Recent runs || View in Spyglass
PR | k8s-infra-cherrypick-robot: [release-1.0] Disable floating IP on ILB IPv6 rule |
Result | FAILURE |
Tests | 2 failed / 43 succeeded |
Started | |
Elapsed | 2h17m |
Revision | f3fdaa1326f890f59bbf3ce1b3aabf63945eaed8 |
Refs |
1723 |
job-version | v1.21.13-rc.0.16+f3ad8e60207d1f |
kubetest-version | |
revision | v1.21.13-rc.0.16+f3ad8e60207d1f |
go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Cloud\sprovider\sAzure\se2e\ssuite\sEnsure\sLoadBalancer\sshould\ssupport\smixed\sprotocol\sservices$'
/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/ensureloadbalancer.go:100 Unexpected error: <autorest.DetailedError>: { Original: <*azure.RequestError | 0xc0001986c0>{ DetailedError: { Original: nil, PackageType: "", Method: "", StatusCode: <int>404, Message: "", ServiceError: nil, Response: { Status: "404 Not Found", StatusCode: 404, Proto: "HTTP/2.0", ProtoMajor: 2, ProtoMinor: 0, Header: { "Cache-Control": ["no-cache"], "Pragma": ["no-cache"], "X-Ms-Routing-Request-Id": [ "CENTRALUS:20220513T130606Z:5a76fe16-3bfb-459b-b212-36e710034f50", ], "Strict-Transport-Security": [ "max-age=31536000; includeSubDomains", ], "Date": [ "Fri, 13 May 2022 13:06:06 GMT", ], "Content-Length": ["238"], "Content-Type": [ "application/json; charset=utf-8", ], "Expires": ["-1"], "X-Ms-Failure-Cause": ["gateway"], "X-Ms-Request-Id": [ "5a76fe16-3bfb-459b-b212-36e710034f50", ], "X-Ms-Correlation-Request-Id": [ "5a76fe16-3bfb-459b-b212-36e710034f50", ], "X-Content-Type-Options": ["nosniff"], }, Body: <io.nopCloser>{ Reader: <*bytes.Buffer | 0xc00089ab10>{ buf: "{\"error\":{\"code\":\"ResourceNotFound\",\"message\":\"The Resource 'Microsoft.Network/loadBalancers/kubetest-9a3qkdgl' under resource group 'kubetest-9a3qkdgl' was not found. For more details please go to https://aka.ms/ARMResourceNotFoundFix\"}}", off: 0, lastRead: 0, }, }, ContentLength: 238, TransferEncoding: nil, Close: false, Uncompressed: false, Trailer: nil, Request: { Method: "GET", URL: { Scheme: "https", Opaque: "", User: nil, Host: "management.azure.com", Path: "/subscriptions/0e46bd28-a80f-4d3a-8200-d9eb8d80cb2e/resourceGroups/kubetest-9a3qkdgl/providers/Microsoft.Network/loadBalancers/kubetest-9a3qkdgl", RawPath: "", ForceQuery: false, RawQuery: "api-version=2021-02-01", Fragment: "", RawFragment: "", }, Proto: "", ProtoMajor: 0, ProtoMinor: 0, Header: { "Authorization": [ "Bearer eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6ImpTMVhvMU9XRGpfNTJ2YndHTmd2UU8yVnpNYyIsImtpZCI6ImpTMVhvMU9XRGpfNTJ2YndHTmd2UU8yVnpNYyJ9.eyJhdWQiOiJodHRwczovL21hbmFnZW1lbnQuY29yZS53aW5kb3dzLm5ldC8iLCJpc3MiOiJodHRwczovL3N0cy53aW5kb3dzLm5ldC8wOTdmODlhMC05Mjg2LTQzZDItOWExYS0wOGYxZDQ5YjFhZjgvIiwiaWF0IjoxNjUyNDQ2ODY2LCJuYmYiOjE2NTI0NDY4NjYsImV4cCI6MTY1MjQ1MDc2NiwiYWlvIjoiRTJaZ1lLaFNZb3VlZXpwU3Y5cUtRMEZSSklnVEFBPT0iLCJhcHBpZCI6ImE0NmQ3NjI0LWRlNzMtNDdmNy1hZGRiLTRkMjk5M2E5YjEwYyIsImFwcGlkYWNyIjoiMSIsImlkcCI6Imh0dHBzOi8vc3RzLndpbmRvd3MubmV0LzA5N2Y4OWEwLTkyODYtNDNkMi05YTFhLTA4ZjFkNDliMWFmOC... Gomega truncated this representation as it exceeds 'format.MaxLength'. Consider having the object provide a custom 'GomegaStringer' representation or adjust the parameters in Gomega's 'format' package. Learn more here: https://onsi.github.io/gomega/#adjusting-output network.LoadBalancersClient#Get: Failure responding to request: StatusCode=404 -- Original Error: autorest/azure: Service returned an error. Status=404 Code="ResourceNotFound" Message="The Resource 'Microsoft.Network/loadBalancers/kubetest-9a3qkdgl' under resource group 'kubetest-9a3qkdgl' was not found. For more details please go to https://aka.ms/ARMResourceNotFoundFix" occurred /home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/service_annotations.go:765from junit_01.xml
May 13 13:05:28.925: INFO: Creating a kubernetes client [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:57] May 13 13:05:28.925: INFO: Kubernetes configuration file name: /root/tmp513750706/kubeconfig/kubeconfig.northcentralus.json [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:65] May 13 13:05:28.926: INFO: Creating a test namespace [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:89] May 13 13:05:28.943: INFO: Creating a kubernetes client [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:57] May 13 13:05:28.943: INFO: Kubernetes configuration file name: /root/tmp513750706/kubeconfig/kubeconfig.northcentralus.json [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:65] May 13 13:05:29.000: INFO: Creating deployment servicelb-test [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/ensureloadbalancer.go:82] �[1mSTEP�[0m: creating a mixed protocol service May 13 13:05:29.166: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:132] May 13 