ResultFAILURE
Tests 37 failed / 50 succeeded
Started2019-12-06 22:28
Elapsed3h39m
Revision
Buildera37f3958-1877-11ea-b3d3-b20db476995a
Refs master:a3718d76
85958:8b511b2d
infra-commit79c469607
job-versionv1.18.0-alpha.0.1463+ffa65da1319433-dirty
repok8s.io/kubernetes
repo-commitffa65da13194333769407bd930648be670834ee6
repos{u'k8s.io/kubernetes': u'master:a3718d765343bc80aaaa8c95af96070b69bd7e19,85958:8b511b2d3ad3655232a326cc31d489ec099e5f60'}
revisionv1.18.0-alpha.0.1463+ffa65da1319433-dirty

Test Failures


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works 11m30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\(allowExpansion\)\]\svolume\-expand\sVerify\sif\soffline\sPVC\sexpansion\sworks$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:161
Dec  7 01:53:57.693: While waiting for pvc resize to finish
Unexpected error:
    <*errors.errorString | 0xc00009ebc0>: {
        s: "timed out waiting for the condition",
    }
    timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:196
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works 11m30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\(allowExpansion\)\]\svolume\-expand\sVerify\sif\soffline\sPVC\sexpansion\sworks$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:161
Dec  7 01:42:27.223: While waiting for pvc resize to finish
Unexpected error:
    <*errors.errorString | 0xc00009ebc0>: {
        s: "timed out waiting for the condition",
    }
    timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:196
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it 11m0s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\(allowExpansion\)\]\svolume\-expand\sshould\sresize\svolume\swhen\sPVC\sis\sedited\swhile\spod\sis\susing\sit$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:219
Dec  6 23:26:35.362: While waiting for pvc resize to finish
Unexpected error:
    <*errors.errorString | 0xc00009ebc0>: {
        s: "timed out waiting for the condition",
    }
    timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:250
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it 11m30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\(allowExpansion\)\]\svolume\-expand\sshould\sresize\svolume\swhen\sPVC\sis\sedited\swhile\spod\sis\susing\sit$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:219
Dec  6 23:15:36.872: While waiting for pvc resize to finish
Unexpected error:
    <*errors.errorString | 0xc00009ebc0>: {
        s: "timed out waiting for the condition",
    }
    timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:250
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. 44s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\sdisruptive\[Disruptive\]\sShould\stest\sthat\spv\sused\sin\sa\spod\sthat\sis\sdeleted\swhile\sthe\skubelet\sis\sdown\scleans\sup\swhen\sthe\skubelet\sreturns\.$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/disruptive.go:149
Dec  7 00:39:44.700: SSH to "10.240.0.5:22" errored.
Unexpected error:
    <*errors.errorString | 0xc002656a20>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:110
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. 1m24s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\sdisruptive\[Disruptive\]\sShould\stest\sthat\spv\sused\sin\sa\spod\sthat\sis\sdeleted\swhile\sthe\skubelet\sis\sdown\scleans\sup\swhen\sthe\skubelet\sreturns\.$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/disruptive.go:149
Dec  7 00:39:04.258: SSH to "10.240.0.5:22" errored.
Unexpected error:
    <*errors.errorString | 0xc0022f2a80>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:110
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. 50s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\sdisruptive\[Disruptive\]\sShould\stest\sthat\spv\sused\sin\sa\spod\sthat\sis\sforce\sdeleted\swhile\sthe\skubelet\sis\sdown\scleans\sup\swhen\sthe\skubelet\sreturns\.$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/disruptive.go:149
Dec  7 01:59:09.183: SSH to "10.240.0.5:22" errored.
Unexpected error:
    <*errors.errorString | 0xc002cae860>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:110
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. 1m38s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\sdisruptive\[Disruptive\]\sShould\stest\sthat\spv\sused\sin\sa\spod\sthat\sis\sforce\sdeleted\swhile\sthe\skubelet\sis\sdown\scleans\sup\swhen\sthe\skubelet\sreturns\.$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/disruptive.go:149
Dec  7 01:58:18.727: SSH to "10.240.0.5:22" errored.
Unexpected error:
    <*errors.errorString | 0xc00376ab60>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:110
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart. 44s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\sdisruptive\[Disruptive\]\sShould\stest\sthat\spv\swritten\sbefore\skubelet\srestart\sis\sreadable\safter\srestart\.$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/disruptive.go:149
Dec  7 00:44:33.539: SSH to Node "k8s-agentpool1-48493575-vmss000001" errored.
Unexpected error:
    <*errors.errorString | 0xc002e40470>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:164
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart. 56s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\sdisruptive\[Disruptive\]\sShould\stest\sthat\spv\swritten\sbefore\skubelet\srestart\sis\sreadable\safter\srestart\.$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/disruptive.go:149
Dec  7 00:43:52.712: SSH to Node "k8s-agentpool1-48493575-vmss000001" errored.
Unexpected error:
    <*errors.errorString | 0xc001a47b10>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:164
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node 6m40s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\smultiVolume\s\[Slow\]\sshould\saccess\sto\stwo\svolumes\swith\sdifferent\svolume\smode\sand\sretain\sdata\sacross\spod\srecreation\son\sdifferent\snode$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/multivolume.go:241
Dec  7 00:30:54.564: Unexpected error:
    <*errors.errorString | 0xc002dff8d0>: {
        s: "pod \"security-context-aee1bb00-ca7e-4321-8486-74a5c88db7b3\" is not Running: timed out waiting for the condition",
    }
    pod "security-context-aee1bb00-ca7e-4321-8486-74a5c88db7b3" is not Running: timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/multivolume.go:360
				
