should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected configMap should be consumable from pods in volume with mappings as non-root [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected configMap should be consumable from pods in volume with mappings as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]
Kubernetes e2e suite [sig-storage] Projected configMap should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected configMap updates should be reflected in volume [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected downwardAPI should provide container's cpu limit [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected downwardAPI should provide container's cpu request [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected downwardAPI should provide container's memory limit [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected downwardAPI should provide container's memory request [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected downwardAPI should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected downwardAPI should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected downwardAPI should provide podname as non-root with fsgroup [LinuxOnly] [NodeFeature:FSGroup]
Kubernetes e2e suite [sig-storage] Projected downwardAPI should provide podname as non-root with fsgroup and defaultMode [LinuxOnly] [NodeFeature:FSGroup]
Kubernetes e2e suite [sig-storage] Projected downwardAPI should provide podname only [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected downwardAPI should set DefaultMode on files [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected downwardAPI should set mode on item file [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected downwardAPI should update annotations on modification [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected downwardAPI should update labels on modification [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected secret optional updates should be reflected in volume [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected secret should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance]
Kubernetes e2e suite [sig-storage] Projected secret should be consumable from pods in volume [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected secret should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected secret should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected secret should be consumable from pods in volume with mappings [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected secret should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Projected secret should be consumable in multiple volumes in a pod [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Regional PD RegionalPD should failover to a different zone when all nodes in one zone become unreachable [Slow] [Disruptive]
Kubernetes e2e suite [sig-storage] Regional PD RegionalPD should provision storage [Slow]
Kubernetes e2e suite [sig-storage] Regional PD RegionalPD should provision storage in the allowedTopologies [Slow]
Kubernetes e2e suite [sig-storage] Regional PD RegionalPD should provision storage in the allowedTopologies with delayed binding [Slow]
Kubernetes e2e suite [sig-storage] Regional PD RegionalPD should provision storage with delayed binding [Slow]
Kubernetes e2e suite [sig-storage] Secrets optional updates should be reflected in volume [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Secrets should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Secrets should be consumable from pods in volume [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Secrets should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Secrets should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Secrets should be consumable from pods in volume with mappings [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Secrets should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Secrets should be consumable in multiple volumes in a pod [NodeConformance] [Conformance]
Kubernetes e2e suite [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with invalid capability name objectSpaceReserve is not honored for dynamically provisioned pvc using storageclass
Kubernetes e2e suite [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with invalid diskStripes value is not honored for dynamically provisioned pvc using storageclass
Kubernetes e2e suite [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with invalid hostFailuresToTolerate value is not honored for dynamically provisioned pvc using storageclass
Kubernetes e2e suite [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with non-vsan datastore is not honored for dynamically provisioned pvc using storageclass
Kubernetes e2e suite [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with valid diskStripes and objectSpaceReservation values and a VSAN datastore is honored for dynamically provisioned pvc using storageclass
Kubernetes e2e suite [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with valid diskStripes and objectSpaceReservation values is honored for dynamically provisioned pvc using storageclass
Kubernetes e2e suite [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with valid hostFailuresToTolerate and cacheReservation values is honored for dynamically provisioned pvc using storageclass
Kubernetes e2e suite [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with valid objectSpaceReservation and iopsLimit values is honored for dynamically provisioned pvc using storageclass
Kubernetes e2e suite [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify an existing and compatible SPBM policy is honored for dynamically provisioned pvc using storageclass
Kubernetes e2e suite [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify an if a SPBM policy and VSAN capabilities cannot be honored for dynamically provisioned pvc using storageclass
Kubernetes e2e suite [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify clean up of stale dummy VM for dynamically provisioned pvc using SPBM policy
