ResultFAILURE
Tests 37 failed / 50 succeeded
Started2019-12-09 16:54
Elapsed3h29m
Revision
Builder8dfdff41-1aa4-11ea-918b-16773c0c7aed
Refs master:a3718d76
85958:8b511b2d
infra-commitdc70aede1
job-versionv1.18.0-alpha.0.1463+ffa65da1319433-dirty
repok8s.io/kubernetes
repo-commitffa65da13194333769407bd930648be670834ee6
repos{u'k8s.io/kubernetes': u'master:a3718d765343bc80aaaa8c95af96070b69bd7e19,85958:8b511b2d3ad3655232a326cc31d489ec099e5f60'}
revisionv1.18.0-alpha.0.1463+ffa65da1319433-dirty

Test Failures


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works 10m54s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\(allowExpansion\)\]\svolume\-expand\sVerify\sif\soffline\sPVC\sexpansion\sworks$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:161
Dec  9 18:58:32.087: While waiting for pvc resize to finish
Unexpected error:
    <*errors.errorString | 0xc0001114b0>: {
        s: "timed out waiting for the condition",
    }
    timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:196
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works 11m38s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\(allowExpansion\)\]\svolume\-expand\sVerify\sif\soffline\sPVC\sexpansion\sworks$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:161
Dec  9 19:10:10.536: While waiting for pvc resize to finish
Unexpected error:
    <*errors.errorString | 0xc0001114b0>: {
        s: "timed out waiting for the condition",
    }
    timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:196
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it 11m28s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\(allowExpansion\)\]\svolume\-expand\sshould\sresize\svolume\swhen\sPVC\sis\sedited\swhile\spod\sis\susing\sit$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:219
Dec  9 17:45:38.694: While waiting for pvc resize to finish
Unexpected error:
    <*errors.errorString | 0xc0001114b0>: {
        s: "timed out waiting for the condition",
    }
    timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:250
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it 11m30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\(allowExpansion\)\]\svolume\-expand\sshould\sresize\svolume\swhen\sPVC\sis\sedited\swhile\spod\sis\susing\sit$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:219
Dec  9 17:57:15.149: While waiting for pvc resize to finish
Unexpected error:
    <*errors.errorString | 0xc0001114b0>: {
        s: "timed out waiting for the condition",
    }
    timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:250
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. 48s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\sdisruptive\[Disruptive\]\sShould\stest\sthat\spv\sused\sin\sa\spod\sthat\sis\sdeleted\swhile\sthe\skubelet\sis\sdown\scleans\sup\swhen\sthe\skubelet\sreturns\.$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/disruptive.go:149
Dec  9 18:17:18.313: SSH to "10.240.0.4:22" errored.
Unexpected error:
    <*errors.errorString | 0xc0017ad2b0>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:110
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. 1m4s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\sdisruptive\[Disruptive\]\sShould\stest\sthat\spv\sused\sin\sa\spod\sthat\sis\sdeleted\swhile\sthe\skubelet\sis\sdown\scleans\sup\swhen\sthe\skubelet\sreturns\.$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/disruptive.go:149
Dec  9 18:16:29.850: SSH to "10.240.0.4:22" errored.
Unexpected error:
    <*errors.errorString | 0xc0031188e0>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:110
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. 40s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\sdisruptive\[Disruptive\]\sShould\stest\sthat\spv\sused\sin\sa\spod\sthat\sis\sforce\sdeleted\swhile\sthe\skubelet\sis\sdown\scleans\sup\swhen\sthe\skubelet\sreturns\.$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/disruptive.go:149
Dec  9 17:17:45.596: SSH to "10.240.0.4:22" errored.
Unexpected error:
    <*errors.errorString | 0xc001c67160>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:110
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. 1m32s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\sdisruptive\[Disruptive\]\sShould\stest\sthat\spv\sused\sin\sa\spod\sthat\sis\sforce\sdeleted\swhile\sthe\skubelet\sis\sdown\scleans\sup\swhen\sthe\skubelet\sreturns\.$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/disruptive.go:149
Dec  9 17:17:01.165: SSH to "10.240.0.4:22" errored.
Unexpected error:
    <*errors.errorString | 0xc003323340>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:110
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart. 58s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\sdisruptive\[Disruptive\]\sShould\stest\sthat\spv\swritten\sbefore\skubelet\srestart\sis\sreadable\safter\srestart\.$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/disruptive.go:149
Dec  9 19:47:34.435: SSH to Node "k8s-agentpool1-27872339-vmss000000" errored.
Unexpected error:
    <*errors.errorString | 0xc002fbc8d0>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:164
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart. 1m38s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\sdisruptive\[Disruptive\]\sShould\stest\sthat\spv\swritten\sbefore\skubelet\srestart\sis\sreadable\safter\srestart\.$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/disruptive.go:149
Dec  9 19:46:27.618: SSH to Node "k8s-agentpool1-27872339-vmss000000" errored.
Unexpected error:
    <*errors.errorString | 0xc002dc1ab0>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:164
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node 6m10s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\smultiVolume\s\[Slow\]\sshould\saccess\sto\stwo\svolumes\swith\sdifferent\svolume\smode\sand\sretain\sdata\sacross\spod\srecreation\son\sdifferent\snode$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/multivolume.go:241
Dec  9 20:03:21.708: Unexpected error:
    <*errors.errorString | 0xc0029ec6f0>: {
        s: "pod \"security-context-6be628cf-522d-46de-94ff-62c3df538471\" is not Running: timed out waiting for the condition",
    }
    pod "security-context-6be628cf-522d-46de-94ff-62c3df538471" is not Running: timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/multivolume.go:360
				