				Click to see stdout/stderrfrom junit_01.xml

Find security-context-aee1bb00-ca7e-4321-8486-74a5c88db7b3 mentions in log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node 6m52s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\smultiVolume\s\[Slow\]\sshould\saccess\sto\stwo\svolumes\swith\sdifferent\svolume\smode\sand\sretain\sdata\sacross\spod\srecreation\son\sdifferent\snode$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/multivolume.go:241
Dec  7 00:24:12.130: Unexpected error:
    <*errors.errorString | 0xc0026eb7b0>: {
        s: "pod \"security-context-1b9234d5-5d77-4686-aa67-7d706436694f\" is not Running: timed out waiting for the condition",
    }
    pod "security-context-1b9234d5-5d77-4686-aa67-7d706436694f" is not Running: timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/multivolume.go:360
				
				Click to see stdout/stderrfrom junit_01.xml

Find security-context-1b9234d5-5d77-4686-aa67-7d706436694f mentions in log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node 6m20s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\smultiVolume\s\[Slow\]\sshould\saccess\sto\stwo\svolumes\swith\sthe\ssame\svolume\smode\sand\sretain\sdata\sacross\spod\srecreation\son\sdifferent\snode$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/multivolume.go:159
Dec  7 01:28:22.587: Unexpected error:
    <*errors.errorString | 0xc00275f650>: {
        s: "pod \"security-context-a8d13211-39c6-4d07-b5e6-2938fb051ea1\" is not Running: timed out waiting for the condition",
    }
    pod "security-context-a8d13211-39c6-4d07-b5e6-2938fb051ea1" is not Running: timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/multivolume.go:360
				
				Click to see stdout/stderrfrom junit_01.xml

Find security-context-a8d13211-39c6-4d07-b5e6-2938fb051ea1 mentions in log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node 6m24s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\smultiVolume\s\[Slow\]\sshould\saccess\sto\stwo\svolumes\swith\sthe\ssame\svolume\smode\sand\sretain\sdata\sacross\spod\srecreation\son\sdifferent\snode$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/multivolume.go:159
Dec  7 01:22:10.230: Unexpected error:
    <*errors.errorString | 0xc002be4ad0>: {
        s: "pod \"security-context-2daa8527-4404-4c1b-b84f-db810db3e679\" is not Running: timed out waiting for the condition",
    }
    pod "security-context-2daa8527-4404-4c1b-b84f-db810db3e679" is not Running: timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/multivolume.go:360
				