13:05:39.183: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:132] May 13 13:05:49.188: INFO: Fail to find ingress, retry in 10 seconds [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:132] May 13 13:05:59.187: INFO: Exposure successfully, get external ip: 20.221.255.204 [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:147] May 13 13:05:59.187: INFO: checking the connectivity of the public IP 20.221.255.204 [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:96] May 13 13:06:06.291: INFO: succeeded [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:178] May 13 13:06:06.291: INFO: validation finished [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/service_utils.go:186] �[1mSTEP�[0m: checking load balancing rules May 13 13:06:06.291: INFO: Getting public IPs in the resourceGroup kubetest-9a3qkdgl [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/service_annotations.go:734] May 13 13:06:06.607: INFO: Getting public IP frontend configuration ID [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/service_annotations.go:738] May 13 13:06:06.607: INFO: Successfully obtained PIP front config id: /subscriptions/0e46bd28-a80f-4d3a-8200-d9eb8d80cb2e/resourceGroups/kubetest-9a3qkdgl/providers/Microsoft.Network/loadBalancers/kubetest-9a3qkdgl/frontendIPConfigurations/a4976fa7386294da0bec94080afd2bac [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/service_annotations.go:751] May 13 13:06:06.607: INFO: Getting loadBalancer name from pipFrontendConfigurationID [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/service_annotations.go:753] May 13 13:06:06.607: INFO: Got loadBalancerName "kubetest-9a3qkdgl" [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/service_annotations.go:758] May 13 13:06:06.607: INFO: Getting loadBalancer [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/network/service_annotations.go:760] May 13 13:06:06.704: INFO: Deleting namespace e2e-tests-service-lb-wmhvt [/home/prow/go/src/sigs.k8s.io/cloud-provider-azure/tests/e2e/utils/utils.go:137]
Filter through log files | View test history on testgrid
error during make test-ccm-e2e: exit status 2
from junit_runner.xml
Filter through log files | View test history on testgrid
Cloud provider Azure e2e suite Azure Credential Provider should be able to pull private images from acr without docker secrets set explicitly
Cloud provider Azure e2e suite Azure node resources should set correct private IP address for every node
Cloud provider Azure e2e suite Azure node resources should set node provider id correctly
Cloud provider Azure e2e suite Azure node resources should set route table correctly when the cluster is enabled by kubenet [Kubenet]
Cloud provider Azure e2e suite Ensure LoadBalancer should have no operation since no change in service when update [Slow]
Cloud provider Azure e2e suite Ensure LoadBalancer should support BYO public IP
Cloud provider Azure e2e suite Ensure LoadBalancer should support assigning to specific IP when updating public service
Cloud provider Azure e2e suite Ensure LoadBalancer should support multiple external services sharing one newly created public IP address
Cloud provider Azure e2e suite Ensure LoadBalancer should support multiple external services sharing one preset public IP address
Cloud provider Azure e2e suite Ensure LoadBalancer should support multiple internal services sharing one IP address
Cloud provider Azure e2e suite Ensure LoadBalancer should support updating an internal service to a public service with assigned IP
Cloud provider Azure e2e suite Ensure LoadBalancer should support updating internal IP when updating internal service
Cloud provider Azure e2e suite Lifecycle of VMSS should add node object when VMSS instance allocated
Cloud provider Azure e2e suite Lifecycle of VMSS should delete node object when VMSS instance deallocated
Cloud provider Azure e2e suite Multi-ports service When ExternalTrafficPolicy is updated Should not have error occurred
Cloud provider Azure e2e suite Network security group can set source IP prefixes automatically according to corresponding service tag
Cloud provider Azure e2e suite Network security group should add the rule when expose a service
Cloud provider Azure e2e suite Network security group should support service annotation `service.beta.kubernetes.io/azure-deny-all-except-load-balancer-source-ranges`
Cloud provider Azure e2e suite Service with annotation should support service annotation 'service.beta.kubernetes.io/azure-dns-label-name'
Cloud provider Azure e2e suite Service with annotation should support service annotation 'service.beta.kubernetes.io/azure-load-balancer-health-probe-num-of-probe' and port specific configs
Cloud provider Azure e2e suite Service with annotation should support service annotation 'service.beta.kubernetes.io/azure-load-balancer-health-probe-protocol' and port specific configs
