This job view page is being replaced by Spyglass soon. Check out the new job view.
PRnilo19: Cherry pick of #100690: azure: fix node public IP not able to fetch issues from IMDS
ResultFAILURE
Tests 0 failed / 76 succeeded
Started2021-04-08 07:17
Elapsed9m25s
Revisionc0fe61d78459614dc7d52478979cee0c6d3b97f6
Refs 100910

No Test Failures!


Show 76 Passed Tests

Error lines from build-log.txt

... skipping 49 lines ...
Recording: record_command_canary
Running command: record_command_canary

+++ Running case: test-cmd.record_command_canary 
+++ working dir: /home/prow/go/src/k8s.io/kubernetes
+++ command: record_command_canary
/home/prow/go/src/k8s.io/kubernetes/test/cmd/legacy-script.sh: line 155: bogus-expected-to-fail: command not found
!!! [0408 07:21:57] Call tree:
!!! [0408 07:21:57]  1: /home/prow/go/src/k8s.io/kubernetes/test/cmd/../../third_party/forked/shell2junit/sh2ju.sh:47 record_command_canary(...)
!!! [0408 07:21:57]  2: /home/prow/go/src/k8s.io/kubernetes/test/cmd/../../third_party/forked/shell2junit/sh2ju.sh:112 eVal(...)
!!! [0408 07:21:57]  3: /home/prow/go/src/k8s.io/kubernetes/test/cmd/legacy-script.sh:131 juLog(...)
!!! [0408 07:21:57]  4: /home/prow/go/src/k8s.io/kubernetes/test/cmd/legacy-script.sh:159 record_command(...)
!!! [0408 07:21:57]  5: hack/make-rules/test-cmd.sh:35 source(...)
+++ exit code: 1
+++ error: 1
+++ [0408 07:21:57] Running kubeadm tests
warning: ignoring symlink /home/prow/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes
go: warning: "k8s.io/kubernetes/vendor/github.com/go-bindata/go-bindata/..." matched no packages
+++ [0408 07:22:02] Building go targets for linux/amd64:
    cmd/kubeadm
warning: ignoring symlink /home/prow/go/src/k8s.io/kubernetes/_output/local/go/src/k8s.io/kubernetes
... skipping 318 lines ...
go: warning: "k8s.io/kubernetes/vendor/github.com/go-bindata/go-bindata/..." matched no packages
+++ [0408 07:26:09] Building go targets for linux/amd64:
    cmd/kube-controller-manager
+++ [0408 07:26:38] Starting controller-manager
Flag --port has been deprecated, see --secure-port instead.
I0408 07:26:38.714995   55811 serving.go:313] Generated self-signed cert in-memory
W0408 07:26:39.187969   55811 authentication.go:410] failed to read in-cluster kubeconfig for delegated authentication: open /var/run/secrets/kubernetes.io/serviceaccount/token: no such file or directory
W0408 07:26:39.188027   55811 authentication.go:268] No authentication-kubeconfig provided in order to lookup client-ca-file in configmap/extension-apiserver-authentication in kube-system, so client certificate authentication won't work.
W0408 07:26:39.188034   55811 authentication.go:292] No authentication-kubeconfig provided in order to lookup requestheader-client-ca-file in configmap/extension-apiserver-authentication in kube-system, so request-header client certificate authentication won't work.
W0408 07:26:39.188049   55811 authorization.go:187] failed to read in-cluster kubeconfig for delegated authorization: open /var/run/secrets/kubernetes.io/serviceaccount/token: no such file or directory
W0408 07:26:39.188067   55811 authorization.go:156] No authorization-kubeconfig provided, so SubjectAccessReview of authorization tokens won't work.
I0408 07:26:39.188091   55811 controllermanager.go:161] Version: v1.18.18-rc.0.35+6e5c92e512f491
I0408 07:26:39.190154   55811 secure_serving.go:178] Serving securely on [::]:10257
I0408 07:26:39.190210   55811 tlsconfig.go:240] Starting DynamicServingCertificateController
I0408 07:26:39.191021   55811 deprecated_insecure_serving.go:53] Serving insecurely on [::]:10252
I0408 07:26:39.191120   55811 leaderelection.go:242] attempting to acquire leader lease  kube-system/kube-controller-manager...
... skipping 2 lines ...