				Click to see stdout/stderrfrom junit_01.xml

Find security-context-2daa8527-4404-4c1b-b84f-db810db3e679 mentions in log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works 11m6s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(default\sfs\)\(allowExpansion\)\]\svolume\-expand\sVerify\sif\soffline\sPVC\sexpansion\sworks$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:161
Dec  7 00:59:43.482: While waiting for pvc resize to finish
Unexpected error:
    <*errors.errorString | 0xc00009ebc0>: {
        s: "timed out waiting for the condition",
    }
    timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:196
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works 11m38s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(default\sfs\)\(allowExpansion\)\]\svolume\-expand\sVerify\sif\soffline\sPVC\sexpansion\sworks$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:161
Dec  7 01:11:21.934: While waiting for pvc resize to finish
Unexpected error:
    <*errors.errorString | 0xc00009ebc0>: {
        s: "timed out waiting for the condition",
    }
    timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:196
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it 10m50s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(default\sfs\)\(allowExpansion\)\]\svolume\-expand\sshould\sresize\svolume\swhen\sPVC\sis\sedited\swhile\spod\sis\susing\sit$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:219
Dec  6 23:43:31.345: While waiting for pvc resize to finish
Unexpected error:
    <*errors.errorString | 0xc00009ebc0>: {
        s: "timed out waiting for the condition",
    }
    timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:250
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it 11m38s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(default\sfs\)\(allowExpansion\)\]\svolume\-expand\sshould\sresize\svolume\swhen\sPVC\sis\sedited\swhile\spod\sis\susing\sit$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:219
Dec  6 23:55:13.776: While waiting for pvc resize to finish
Unexpected error:
    <*errors.errorString | 0xc00009ebc0>: {
        s: "timed out waiting for the condition",
    }
    timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:250
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] 54s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(default\sfs\)\]\sprovisioning\sshould\sprovision\sstorage\swith\ssnapshot\sdata\ssource\s\[Feature\:VolumeSnapshotDataSource\]$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/provisioning.go:187
Test Panicked
/usr/local/go/src/runtime/panic.go:199

Panic: runtime error: invalid memory address or nil pointer dereference

Full stack:
k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/unstructured.(*Unstructured).GetName(...)
	/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/unstructured/unstructured.go:246
k8s.io/kubernetes/test/e2e/storage/testsuites.prepareSnapshotDataSourceForProvisioning(0x0, 0x0, 0x0, 0x0, 0x5429500, 0xc001b7f600, 0x52ae060, 0xc002ea2458, 0xc00257c000, 0xc0034c0f00, ...)
	/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/provisioning.go:652 +0x66c
k8s.io/kubernetes/test/e2e/storage/testsuites.(*provisioningTestSuite).defineTests.func5()
	/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/provisioning.go:202 +0x1fd
k8s.io/kubernetes/test/e2e.RunE2ETests(0xc00021b000)
	_output/local/go/src/k8s.io/kubernetes/test/e2e/e2e.go:110 +0x30a
k8s.io/kubernetes/test/e2e.TestE2E(0xc00021b000)
	_output/local/go/src/k8s.io/kubernetes/test/e2e/e2e_test.go:112 +0x2b
testing.tRunner(0xc00021b000, 0x4c35e58)
	/usr/local/go/src/testing/testing.go:909 +0xc9
created by testing.(*T).Run
	/usr/local/go/src/testing/testing.go:960 +0x350
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] 2m32s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(default\sfs\)\]\sprovisioning\sshould\sprovision\sstorage\swith\ssnapshot\sdata\ssource\s\[Feature\:VolumeSnapshotDataSource\]$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/provisioning.go:187
Test Panicked
/usr/local/go/src/runtime/panic.go:199

