ResultFAILURE
Tests 17 failed / 48 succeeded
Started2019-12-11 20:19
Elapsed2h18m
Revision
Builder7795f1ac-1c53-11ea-918b-16773c0c7aed
Refs master:5e0f3670
85958:64bdba34
infra-commitc94bf8ef2
job-versionv1.18.0-alpha.0.1654+eb1a8668a7258f-dirty
repok8s.io/kubernetes
repo-commiteb1a8668a7258f30a9d418446c6cc55402b3cab4
repos{u'k8s.io/kubernetes': u'master:5e0f36705ef785a80955bd2b6412d9d227ff60da,85958:64bdba3457e8c2c32bb9b4ca1c94907edf5da3ad'}
revisionv1.18.0-alpha.0.1654+eb1a8668a7258f-dirty

Test Failures


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. 1m0s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\sdisruptive\[Disruptive\]\sShould\stest\sthat\spv\sused\sin\sa\spod\sthat\sis\sdeleted\swhile\sthe\skubelet\sis\sdown\scleans\sup\swhen\sthe\skubelet\sreturns\.$'
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/disruptive.go:149
Dec 11 21:14:00.969: SSH to "10.240.0.4:22" errored.
Unexpected error:
    <*errors.errorString | 0xc0026127c0>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:110
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is deleted while the kubelet is down cleans up when the kubelet returns. 1m4s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\sdisruptive\[Disruptive\]\sShould\stest\sthat\spv\sused\sin\sa\spod\sthat\sis\sdeleted\swhile\sthe\skubelet\sis\sdown\scleans\sup\swhen\sthe\skubelet\sreturns\.$'
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/disruptive.go:149
Dec 11 21:12:54.563: SSH to "10.240.0.4:22" errored.
Unexpected error:
    <*errors.errorString | 0xc002459850>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:110
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. 50s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\sdisruptive\[Disruptive\]\sShould\stest\sthat\spv\sused\sin\sa\spod\sthat\sis\sforce\sdeleted\swhile\sthe\skubelet\sis\sdown\scleans\sup\swhen\sthe\skubelet\sreturns\.$'
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/disruptive.go:149
Dec 11 21:31:05.289: SSH to "10.240.0.4:22" errored.
Unexpected error:
    <*errors.errorString | 0xc003880f40>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:110
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv used in a pod that is force deleted while the kubelet is down cleans up when the kubelet returns. 58s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\sdisruptive\[Disruptive\]\sShould\stest\sthat\spv\sused\sin\sa\spod\sthat\sis\sforce\sdeleted\swhile\sthe\skubelet\sis\sdown\scleans\sup\swhen\sthe\skubelet\sreturns\.$'
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/disruptive.go:149
Dec 11 21:30:20.909: SSH to "10.240.0.4:22" errored.
Unexpected error:
    <*errors.errorString | 0xc0037cd5a0>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:110
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart. 32s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\sdisruptive\[Disruptive\]\sShould\stest\sthat\spv\swritten\sbefore\skubelet\srestart\sis\sreadable\safter\srestart\.$'
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/disruptive.go:149
Dec 11 22:01:56.583: SSH to Node "k8s-agentpool1-19553429-vmss000000" errored.
Unexpected error:
    <*errors.errorString | 0xc002f513b0>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:164
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart. 1m30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\sdisruptive\[Disruptive\]\sShould\stest\sthat\spv\swritten\sbefore\skubelet\srestart\sis\sreadable\safter\srestart\.$'
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/disruptive.go:149
Dec 11 22:01:15.839: SSH to Node "k8s-agentpool1-19553429-vmss000000" errored.
Unexpected error:
    <*errors.errorString | 0xc003746310>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:164
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node 6m10s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\smultiVolume\s\[Slow\]\sshould\saccess\sto\stwo\svolumes\swith\sdifferent\svolume\smode\sand\sretain\sdata\sacross\spod\srecreation\son\sdifferent\snode$'
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/multivolume.go:241
Dec 11 22:17:59.896: Unexpected error:
    <*errors.errorString | 0xc002217850>: {
        s: "pod \"security-context-3788ad5b-9329-400a-ae64-f68923d180ff\" is not Running: timed out waiting for the condition",
    }
    pod "security-context-3788ad5b-9329-400a-ae64-f68923d180ff" is not Running: timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/multivolume.go:360
				
				Click to see stdout/stderrfrom junit_01.xml

Find security-context-3788ad5b-9329-400a-ae64-f68923d180ff mentions in log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node 7m50s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\smultiVolume\s\[Slow\]\sshould\saccess\sto\stwo\svolumes\swith\sdifferent\svolume\smode\sand\sretain\sdata\sacross\spod\srecreation\son\sdifferent\snode$'
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/multivolume.go:241
Dec 11 22:11:47.495: Unexpected error:
    <*errors.errorString | 0xc00340cfb0>: {
        s: "pod \"security-context-52b8b24e-7313-4816-a34a-b78855161e71\" is not Running: timed out waiting for the condition",
    }
    pod "security-context-52b8b24e-7313-4816-a34a-b78855161e71" is not Running: timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/multivolume.go:360
				