I0408 07:26:39.206183   55811 event.go:278] Event(v1.ObjectReference{Kind:"Endpoints", Namespace:"kube-system", Name:"kube-controller-manager", UID:"4f87f756-061e-456c-8895-7d01d395c5e6", APIVersion:"v1", ResourceVersion:"157", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' 4c89588e-983a-11eb-87eb-d25f59a38908_319edbc3-a538-42cd-9f25-8f4b5f839bce became leader
I0408 07:26:39.206303   55811 event.go:278] Event(v1.ObjectReference{Kind:"Lease", Namespace:"kube-system", Name:"kube-controller-manager", UID:"007aa7cc-61ae-4892-8e92-f208e8ea04b4", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"158", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' 4c89588e-983a-11eb-87eb-d25f59a38908_319edbc3-a538-42cd-9f25-8f4b5f839bce became leader
+++ [0408 07:26:39] On try 2, controller-manager: ok
I0408 07:26:39.462365   55811 plugins.go:100] No cloud provider specified.
W0408 07:26:39.462411   55811 controllermanager.go:553] "serviceaccount-token" is disabled because there is no private key
I0408 07:26:39.462766   55811 node_lifecycle_controller.go:78] Sending events to api server
E0408 07:26:39.462818   55811 core.go:229] failed to start cloud node lifecycle controller: no cloud provider provided
W0408 07:26:39.462833   55811 controllermanager.go:525] Skipping "cloud-node-lifecycle"
W0408 07:26:39.462847   55811 controllermanager.go:525] Skipping "ttl-after-finished"
W0408 07:26:39.462856   55811 controllermanager.go:525] Skipping "root-ca-cert-publisher"
W0408 07:26:39.463278   55811 mutation_detector.go:53] Mutation detector is enabled, this will result in memory leakage.
W0408 07:26:39.463426   55811 mutation_detector.go:53] Mutation detector is enabled, this will result in memory leakage.
W0408 07:26:39.463487   55811 mutation_detector.go:53] Mutation detector is enabled, this will result in memory leakage.
... skipping 6 lines ...
I0408 07:26:39.464424   55811 controllermanager.go:533] Started "replicaset"
I0408 07:26:39.464498   55811 replica_set.go:182] Starting replicationcontroller controller
I0408 07:26:39.464517   55811 shared_informer.go:223] Waiting for caches to sync for ReplicationController
I0408 07:26:39.464614   55811 replica_set.go:182] Starting replicaset controller
I0408 07:26:39.464626   55811 shared_informer.go:223] Waiting for caches to sync for ReplicaSet
W0408 07:26:39.464684   55811 mutation_detector.go:53] Mutation detector is enabled, this will result in memory leakage.
E0408 07:26:39.464764   55811 core.go:89] Failed to start service controller: WARNING: no cloud provider provided, services of type LoadBalancer will fail
W0408 07:26:39.464781   55811 controllermanager.go:525] Skipping "service"
W0408 07:26:39.465143   55811 mutation_detector.go:53] Mutation detector is enabled, this will result in memory leakage.
W0408 07:26:39.465166   55811 mutation_detector.go:53] Mutation detector is enabled, this will result in memory leakage.
I0408 07:26:39.465605   55811 controllermanager.go:533] Started "persistentvolume-expander"
I0408 07:26:39.465805   55811 expand_controller.go:303] Starting expand controller
I0408 07:26:39.465826   55811 shared_informer.go:223] Waiting for caches to sync for expand
... skipping 138 lines ...
I0408 07:26:40.239962   55811 shared_informer.go:223] Waiting for caches to sync for stateful set
The Service "kubernetes" is invalid: spec.clusterIP: Invalid value: "10.0.0.1": provided IP is already allocated
I0408 07:26:40.269926   55811 shared_informer.go:230] Caches are synced for expand 
I0408 07:26:40.273909   55811 shared_informer.go:230] Caches are synced for PVC protection 
I0408 07:26:40.277182   55811 shared_informer.go:230] Caches are synced for ClusterRoleAggregator 
I0408 07:26:40.277637   55811 shared_informer.go:230] Caches are synced for PV protection 
E0408 07:26:40.285835   55811 clusterroleaggregation_controller.go:181] admin failed with : Operation cannot be fulfilled on clusterroles.rbac.authorization.k8s.io "admin": the object has been modified; please apply your changes to the latest version and try again
E0408 07:26:40.302145   55811 clusterroleaggregation_controller.go:181] admin failed with : Operation cannot be fulfilled on clusterroles.rbac.authorization.k8s.io "admin": the object has been modified; please apply your changes to the latest version and try again
I0408 07:26:40.331225   55811 shared_informer.go:230] Caches are synced for HPA 
NAME         TYPE        CLUSTER-IP   EXTERNAL-IP   PORT(S)   AGE
kubernetes   ClusterIP   10.0.0.1     <none>        443/TCP   36s
Recording: run_kubectl_version_tests
Running command: run_kubectl_version_tests
I0408 07:26:40.364214   55811 shared_informer.go:230] Caches are synced for endpoint 
... skipping 15 lines ...