Panic: runtime error: invalid memory address or nil pointer dereference

Full stack:
k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/unstructured.(*Unstructured).GetName(...)
	/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/unstructured/unstructured.go:246
k8s.io/kubernetes/test/e2e/storage/testsuites.prepareSnapshotDataSourceForProvisioning(0x0, 0x0, 0x0, 0x0, 0x5429500, 0xc0035f4dc0, 0x52ae060, 0xc002586620, 0xc002b01340, 0xc00240d380, ...)
	/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/provisioning.go:652 +0x66c
k8s.io/kubernetes/test/e2e/storage/testsuites.(*provisioningTestSuite).defineTests.func5()
	/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/provisioning.go:202 +0x1fd
k8s.io/kubernetes/test/e2e.RunE2ETests(0xc00021b000)
	_output/local/go/src/k8s.io/kubernetes/test/e2e/e2e.go:110 +0x30a
k8s.io/kubernetes/test/e2e.TestE2E(0xc00021b000)
	_output/local/go/src/k8s.io/kubernetes/test/e2e/e2e_test.go:112 +0x2b
testing.tRunner(0xc00021b000, 0x4c35e58)
	/usr/local/go/src/testing/testing.go:909 +0xc9
created by testing.(*T).Run
	/usr/local/go/src/testing/testing.go:960 +0x350
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] 1m24s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(default\sfs\)\]\ssubPath\sshould\sunmount\sif\spod\sis\sforce\sdeleted\swhile\skubelet\sis\sdown\s\[Disruptive\]\[Slow\]\[LinuxOnly\]$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:347
Dec  6 23:30:11.621: Encountered SSH error.
Unexpected error:
    <*errors.errorString | 0xc0022b8060>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:281
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] 1m44s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(default\sfs\)\]\ssubPath\sshould\sunmount\sif\spod\sis\sforce\sdeleted\swhile\skubelet\sis\sdown\s\[Disruptive\]\[Slow\]\[LinuxOnly\]$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:347
Dec  6 23:31:50.591: Encountered SSH error.
Unexpected error:
    <*errors.errorString | 0xc003414c70>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:281
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] 1m18s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(default\sfs\)\]\ssubPath\sshould\sunmount\sif\spod\sis\sgracefully\sdeleted\swhile\skubelet\sis\sdown\s\[Disruptive\]\[Slow\]\[LinuxOnly\]$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:340
Dec  6 22:52:38.452: Encountered SSH error.
Unexpected error:
    <*errors.errorString | 0xc001de3790>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:281
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] 1m26s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(default\sfs\)\]\ssubPath\sshould\sunmount\sif\spod\sis\sgracefully\sdeleted\swhile\skubelet\sis\sdown\s\[Disruptive\]\[Slow\]\[LinuxOnly\]$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:340
Dec  6 22:51:27.430: Encountered SSH error.
Unexpected error:
    <*errors.errorString | 0xc001f979e0>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:281
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies 0.26s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(delayed\sbinding\)\]\stopology\sshould\sfail\sto\sschedule\sa\spod\swhich\shas\stopologies\sthat\sconflict\swith\sAllowedTopologies$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:192
Dec  7 01:11:22.567: failed to get current driver topologies
Unexpected error:
    <*errors.errorString | 0xc00396e620>: {
        s: "node k8s-agentpool1-48493575-vmss000000 missing topology label topology.disk.csi.azure.com/zone",
    }
    node k8s-agentpool1-48493575-vmss000000 missing topology label topology.disk.csi.azure.com/zone
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:133
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies 0.27s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(delayed\sbinding\)\]\stopology\sshould\sfail\sto\sschedule\sa\spod\swhich\shas\stopologies\sthat\sconflict\swith\sAllowedTopologies$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:192
Dec  7 01:11:22.296: failed to get current driver topologies
Unexpected error:
    <*errors.errorString | 0xc002219d10>: {
        s: "node k8s-agentpool1-48493575-vmss000000 missing topology label topology.disk.csi.azure.com/zone",
    }
    node k8s-agentpool1-48493575-vmss000000 missing topology label topology.disk.csi.azure.com/zone
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:133
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies 0.29s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(delayed\sbinding\)\]\stopology\sshould\sprovision\sa\svolume\sand\sschedule\sa\spod\swith\sAllowedTopologies$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:164
Dec  6 22:49:30.847: failed to get current driver topologies
Unexpected error:
    <*errors.errorString | 0xc0026eaca0>: {
        s: "node k8s-agentpool1-48493575-vmss000000 missing topology label topology.disk.csi.azure.com/zone",
    }
    node k8s-agentpool1-48493575-vmss000000 missing topology label topology.disk.csi.azure.com/zone
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:133
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies 0.36s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(delayed\sbinding\)\]\stopology\sshould\sprovision\sa\svolume\sand\sschedule\sa\spod\swith\sAllowedTopologies$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:164
Dec  6 22:49:30.464: failed to get current driver topologies
Unexpected error:
    <*errors.errorString | 0xc00264fa80>: {
        s: "node k8s-agentpool1-48493575-vmss000000 missing topology label topology.disk.csi.azure.com/zone",
    }
    node k8s-agentpool1-48493575-vmss000000 missing topology label topology.disk.csi.azure.com/zone
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:133
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart. 50s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(filesystem\svolmode\)\]\sdisruptive\[Disruptive\]\sShould\stest\sthat\spv\swritten\sbefore\skubelet\srestart\sis\sreadable\safter\srestart\.$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/disruptive.go:149
Dec  7 00:47:34.637: SSH to Node "k8s-agentpool1-48493575-vmss000001" errored.
Unexpected error:
    <*errors.errorString | 0xc002253e30>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:164