				Click to see stdout/stderrfrom junit_01.xml

Find security-context-6be628cf-522d-46de-94ff-62c3df538471 mentions in log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node 6m36s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\smultiVolume\s\[Slow\]\sshould\saccess\sto\stwo\svolumes\swith\sdifferent\svolume\smode\sand\sretain\sdata\sacross\spod\srecreation\son\sdifferent\snode$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/multivolume.go:241
Dec  9 19:57:11.317: Unexpected error:
    <*errors.errorString | 0xc0027fae20>: {
        s: "pod \"security-context-f5394d9d-1aa6-4d7f-8fe8-e6f995ae17d1\" is not Running: timed out waiting for the condition",
    }
    pod "security-context-f5394d9d-1aa6-4d7f-8fe8-e6f995ae17d1" is not Running: timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/multivolume.go:360
				
				Click to see stdout/stderrfrom junit_01.xml

Find security-context-f5394d9d-1aa6-4d7f-8fe8-e6f995ae17d1 mentions in log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node 6m18s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\smultiVolume\s\[Slow\]\sshould\saccess\sto\stwo\svolumes\swith\sthe\ssame\svolume\smode\sand\sretain\sdata\sacross\spod\srecreation\son\sdifferent\snode$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/multivolume.go:159
Dec  9 20:16:20.486: Unexpected error:
    <*errors.errorString | 0xc002bfb4f0>: {
        s: "pod \"security-context-6e9bab3c-1ea0-4e8e-806d-6f4f12953274\" is not Running: timed out waiting for the condition",
    }
    pod "security-context-6e9bab3c-1ea0-4e8e-806d-6f4f12953274" is not Running: timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/multivolume.go:360
				