  "compiler": "gc",
  "platform": "linux/amd64"
}I0408 07:26:40.474904   55811 shared_informer.go:230] Caches are synced for certificate-csrapproving 
I0408 07:26:40.573323   55811 shared_informer.go:230] Caches are synced for job 
+++ [0408 07:26:40] Testing kubectl version: check client only output matches expected output
I0408 07:26:40.640079   55811 shared_informer.go:230] Caches are synced for deployment 
W0408 07:26:40.644456   55811 actual_state_of_world.go:534] Failed to update statusUpdateNeeded field in actual state of world: Failed to set statusUpdateNeeded to needed true, because nodeName="127.0.0.1" does not exist
I0408 07:26:40.673496   55811 shared_informer.go:230] Caches are synced for TTL 
I0408 07:26:40.674236   55811 shared_informer.go:230] Caches are synced for endpoint_slice 
I0408 07:26:40.675147   55811 shared_informer.go:230] Caches are synced for taint 
I0408 07:26:40.675205   55811 taint_manager.go:187] Starting NoExecuteTaintManager
I0408 07:26:40.675274   55811 node_lifecycle_controller.go:1433] Initializing eviction metric for zone: 
I0408 07:26:40.675375   55811 node_lifecycle_controller.go:1199] Controller detected that all Nodes are not-Ready. Entering master disruption mode.
... skipping 74 lines ...
+++ working dir: /home/prow/go/src/k8s.io/kubernetes
+++ command: run_RESTMapper_evaluation_tests
+++ [0408 07:26:44] Creating namespace namespace-1617866804-13683
namespace/namespace-1617866804-13683 created
Context "test" modified.
+++ [0408 07:26:44] Testing RESTMapper
+++ [0408 07:26:44] "kubectl get unknownresourcetype" returns error as expected: error: the server doesn't have a resource type "unknownresourcetype"
+++ exit code: 0
NAME                              SHORTNAMES   APIGROUP                       NAMESPACED   KIND
bindings                                                                      true         Binding
componentstatuses                 cs                                          false        ComponentStatus
configmaps                        cm                                          true         ConfigMap
endpoints                         ep                                          true         Endpoints
... skipping 58 lines ...
namespace/namespace-1617866809-18426 created
Context "test" modified.
+++ [0408 07:26:49] Testing clusterroles
rbac.sh:29: Successful get clusterroles/cluster-admin {{.metadata.name}}: cluster-admin
(Brbac.sh:30: Successful get clusterrolebindings/cluster-admin {{.metadata.name}}: cluster-admin
(BSuccessful
message:Error from server (NotFound): clusterroles.rbac.authorization.k8s.io "pod-admin" not found
has:clusterroles.rbac.authorization.k8s.io "pod-admin" not found
clusterrole.rbac.authorization.k8s.io/pod-admin created (dry run)
clusterrole.rbac.authorization.k8s.io/pod-admin created (server dry run)
Successful
message:Error from server (NotFound): clusterroles.rbac.authorization.k8s.io "pod-admin" not found
has:clusterroles.rbac.authorization.k8s.io "pod-admin" not found
clusterrole.rbac.authorization.k8s.io/pod-admin created
rbac.sh:42: Successful get clusterrole/pod-admin {{range.rules}}{{range.verbs}}{{.}}:{{end}}{{end}}: *:
(BSuccessful
message:warning: deleting cluster-scoped resources, not scoped to the provided namespace
clusterrole.rbac.authorization.k8s.io "pod-admin" deleted
... skipping 18 lines ...