Kubernetes e2e suite [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify if a SPBM policy is not honored on a non-compatible datastore for dynamically provisioned pvc using storageclass
Kubernetes e2e suite [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify if a non-existing SPBM policy is not honored for dynamically provisioned pvc using storageclass
Kubernetes e2e suite [sig-storage] Subpath Atomic writer volumes should support subpaths with configmap pod [LinuxOnly] [Conformance]
Kubernetes e2e suite [sig-storage] Subpath Atomic writer volumes should support subpaths with configmap pod with mountPath of existing file [LinuxOnly] [Conformance]
Kubernetes e2e suite [sig-storage] Subpath Atomic writer volumes should support subpaths with downward pod [LinuxOnly] [Conformance]
Kubernetes e2e suite [sig-storage] Subpath Atomic writer volumes should support subpaths with projected pod [LinuxOnly] [Conformance]
Kubernetes e2e suite [sig-storage] Subpath Atomic writer volumes should support subpaths with secret pod [LinuxOnly] [Conformance]
Kubernetes e2e suite [sig-storage] Verify Volume Attach Through vpxd Restart [Feature:vsphere][Serial][Disruptive] verify volume remains attached through vpxd restart
Kubernetes e2e suite [sig-storage] Volume Attach Verify [Feature:vsphere][Serial][Disruptive] verify volume remains attached after master kubelet restart
Kubernetes e2e suite [sig-storage] Volume Disk Format [Feature:vsphere] verify disk format type - eagerzeroedthick is honored for dynamically provisioned pv using storageclass
Kubernetes e2e suite [sig-storage] Volume Disk Format [Feature:vsphere] verify disk format type - thin is honored for dynamically provisioned pv using storageclass
Kubernetes e2e suite [sig-storage] Volume Disk Format [Feature:vsphere] verify disk format type - zeroedthick is honored for dynamically provisioned pv using storageclass
Kubernetes e2e suite [sig-storage] Volume Disk Size [Feature:vsphere] verify dynamically provisioned pv has size rounded up correctly
Kubernetes e2e suite [sig-storage] Volume FStype [Feature:vsphere] verify fstype - default value should be ext4
Kubernetes e2e suite [sig-storage] Volume FStype [Feature:vsphere] verify fstype - ext3 formatted volume
Kubernetes e2e suite [sig-storage] Volume FStype [Feature:vsphere] verify invalid fstype
Kubernetes e2e suite [sig-storage] Volume Operations Storm [Feature:vsphere] should create pod with many volumes and verify no attach call fails
Kubernetes e2e suite [sig-storage] Volume Placement should create and delete pod with multiple volumes from different datastore
Kubernetes e2e suite [sig-storage] Volume Placement should create and delete pod with multiple volumes from same datastore
Kubernetes e2e suite [sig-storage] Volume Placement should create and delete pod with the same volume source attach/detach to different worker nodes
Kubernetes e2e suite [sig-storage] Volume Placement should create and delete pod with the same volume source on the same worker node
Kubernetes e2e suite [sig-storage] Volume Placement test back to back pod creation and deletion with different volume sources on the same worker node
Kubernetes e2e suite [sig-storage] Volume Provisioning On Clustered Datastore [Feature:vsphere] verify dynamic provision with default parameter on clustered datastore
Kubernetes e2e suite [sig-storage] Volume Provisioning On Clustered Datastore [Feature:vsphere] verify dynamic provision with spbm policy on clustered datastore
Kubernetes e2e suite [sig-storage] Volume Provisioning On Clustered Datastore [Feature:vsphere] verify static provisioning on clustered datastore
Kubernetes e2e suite [sig-storage] Volume Provisioning on Datastore [Feature:vsphere] verify dynamically provisioned pv using storageclass fails on an invalid datastore
Kubernetes e2e suite [sig-storage] Volume limits should verify that all nodes have volume limits
Kubernetes e2e suite [sig-storage] Volumes ConfigMap should be mountable
Kubernetes e2e suite [sig-storage] Zone Support Verify PVC creation fails if no zones are specified in the storage class (No shared datastores exist among all the nodes)
Kubernetes e2e suite [sig-storage] Zone Support Verify PVC creation fails if only datastore is specified in the storage class (No shared datastores exist among all the nodes)
Kubernetes e2e suite [sig-storage] Zone Support Verify PVC creation fails if only storage policy is specified in the storage class (No shared datastores exist among all the nodes)
Kubernetes e2e suite [sig-storage] Zone Support Verify PVC creation fails if the availability zone specified in the storage class have no shared datastores under it.
Kubernetes e2e suite [sig-storage] Zone Support Verify PVC creation with an invalid VSAN capability along with a compatible zone combination specified in storage class fails
Kubernetes e2e suite [sig-storage] Zone Support Verify PVC creation with compatible policy and datastore without any zones specified in the storage class fails (No shared datastores exist among all the nodes)
Kubernetes e2e suite [sig-storage] Zone Support Verify PVC creation with incompatible datastore and zone combination specified in storage class fails
Kubernetes e2e suite [sig-storage] Zone Support Verify PVC creation with incompatible storage policy along with compatible zone and datastore combination specified in storage class fails
Kubernetes e2e suite [sig-storage] Zone Support Verify PVC creation with incompatible storagePolicy and zone combination specified in storage class fails
Kubernetes e2e suite [sig-storage] Zone Support Verify PVC creation with incompatible zone along with compatible storagePolicy and datastore combination specified in storage class fails
Kubernetes e2e suite [sig-storage] Zone Support Verify PVC creation with invalid zone specified in storage class fails
Kubernetes e2e suite [sig-storage] Zone Support Verify a PVC creation fails when multiple zones are specified in the storage class without shared datastores among the zones in waitForFirstConsumer binding mode