Cloud provider Azure e2e suite Service with annotation should support service annotation 'service.beta.kubernetes.io/azure-load-balancer-internal'
Cloud provider Azure e2e suite Service with annotation should support service annotation 'service.beta.kubernetes.io/azure-load-balancer-internal-subnet'
Cloud provider Azure e2e suite Service with annotation should support service annotation 'service.beta.kubernetes.io/azure-load-balancer-resource-group'
Cloud provider Azure e2e suite Service with annotation should support service annotation 'service.beta.kubernetes.io/azure-load-balancer-tcp-idle-timeout'
Cloud provider Azure e2e suite Service with annotation should support service annotation `service.beta.kubernetes.io/azure-pip-name`
Cloud provider Azure e2e suite Service with annotation should support service annotation `service.beta.kubernetes.io/azure-pip-tags`
Cloud provider Azure e2e suite Service with annotation should support service annotation `service.beta.kubernetes.io/azure-shared-securityrule`
Cloud provider Azure e2e suite [[Multi-Nodepool]][VMSS] should support service annotation `service.beta.kubernetes.io/azure-load-balancer-mode`
kubetest Build
kubetest Check APIReachability
kubetest Deferred TearDown
kubetest DumpClusterLogs
kubetest GetDeployer
kubetest IsUp
kubetest Prepare
kubetest TearDown
kubetest TearDown Previous
kubetest Timeout
kubetest Up
kubetest kubectl version
kubetest list nodes
kubetest test setup
Cloud provider Azure e2e suite Azure nodes should expose zones correctly after created [VMSS][Serial][Slow]
Cloud provider Azure e2e suite Azure nodes should support crossing resource groups [Multi-Group][AvailabilitySet]
Cloud provider Azure e2e suite Cluster size autoscaler [Feature:Autoscaling][Serial][Slow] should balance the sizes of multiple node group if the `--balance-node-groups` is set to true [Multi-Nodepool]
Cloud provider Azure e2e suite Cluster size autoscaler [Feature:Autoscaling][Serial][Slow] should scale up or down if deployment replicas leave nodes busy or idle
Cloud provider Azure e2e suite Cluster size autoscaler [Feature:Autoscaling][Serial][Slow] should scale up, deploy a statefulset with disks attached, scale down, and certain pods + disks should be evicted to a new node
Cloud provider Azure e2e suite Cluster size autoscaler [Feature:Autoscaling][Serial][Slow] should support multiple node pools with quick scaling [Multi-Nodepool]
Cloud provider Azure e2e suite Cluster size autoscaler [Feature:Autoscaling][Serial][Slow] should support one node pool with slow scaling [Single Nodepool]
Cloud provider Azure e2e suite Cluster size autoscaler [Feature:Autoscaling][Serial][Slow] should support scaling up or down Azure Spot VM [VMSS][Spot VM]
Cloud provider Azure e2e suite Cluster size autoscaler [Feature:Autoscaling][Serial][Slow] should support scaling up or down due to the consuming of GPU resource
Cloud provider Azure e2e suite Ensure LoadBalancer should support node label `node.kubernetes.io/exclude-from-external-load-balancers`
Cloud provider Azure e2e suite Private link service should support multiple internal services sharing one private link service
Cloud provider Azure e2e suite Private link service should support service annotation 'service.beta.kubernetes.io/azure-pls-auto-approval'
Cloud provider Azure e2e suite Private link service should support service annotation 'service.beta.kubernetes.io/azure-pls-create'
Cloud provider Azure e2e suite Private link service should support service annotation 'service.beta.kubernetes.io/azure-pls-fqdns'
Cloud provider Azure e2e suite Private link service should support service annotation 'service.beta.kubernetes.io/azure-pls-ip-configuration-ip-address'
Cloud provider Azure e2e suite Private link service should support service annotation 'service.beta.kubernetes.io/azure-pls-ip-configuration-ip-address-count'
Cloud provider Azure e2e suite Private link service should support service annotation 'service.beta.kubernetes.io/azure-pls-ip-configuration-subnet'
Cloud provider Azure e2e suite Private link service should support service annotation 'service.beta.kubernetes.io/azure-pls-name'
Cloud provider Azure e2e suite Private link service should support service annotation 'service.beta.kubernetes.io/azure-pls-proxy-protocol'
Cloud provider Azure e2e suite Private link service should support service annotation 'service.beta.kubernetes.io/azure-pls-visibility'
Cloud provider Azure e2e suite [StandardLoadBalancer] Standard load balancer should add all nodes in different agent pools to backends [MultipleAgentPools]
Cloud provider Azure e2e suite [StandardLoadBalancer] Standard load balancer should make outbound IP of pod same as in SLB's outbound rules