(Bclusterrole.rbac.authorization.k8s.io/url-reader created
rbac.sh:61: Successful get clusterrole/url-reader {{range.rules}}{{range.verbs}}{{.}}:{{end}}{{end}}: get:
(Brbac.sh:62: Successful get clusterrole/url-reader {{range.rules}}{{range.nonResourceURLs}}{{.}}:{{end}}{{end}}: /logs/*:/healthz/*:
(Bclusterrole.rbac.authorization.k8s.io/aggregation-reader created
rbac.sh:64: Successful get clusterrole/aggregation-reader {{.metadata.name}}: aggregation-reader
(BSuccessful
message:Error from server (NotFound): clusterrolebindings.rbac.authorization.k8s.io "super-admin" not found
has:clusterrolebindings.rbac.authorization.k8s.io "super-admin" not found
clusterrolebinding.rbac.authorization.k8s.io/super-admin created (dry run)
clusterrolebinding.rbac.authorization.k8s.io/super-admin created (server dry run)
Successful
message:Error from server (NotFound): clusterrolebindings.rbac.authorization.k8s.io "super-admin" not found
has:clusterrolebindings.rbac.authorization.k8s.io "super-admin" not found
clusterrolebinding.rbac.authorization.k8s.io/super-admin created
rbac.sh:77: Successful get clusterrolebinding/super-admin {{range.subjects}}{{.name}}:{{end}}: super-admin:
(Bclusterrolebinding.rbac.authorization.k8s.io/super-admin subjects updated (dry run)
clusterrolebinding.rbac.authorization.k8s.io/super-admin subjects updated (server dry run)
rbac.sh:80: Successful get clusterrolebinding/super-admin {{range.subjects}}{{.name}}:{{end}}: super-admin:
... skipping 58 lines ...
rbac.sh:102: Successful get clusterrolebinding/super-admin {{range.subjects}}{{.name}}:{{end}}: super-admin:foo:test-all-user:
(Brbac.sh:103: Successful get clusterrolebinding/super-group {{range.subjects}}{{.name}}:{{end}}: the-group:foo:test-all-user:
(Brbac.sh:104: Successful get clusterrolebinding/super-sa {{range.subjects}}{{.name}}:{{end}}: sa-name:foo:test-all-user:
(Brolebinding.rbac.authorization.k8s.io/admin created (dry run)
rolebinding.rbac.authorization.k8s.io/admin created (server dry run)
Successful
message:Error from server (NotFound): rolebindings.rbac.authorization.k8s.io "admin" not found
has: not found
rolebinding.rbac.authorization.k8s.io/admin created
rbac.sh:113: Successful get rolebinding/admin {{.roleRef.kind}}: ClusterRole
(Brbac.sh:114: Successful get rolebinding/admin {{range.subjects}}{{.name}}:{{end}}: default-admin:
(Brolebinding.rbac.authorization.k8s.io/admin subjects updated
rbac.sh:116: Successful get rolebinding/admin {{range.subjects}}{{.name}}:{{end}}: default-admin:foo:
... skipping 25 lines ...
namespace/namespace-1617866816-19906 created
Context "test" modified.
+++ [0408 07:26:56] Testing role
role.rbac.authorization.k8s.io/pod-admin created (dry run)
role.rbac.authorization.k8s.io/pod-admin created (server dry run)
Successful
message:Error from server (NotFound): roles.rbac.authorization.k8s.io "pod-admin" not found
has: not found
role.rbac.authorization.k8s.io/pod-admin created
rbac.sh:155: Successful get role/pod-admin {{range.rules}}{{range.verbs}}{{.}}:{{end}}{{end}}: *:
(Brbac.sh:156: Successful get role/pod-admin {{range.rules}}{{range.resources}}{{.}}:{{end}}{{end}}: pods:
(Brbac.sh:157: Successful get role/pod-admin {{range.rules}}{{range.apiGroups}}{{.}}:{{end}}{{end}}: :
(BSuccessful
... skipping 420 lines ...
pod "valid-pod" force deleted
core.sh:117: Successful get pods {{range.items}}{{.metadata.name}}:{{end}}: 
(Bpod/valid-pod created
core.sh:122: Successful get pods {{range.items}}{{.metadata.name}}:{{end}}: valid-pod:
(Bpod "valid-pod" deleted
core.sh:126: Successful get pods {{range.items}}{{.metadata.name}}:{{end}}: 
(B{"component":"entrypoint","file":"prow/entrypoint/run.go:169","func":"k8s.io/test-infra/prow/entrypoint.Options.ExecuteProcess","level":"error","msg":"Entrypoint received interrupt: terminated","severity":"error","time":"2021-04-08T07:27:03Z"}