				Click to see stdout/stderrfrom junit_01.xml

Find security-context-6e9bab3c-1ea0-4e8e-806d-6f4f12953274 mentions in log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node 6m40s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\smultiVolume\s\[Slow\]\sshould\saccess\sto\stwo\svolumes\swith\sthe\ssame\svolume\smode\sand\sretain\sdata\sacross\spod\srecreation\son\sdifferent\snode$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/multivolume.go:159
Dec  9 20:10:02.101: Unexpected error:
    <*errors.errorString | 0xc00299b7f0>: {
        s: "pod \"security-context-e74b9d1a-e13b-452c-bdb6-5cfb0021d0ce\" is not Running: timed out waiting for the condition",
    }
    pod "security-context-e74b9d1a-e13b-452c-bdb6-5cfb0021d0ce" is not Running: timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/multivolume.go:360
				
				Click to see stdout/stderrfrom junit_01.xml

Find security-context-e74b9d1a-e13b-452c-bdb6-5cfb0021d0ce mentions in log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works 10m50s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(default\sfs\)\(allowExpansion\)\]\svolume\-expand\sVerify\sif\soffline\sPVC\sexpansion\sworks$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:161
Dec  9 18:28:41.031: While waiting for pvc resize to finish
Unexpected error:
    <*errors.errorString | 0xc0001114b0>: {
        s: "timed out waiting for the condition",
    }
    timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:196
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works 11m20s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(default\sfs\)\(allowExpansion\)\]\svolume\-expand\sVerify\sif\soffline\sPVC\sexpansion\sworks$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:161
Dec  9 18:40:01.619: While waiting for pvc resize to finish
Unexpected error:
    <*errors.errorString | 0xc0001114b0>: {
        s: "timed out waiting for the condition",
    }
    timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:196
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it 10m42s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(default\sfs\)\(allowExpansion\)\]\svolume\-expand\sshould\sresize\svolume\swhen\sPVC\sis\sedited\swhile\spod\sis\susing\sit$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:219
Dec  9 19:43:44.263: While waiting for pvc resize to finish
Unexpected error:
    <*errors.errorString | 0xc0001114b0>: {
        s: "timed out waiting for the condition",
    }
    timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:250
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it 10m58s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(default\sfs\)\(allowExpansion\)\]\svolume\-expand\sshould\sresize\svolume\swhen\sPVC\sis\sedited\swhile\spod\sis\susing\sit$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:219
Dec  9 19:32:59.810: While waiting for pvc resize to finish
Unexpected error:
    <*errors.errorString | 0xc0001114b0>: {
        s: "timed out waiting for the condition",
    }
    timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_expand.go:250
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] 28s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(default\sfs\)\]\sprovisioning\sshould\sprovision\sstorage\swith\ssnapshot\sdata\ssource\s\[Feature\:VolumeSnapshotDataSource\]$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/provisioning.go:187
Test Panicked
/usr/local/go/src/runtime/panic.go:199

Panic: runtime error: invalid memory address or nil pointer dereference

Full stack:
k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/unstructured.(*Unstructured).GetName(...)
	/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/unstructured/unstructured.go:246
k8s.io/kubernetes/test/e2e/storage/testsuites.prepareSnapshotDataSourceForProvisioning(0x0, 0x0, 0x0, 0x0, 0x5429500, 0xc003baa9a0, 0x52ae060, 0xc003b666a0, 0xc00063e700, 0xc002e1ca80, ...)
	/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/provisioning.go:652 +0x66c
k8s.io/kubernetes/test/e2e/storage/testsuites.(*provisioningTestSuite).defineTests.func5()
	/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/provisioning.go:202 +0x1fd
k8s.io/kubernetes/test/e2e.RunE2ETests(0xc001a5fa00)
	_output/local/go/src/k8s.io/kubernetes/test/e2e/e2e.go:110 +0x30a
k8s.io/kubernetes/test/e2e.TestE2E(0xc001a5fa00)
	_output/local/go/src/k8s.io/kubernetes/test/e2e/e2e_test.go:112 +0x2b
testing.tRunner(0xc001a5fa00, 0x4c35e58)
	/usr/local/go/src/testing/testing.go:909 +0xc9
created by testing.(*T).Run
	/usr/local/go/src/testing/testing.go:960 +0x350
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] 54s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(default\sfs\)\]\sprovisioning\sshould\sprovision\sstorage\swith\ssnapshot\sdata\ssource\s\[Feature\:VolumeSnapshotDataSource\]$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/provisioning.go:187
Test Panicked
/usr/local/go/src/runtime/panic.go:199