				Click to see stdout/stderrfrom junit_01.xml

Find security-context-52b8b24e-7313-4816-a34a-b78855161e71 mentions in log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node 6m10s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\smultiVolume\s\[Slow\]\sshould\saccess\sto\stwo\svolumes\swith\sthe\ssame\svolume\smode\sand\sretain\sdata\sacross\spod\srecreation\son\sdifferent\snode$'
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/multivolume.go:159
Dec 11 21:43:27.706: Unexpected error:
    <*errors.errorString | 0xc00340c270>: {
        s: "pod \"security-context-ae739eca-f48a-4ae2-bc4e-dde6e99a2439\" is not Running: timed out waiting for the condition",
    }
    pod "security-context-ae739eca-f48a-4ae2-bc4e-dde6e99a2439" is not Running: timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/multivolume.go:360
				
				Click to see stdout/stderrfrom junit_01.xml

Find security-context-ae739eca-f48a-4ae2-bc4e-dde6e99a2439 mentions in log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node 6m20s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(block\svolmode\)\]\smultiVolume\s\[Slow\]\sshould\saccess\sto\stwo\svolumes\swith\sthe\ssame\svolume\smode\sand\sretain\sdata\sacross\spod\srecreation\son\sdifferent\snode$'
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/multivolume.go:159
Dec 11 21:49:50.121: Unexpected error:
    <*errors.errorString | 0xc004110860>: {
        s: "pod \"security-context-29d5a25b-381a-45aa-b08d-350673d80ff6\" is not Running: timed out waiting for the condition",
    }
    pod "security-context-29d5a25b-381a-45aa-b08d-350673d80ff6" is not Running: timed out waiting for the condition
occurred
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/multivolume.go:360
				
				Click to see stdout/stderrfrom junit_01.xml

Find security-context-29d5a25b-381a-45aa-b08d-350673d80ff6 mentions in log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] 1m51s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(default\sfs\)\]\ssubPath\sshould\sunmount\sif\spod\sis\sforce\sdeleted\swhile\skubelet\sis\sdown\s\[Disruptive\]\[Slow\]\[LinuxOnly\]$'
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:347
Dec 11 22:24:54.291: Encountered SSH error.
Unexpected error:
    <*errors.errorString | 0xc003285170>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:281
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is force deleted while kubelet is down [Disruptive][Slow][LinuxOnly] 1m51s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(default\sfs\)\]\ssubPath\sshould\sunmount\sif\spod\sis\sforce\sdeleted\swhile\skubelet\sis\sdown\s\[Disruptive\]\[Slow\]\[LinuxOnly\]$'
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:347
Dec 11 22:23:03.288: Encountered SSH error.
Unexpected error:
    <*errors.errorString | 0xc002a42240>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:281
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] 1m24s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(default\sfs\)\]\ssubPath\sshould\sunmount\sif\spod\sis\sgracefully\sdeleted\swhile\skubelet\sis\sdown\s\[Disruptive\]\[Slow\]\[LinuxOnly\]$'
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:340
Dec 11 21:21:39.324: Encountered SSH error.
Unexpected error:
    <*errors.errorString | 0xc00231c880>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:281
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (default fs)] subPath should unmount if pod is gracefully deleted while kubelet is down [Disruptive][Slow][LinuxOnly] 1m39s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(default\sfs\)\]\ssubPath\sshould\sunmount\sif\spod\sis\sgracefully\sdeleted\swhile\skubelet\sis\sdown\s\[Disruptive\]\[Slow\]\[LinuxOnly\]$'
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/subpath.go:340
Dec 11 21:20:06.427: Encountered SSH error.
Unexpected error:
    <*errors.errorString | 0xc00266f920>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:281
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart. 58s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(filesystem\svolmode\)\]\sdisruptive\[Disruptive\]\sShould\stest\sthat\spv\swritten\sbefore\skubelet\srestart\sis\sreadable\safter\srestart\.$'
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/disruptive.go:149
Dec 11 21:25:15.137: SSH to Node "k8s-agentpool1-19553429-vmss000000" errored.
Unexpected error:
    <*errors.errorString | 0xc00231c250>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:164
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Kubernetes e2e suite [sig-storage] CSI Volumes [Driver: disk.csi.azure.com][Serial] [Testpattern: Dynamic PV (filesystem volmode)] disruptive[Disruptive] Should test that pv written before kubelet restart is readable after restart. 1m6s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[sig\-storage\]\sCSI\sVolumes\s\[Driver\:\sdisk\.csi\.azure\.com\]\[Serial\]\s\[Testpattern\:\sDynamic\sPV\s\(filesystem\svolmode\)\]\sdisruptive\[Disruptive\]\sShould\stest\sthat\spv\swritten\sbefore\skubelet\srestart\sis\sreadable\safter\srestart\.$'
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/testsuites/disruptive.go:149
Dec 11 21:24:08.400: SSH to Node "k8s-agentpool1-19553429-vmss000000" errored.
Unexpected error:
    <*errors.errorString | 0xc00266eaa0>: {
        s: "error getting signer for provider azure: 'GetSigner(...) not implemented for azure'",
    }
    error getting signer for provider azure: 'GetSigner(...) not implemented for azure'
occurred
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/storage/utils/utils.go:164
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files


Test 1h34m

error during ./hack/ginkgo-e2e.sh --ginkgo.flakeAttempts=2 --ginkgo.focus=disk.csi.azure.com --report-dir=/workspace/_artifacts --disable-log-dump=true: exit status 1
				from junit_runner.xml

Filter through log files


Show 48 Passed Tests

Show 4965 Skipped Tests