Kubernetes e2e suite [sig-storage] Zone Support Verify a pod fails to get scheduled when conflicting volume topology (allowedTopologies) and pod scheduling constraints(nodeSelector) are specified
Kubernetes e2e suite [sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV with storage policy specified in storage class in waitForFirstConsumer binding mode
Kubernetes e2e suite [sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV with storage policy specified in storage class in waitForFirstConsumer binding mode with allowedTopologies
Kubernetes e2e suite [sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV with storage policy specified in storage class in waitForFirstConsumer binding mode with multiple allowedTopologies
Kubernetes e2e suite [sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV, based on a VSAN capability, datastore and compatible zone specified in storage class
Kubernetes e2e suite [sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV, based on allowed zones specified in storage class
Kubernetes e2e suite [sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV, based on multiple zones specified in storage class
Kubernetes e2e suite [sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV, based on multiple zones specified in the storage class. (No shared datastores exist among both zones)
Kubernetes e2e suite [sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV, based on the allowed zones and datastore specified in storage class
Kubernetes e2e suite [sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV, based on the allowed zones and storage policy specified in storage class
Kubernetes e2e suite [sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV, based on the allowed zones, datastore and storage policy specified in storage class
Kubernetes e2e suite [sig-storage] Zone Support Verify a pod is created on a non-Workspace zone and attached to a dynamically created PV, based on the allowed zones and storage policy specified in storage class
Kubernetes e2e suite [sig-storage] Zone Support Verify dynamically created pv with allowed zones specified in storage class, shows the right zone information on its labels
Kubernetes e2e suite [sig-storage] Zone Support Verify dynamically created pv with multiple zones specified in the storage class, shows both the zones on its labels
Kubernetes e2e suite [sig-storage] [Serial] Volume metrics PVController should create bound pv/pvc count metrics for pvc controller after creating both pv and pvc
Kubernetes e2e suite [sig-storage] [Serial] Volume metrics PVController should create none metrics for pvc controller before creating any PV or PVC
Kubernetes e2e suite [sig-storage] [Serial] Volume metrics PVController should create unbound pv count metrics for pvc controller after creating pv only
Kubernetes e2e suite [sig-storage] [Serial] Volume metrics PVController should create unbound pvc count metrics for pvc controller after creating pvc only
Kubernetes e2e suite [sig-storage] [Serial] Volume metrics should create metrics for total number of volumes in A/D Controller
Kubernetes e2e suite [sig-storage] [Serial] Volume metrics should create metrics for total time taken in volume operations in P/V Controller
Kubernetes e2e suite [sig-storage] [Serial] Volume metrics should create prometheus metrics for volume provisioning and attach/detach
Kubernetes e2e suite [sig-storage] [Serial] Volume metrics should create prometheus metrics for volume provisioning errors [Slow]
Kubernetes e2e suite [sig-storage] [Serial] Volume metrics should create volume metrics in Volume Manager
Kubernetes e2e suite [sig-storage] [Serial] Volume metrics should create volume metrics with the correct PVC ref
Kubernetes e2e suite [sig-storage] vcp at scale [Feature:vsphere] vsphere scale tests
Kubernetes e2e suite [sig-storage] vcp-performance [Feature:vsphere] vcp performance tests
Kubernetes e2e suite [sig-storage] vsphere cloud provider stress [Feature:vsphere] vsphere stress tests
Kubernetes e2e suite [sig-storage] vsphere statefulset vsphere statefulset testing
Kubernetes e2e suite [sig-ui] Kubernetes Dashboard [Feature:Dashboard] should check that the kubernetes-dashboard instance is alive
Kubernetes e2e suite [sig-windows] DNS should support configurable pod DNS servers
Kubernetes e2e suite [sig-windows] Hybrid cluster network for all supported CNIs should have stable networking for Linux and Windows pods
Kubernetes e2e suite [sig-windows] Services should be able to create a functioning NodePort service for Windows
Kubernetes e2e suite [sig-windows] Windows volume mounts check volume mount permissions container should have readOnly permissions on emptyDir
Kubernetes e2e suite [sig-windows] Windows volume mounts check volume mount permissions container should have readOnly permissions on hostMapPath
Kubernetes e2e suite [sig-windows] [Feature:Windows] Density [Serial] [Slow] create a batch of pods latency/resource should be within limit when create 10 pods with 0s interval
Kubernetes e2e suite [sig-windows] [Feature:Windows] Memory Limits [Serial] [Slow] Allocatable node memory should be equal to a calculated allocatable memory value
Kubernetes e2e suite [sig-windows] [Feature:Windows] Memory Limits [Serial] [Slow] attempt to deploy past allocatable memory limits should fail deployments of pods once there isn't enough memory
Kubernetes e2e suite [sig-windows] [Feature:Windows] SecurityContext RunAsUserName should be able create pods and run containers with a given username
Kubernetes e2e suite [sig-windows] [Feature:Windows] SecurityContext RunAsUserName should not be able to create pods with unknown usernames
Kubernetes e2e suite [sig-windows] [Feature:Windows] SecurityContext RunAsUserName should override SecurityContext username if set
Kubernetes e2e suite [sig-windows] [Feature:Windows] [Feature:WindowsGMSA] GMSA Full [Slow] GMSA support works end to end
Kubernetes e2e suite [sig-windows] [Feature:Windows] [Feature:WindowsGMSA] GMSA Kubelet [Slow] kubelet GMSA support when creating a pod with correct GMSA credential specs passes the credential specs down to the Pod's containers