Panic: runtime error: invalid memory address or nil pointer dereference

Full stack:
k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/unstructured.(*Unstructured).GetName(...)
	/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/vendor/k8s.io/apimachinery/pkg/apis/meta/v1/unstructured/unstructured.go:246
k8s.io/kubernetes/test/e2e/storage/testsuites.prepareSnapshotDataSourceForProvisioning(0x0, 0x0, 0x0, 0x0, 0x5429500, 0xc0036b1e40, 0x52ae060, 0xc002705b38, 0xc0023f6fc0, 0xc0007cf200, ...)
	/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/provisioning.go:652 +0x66c
k8s.io/kubernetes/test/e2e/storage/testsuites.(*provisioningTestSuite).defineTests.func5()
	/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/provisioning.go:202 +0x1fd
k8s.io/kubernetes/test/e2e.RunE2ETests(0xc001a5fa00)
	_output/local/go/src/k8s.io/kubernetes/test/e2e/e2e.go:110 +0x30a
k8s.io/kubernetes/test/e2e.TestE2E(0xc001a5fa00)
	_output/local/go/src/k8s.io/kubernetes/test/e2e/e2e_test.go:112 +0x2b
testing.tRunner(0xc001a5fa00, 0x4c35e58)
	/usr/local/go/src/testing/testing.go:909 +0xc9
created by testing.(*T).Run
	/usr/local/go/src/testing/testing.go:960 +0x350
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] 1m24s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(default\sfs\)\]\ssubPath\sshould\sunmount\sif\spod\sis\sforce\sdeleted\swhile\skubelet\sis\sdown\s\[Disruptive\]\[Slow\]\[LinuxOnly\]$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:347
Dec  9 18:03:15.652: Encountered SSH error.
Unexpected error:
    <*errors.errorString | 0xc002cb8580>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:281
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] 1m35s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(default\sfs\)\]\ssubPath\sshould\sunmount\sif\spod\sis\sforce\sdeleted\swhile\skubelet\sis\sdown\s\[Disruptive\]\[Slow\]\[LinuxOnly\]$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:347
Dec  9 18:01:52.657: Encountered SSH error.
Unexpected error:
    <*errors.errorString | 0xc00225a040>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:281
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] 1m28s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(default\sfs\)\]\ssubPath\sshould\sunmount\sif\spod\sis\sgracefully\sdeleted\swhile\skubelet\sis\sdown\s\[Disruptive\]\[Slow\]\[LinuxOnly\]$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:340
Dec  9 18:04:41.208: Encountered SSH error.
Unexpected error:
    <*errors.errorString | 0xc001b5de70>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:281
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] 2m20s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(default\sfs\)\]\ssubPath\sshould\sunmount\sif\spod\sis\sgracefully\sdeleted\swhile\skubelet\sis\sdown\s\[Disruptive\]\[Slow\]\[LinuxOnly\]$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:340
Dec  9 18:06:58.082: Encountered SSH error.
Unexpected error:
    <*errors.errorString | 0xc002cb8fe0>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:281
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies 0.28s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(delayed\sbinding\)\]\stopology\sshould\sfail\sto\sschedule\sa\spod\swhich\shas\stopologies\sthat\sconflict\swith\sAllowedTopologies$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:192
Dec  9 17:15:38.857: failed to get current driver topologies
Unexpected error:
    <*errors.errorString | 0xc0011bba70>: {
        s: "node k8s-agentpool1-27872339-vmss000000 missing topology label topology.disk.csi.azure.com/zone",
    }
    node k8s-agentpool1-27872339-vmss000000 missing topology label topology.disk.csi.azure.com/zone
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:133
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies 0.38s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(delayed\sbinding\)\]\stopology\sshould\sfail\sto\sschedule\sa\spod\swhich\shas\stopologies\sthat\sconflict\swith\sAllowedTopologies$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:192
Dec  9 17:15:38.472: failed to get current driver topologies
Unexpected error:
    <*errors.errorString | 0xc002cd98d0>: {
        s: "node k8s-agentpool1-27872339-vmss000000 missing topology label topology.disk.csi.azure.com/zone",
    }