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart. 1m38s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(filesystem\svolmode\)\]\sdisruptive\[Disruptive\]\sShould\stest\sthat\spv\swritten\sbefore\skubelet\srestart\sis\sreadable\safter\srestart\.$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/disruptive.go:149
Dec  7 00:46:37.809: SSH to Node "k8s-agentpool1-48493575-vmss000001" errored.
Unexpected error:
    <*errors.errorString | 0xc0022f2950>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:164
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies 0.27s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(immediate\sbinding\)\]\stopology\sshould\sfail\sto\sschedule\sa\spod\swhich\shas\stopologies\sthat\sconflict\swith\sAllowedTopologies$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:192
Dec  6 23:58:22.892: failed to get current driver topologies
Unexpected error:
    <*errors.errorString | 0xc0022034b0>: {
        s: "node k8s-agentpool1-48493575-vmss000000 missing topology label topology.disk.csi.azure.com/zone",
    }
    node k8s-agentpool1-48493575-vmss000000 missing topology label topology.disk.csi.azure.com/zone
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:133
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies 0.32s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(immediate\sbinding\)\]\stopology\sshould\sfail\sto\sschedule\sa\spod\swhich\shas\stopologies\sthat\sconflict\swith\sAllowedTopologies$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:192
Dec  6 23:58:22.552: failed to get current driver topologies
Unexpected error:
    <*errors.errorString | 0xc0027325f0>: {
        s: "node k8s-agentpool1-48493575-vmss000000 missing topology label topology.disk.csi.azure.com/zone",
    }
    node k8s-agentpool1-48493575-vmss000000 missing topology label topology.disk.csi.azure.com/zone
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:133
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies 0.27s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(immediate\sbinding\)\]\stopology\sshould\sprovision\sa\svolume\sand\sschedule\sa\spod\swith\sAllowedTopologies$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:164
Dec  7 00:45:12.812: failed to get current driver topologies
Unexpected error:
    <*errors.errorString | 0xc0026ebe00>: {
        s: "node k8s-agentpool1-48493575-vmss000000 missing topology label topology.disk.csi.azure.com/zone",
    }
    node k8s-agentpool1-48493575-vmss000000 missing topology label topology.disk.csi.azure.com/zone
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:133
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies 0.32s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(immediate\sbinding\)\]\stopology\sshould\sprovision\sa\svolume\sand\sschedule\sa\spod\swith\sAllowedTopologies$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:164
Dec  7 00:45:13.131: failed to get current driver topologies
Unexpected error:
    <*errors.errorString | 0xc0033d41e0>: {
        s: "node k8s-agentpool1-48493575-vmss000000 missing topology label topology.disk.csi.azure.com/zone",
    }
    node k8s-agentpool1-48493575-vmss000000 missing topology label topology.disk.csi.azure.com/zone
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:133
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic Snapshot] snapshottable should create snapshot with defaults [Feature:VolumeSnapshotDataSource] 16s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sSnapshot\]\ssnapshottable\sshould\screate\ssnapshot\swith\sdefaults\s\[Feature\:VolumeSnapshotDataSource\]$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/snapshottable.go:104
Dec  7 00:11:58.498: Unexpected error:
    <*errors.StatusError | 0xc00268b900>: {
        ErrStatus: {
            TypeMeta: {Kind: "", APIVersion: ""},
            ListMeta: {
                SelfLink: "",
                ResourceVersion: "",
                Continue: "",
                RemainingItemCount: nil,
            },
            Status: "Failure",
            Message: "the server could not find the requested resource",
            Reason: "NotFound",
            Details: {
                Name: "",
                Group: "",
                Kind: "",
                UID: "",
                Causes: [
                    {
                        Type: "UnexpectedServerResponse",
                        Message: "404 page not found",
                        Field: "",
                    },
                ],
                RetryAfterSeconds: 0,
            },
            Code: 404,
        },
    }
    the server could not find the requested resource
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/snapshottable.go:170
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic Snapshot] snapshottable should create snapshot with defaults [Feature:VolumeSnapshotDataSource] 20s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sSnapshot\]\ssnapshottable\sshould\screate\ssnapshot\swith\sdefaults\s\[Feature\:VolumeSnapshotDataSource\]$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/snapshottable.go:104
Dec  7 00:12:14.967: Unexpected error:
    <*errors.StatusError | 0xc000fd8640>: {
        ErrStatus: {
            TypeMeta: {Kind: "", APIVersion: ""},
            ListMeta: {
                SelfLink: "",
                ResourceVersion: "",
                Continue: "",
                RemainingItemCount: nil,
            },
            Status: "Failure",
            Message: "the server could not find the requested resource",
            Reason: "NotFound",
            Details: {
                Name: "",
                Group: "",
                Kind: "",
                UID: "",
                Causes: [
                    {
                        Type: "UnexpectedServerResponse",
                        Message: "404 page not found",
                        Field: "",
                    },
                ],
                RetryAfterSeconds: 0,
            },
            Code: 404,
        },
    }
    the server could not find the requested resource
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/snapshottable.go:170
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Test 3h12m

error during ./hack/ginkgo-e2e.sh --ginkgo.flakeAttempts=2 --ginkgo.focus=disk.csi.azure.com --report-dir=/workspace/_artifacts --disable-log-dump=true: exit status 1
				from junit_runner.xml

Filter through log files


Show 50 Passed Tests

Show 4926 Skipped Tests