    node k8s-agentpool1-27872339-vmss000000 missing topology label topology.disk.csi.azure.com/zone
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:133
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies 0.29s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(delayed\sbinding\)\]\stopology\sshould\sprovision\sa\svolume\sand\sschedule\sa\spod\swith\sAllowedTopologies$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:164
Dec  9 18:03:52.374: failed to get current driver topologies
Unexpected error:
    <*errors.errorString | 0xc00364a480>: {
        s: "node k8s-agentpool1-27872339-vmss000000 missing topology label topology.disk.csi.azure.com/zone",
    }
    node k8s-agentpool1-27872339-vmss000000 missing topology label topology.disk.csi.azure.com/zone
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:133
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies 0.33s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(delayed\sbinding\)\]\stopology\sshould\sprovision\sa\svolume\sand\sschedule\sa\spod\swith\sAllowedTopologies$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:164
Dec  9 18:03:52.059: failed to get current driver topologies
Unexpected error:
    <*errors.errorString | 0xc0023c1ad0>: {
        s: "node k8s-agentpool1-27872339-vmss000000 missing topology label topology.disk.csi.azure.com/zone",
    }
    node k8s-agentpool1-27872339-vmss000000 missing topology label topology.disk.csi.azure.com/zone
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:133
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart. 1m0s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(filesystem\svolmode\)\]\sdisruptive\[Disruptive\]\sShould\stest\sthat\spv\swritten\sbefore\skubelet\srestart\sis\sreadable\safter\srestart\.$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/disruptive.go:149
Dec  9 18:42:29.234: SSH to Node "k8s-agentpool1-27872339-vmss000000" errored.
Unexpected error:
    <*errors.errorString | 0xc002c3a990>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:164
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart. 1m38s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(filesystem\svolmode\)\]\sdisruptive\[Disruptive\]\sShould\stest\sthat\spv\swritten\sbefore\skubelet\srestart\sis\sreadable\safter\srestart\.$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/disruptive.go:149
Dec  9 18:41:28.407: SSH to Node "k8s-agentpool1-27872339-vmss000000" errored.
Unexpected error:
    <*errors.errorString | 0xc00239a210>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:164
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies 0.30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(immediate\sbinding\)\]\stopology\sshould\sfail\sto\sschedule\sa\spod\swhich\shas\stopologies\sthat\sconflict\swith\sAllowedTopologies$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:192
Dec  9 17:23:42.780: failed to get current driver topologies
Unexpected error:
    <*errors.errorString | 0xc002b464b0>: {
        s: "node k8s-agentpool1-27872339-vmss000000 missing topology label topology.disk.csi.azure.com/zone",
    }
    node k8s-agentpool1-27872339-vmss000000 missing topology label topology.disk.csi.azure.com/zone
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:133
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies 0.38s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(immediate\sbinding\)\]\stopology\sshould\sfail\sto\sschedule\sa\spod\swhich\shas\stopologies\sthat\sconflict\swith\sAllowedTopologies$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:192
Dec  9 17:23:42.385: failed to get current driver topologies
Unexpected error:
    <*errors.errorString | 0xc002d4c5b0>: {
        s: "node k8s-agentpool1-27872339-vmss000000 missing topology label topology.disk.csi.azure.com/zone",
    }
    node k8s-agentpool1-27872339-vmss000000 missing topology label topology.disk.csi.azure.com/zone
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:133
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies 0.26s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(immediate\sbinding\)\]\stopology\sshould\sprovision\sa\svolume\sand\sschedule\sa\spod\swith\sAllowedTopologies$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:164
Dec  9 19:10:11.192: failed to get current driver topologies
Unexpected error:
    <*errors.errorString | 0xc002826ac0>: {
        s: "node k8s-agentpool1-27872339-vmss000000 missing topology label topology.disk.csi.azure.com/zone",
    }
    node k8s-agentpool1-27872339-vmss000000 missing topology label topology.disk.csi.azure.com/zone
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:133
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies 0.26s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(immediate\sbinding\)\]\stopology\sshould\sprovision\sa\svolume\sand\sschedule\sa\spod\swith\sAllowedTopologies$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:164
Dec  9 19:10:10.928: failed to get current driver topologies
Unexpected error:
    <*errors.errorString | 0xc00251a570>: {
        s: "node k8s-agentpool1-27872339-vmss000000 missing topology label topology.disk.csi.azure.com/zone",
    }
    node k8s-agentpool1-27872339-vmss000000 missing topology label topology.disk.csi.azure.com/zone
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/topology.go:133
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic Snapshot] snapshottable should create snapshot with defaults [Feature:VolumeSnapshotDataSource] 10s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sSnapshot\]\ssnapshottable\sshould\screate\ssnapshot\swith\sdefaults\s\[Feature\:VolumeSnapshotDataSource\]$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/snapshottable.go:104
Dec  9 18:46:23.119: Unexpected error:
    <*errors.StatusError | 0xc000fec280>: {
        ErrStatus: {
            TypeMeta: {Kind: "", APIVersion: ""},
            ListMeta: {
                SelfLink: "",
                ResourceVersion: "",
                Continue: "",
                RemainingItemCount: nil,
            },
            Status: "Failure",
            Message: "the server could not find the requested resource",
            Reason: "NotFound",
            Details: {
                Name: "",
                Group: "",
                Kind: "",
                UID: "",
                Causes: [
                    {
                        Type: "UnexpectedServerResponse",
                        Message: "404 page not found",
                        Field: "",
                    },
                ],
                RetryAfterSeconds: 0,
            },
            Code: 404,
        },
    }
    the server could not find the requested resource
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/snapshottable.go:170
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic Snapshot] snapshottable should create snapshot with defaults [Feature:VolumeSnapshotDataSource] 10s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sSnapshot\]\ssnapshottable\sshould\screate\ssnapshot\swith\sdefaults\s\[Feature\:VolumeSnapshotDataSource\]$'
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/snapshottable.go:104
Dec  9 18:46:12.692: Unexpected error:
    <*errors.StatusError | 0xc001761f40>: {
        ErrStatus: {
            TypeMeta: {Kind: "", APIVersion: ""},
            ListMeta: {
                SelfLink: "",
                ResourceVersion: "",
                Continue: "",
                RemainingItemCount: nil,
            },
            Status: "Failure",
            Message: "the server could not find the requested resource",
            Reason: "NotFound",
            Details: {
                Name: "",
                Group: "",
                Kind: "",
                UID: "",
                Causes: [
                    {
                        Type: "UnexpectedServerResponse",
                        Message: "404 page not found",
                        Field: "",
                    },
                ],
                RetryAfterSeconds: 0,
            },
            Code: 404,
        },
    }
    the server could not find the requested resource
occurred
/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/snapshottable.go:170
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Test 3h4m

error during ./hack/ginkgo-e2e.sh --ginkgo.flakeAttempts=2 --ginkgo.focus=disk.csi.azure.com --report-dir=/workspace/_artifacts --disable-log-dump=true: exit status 1
				from junit_runner.xml

Filter through log files


Show 50 Passed Tests

Show 4926 Skipped Tests