Running Suite: Kubernetes e2e suite =================================== Random Seed: 1621940680 - Will randomize all specs Will run 5771 specs Running in parallel across 10 nodes May 25 11:04:42.805: INFO: >>> kubeConfig: /root/.kube/config May 25 11:04:42.809: INFO: Waiting up to 30m0s for all (but 0) nodes to be schedulable May 25 11:04:42.836: INFO: Waiting up to 10m0s for all pods (need at least 0) in namespace 'kube-system' to be running and ready May 25 11:04:42.890: INFO: The status of Pod coredns-558bd4d5db-46k4j is Running (Ready = false), waiting for it to be either Running (with Ready = true) or Failed May 25 11:04:42.890: INFO: The status of Pod coredns-558bd4d5db-kff7s is Running (Ready = false), waiting for it to be either Running (with Ready = true) or Failed May 25 11:04:42.890: INFO: The status of Pod kube-multus-ds-fnq4h is Running (Ready = false), waiting for it to be either Running (with Ready = true) or Failed May 25 11:04:42.890: INFO: 20 / 23 pods in namespace 'kube-system' are running and ready (0 seconds elapsed) May 25 11:04:42.890: INFO: expected 2 pod replicas in namespace 'kube-system', 2 are Running and Ready. May 25 11:04:42.890: INFO: POD NODE PHASE GRACE CONDITIONS May 25 11:04:42.890: INFO: coredns-558bd4d5db-46k4j v1.21-worker Running 30s [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2021-05-25 02:18:50 +0000 UTC } {Ready False 0001-01-01 00:00:00 +0000 UTC 2021-05-25 11:04:36 +0000 UTC ContainersNotReady containers with unready status: [coredns]} {ContainersReady False 0001-01-01 00:00:00 +0000 UTC 2021-05-25 11:04:36 +0000 UTC ContainersNotReady containers with unready status: [coredns]} {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2021-05-25 02:18:50 +0000 UTC }] May 25 11:04:42.890: INFO: coredns-558bd4d5db-kff7s v1.21-worker Running 30s [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2021-05-25 02:18:50 +0000 UTC } {Ready False 0001-01-01 00:00:00 +0000 UTC 2021-05-25 11:04:36 +0000 UTC ContainersNotReady containers with unready status: [coredns]} {ContainersReady False 0001-01-01 00:00:00 +0000 UTC 2021-05-25 11:04:36 +0000 UTC ContainersNotReady containers with unready status: [coredns]} {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2021-05-25 02:18:50 +0000 UTC }] May 25 11:04:42.890: INFO: kube-multus-ds-fnq4h v1.21-worker Running 10s [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2021-05-25 02:04:15 +0000 UTC } {Ready False 0001-01-01 00:00:00 +0000 UTC 2021-05-25 11:04:40 +0000 UTC ContainersNotReady containers with unready status: [kube-multus]} {ContainersReady False 0001-01-01 00:00:00 +0000 UTC 2021-05-25 11:04:40 +0000 UTC ContainersNotReady containers with unready status: [kube-multus]} {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2021-05-25 02:04:15 +0000 UTC }] May 25 11:04:42.890: INFO: May 25 11:04:44.925: INFO: The status of Pod coredns-558bd4d5db-46k4j is Running (Ready = false), waiting for it to be either Running (with Ready = true) or Failed May 25 11:04:44.926: INFO: The status of Pod coredns-558bd4d5db-kff7s is Running (Ready = false), waiting for it to be either Running (with Ready = true) or Failed May 25 11:04:44.926: INFO: The status of Pod kube-multus-ds-fnq4h is Running (Ready = false), waiting for it to be either Running (with Ready = true) or Failed May 25 11:04:44.926: INFO: 20 / 23 pods in namespace 'kube-system' are running and ready (2 seconds elapsed) May 25 11:04:44.926: INFO: expected 2 pod replicas in namespace 'kube-system', 2 are Running and Ready. May 25 11:04:44.926: INFO: POD NODE PHASE GRACE CONDITIONS May 25 11:04:44.926: INFO: coredns-558bd4d5db-46k4j v1.21-worker Running 30s [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2021-05-25 02:18:50 +0000 UTC } {Ready False 0001-01-01 00:00:00 +0000 UTC 2021-05-25 11:04:36 +0000 UTC ContainersNotReady containers with unready status: [coredns]} {ContainersReady False 0001-01-01 00:00:00 +0000 UTC 2021-05-25 11:04:36 +0000 UTC ContainersNotReady containers with unready status: [coredns]} {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2021-05-25 02:18:50 +0000 UTC }] May 25 11:04:44.926: INFO: coredns-558bd4d5db-kff7s v1.21-worker Running 30s [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2021-05-25 02:18:50 +0000 UTC } {Ready False 0001-01-01 00:00:00 +0000 UTC 2021-05-25 11:04:36 +0000 UTC ContainersNotReady containers with unready status: [coredns]} {ContainersReady False 0001-01-01 00:00:00 +0000 UTC 2021-05-25 11:04:36 +0000 UTC ContainersNotReady containers with unready status: [coredns]} {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2021-05-25 02:18:50 +0000 UTC }] May 25 11:04:44.926: INFO: kube-multus-ds-fnq4h v1.21-worker Running 10s [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2021-05-25 02:04:15 +0000 UTC } {Ready False 0001-01-01 00:00:00 +0000 UTC 2021-05-25 11:04:40 +0000 UTC ContainersNotReady containers with unready status: [kube-multus]} {ContainersReady False 0001-01-01 00:00:00 +0000 UTC 2021-05-25 11:04:40 +0000 UTC ContainersNotReady containers with unready status: [kube-multus]} {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2021-05-25 02:04:15 +0000 UTC }] May 25 11:04:44.926: INFO: May 25 11:04:46.923: INFO: The status of Pod kube-multus-ds-p7tvf is Pending (Ready = false), waiting for it to be either Running (with Ready = true) or Failed May 25 11:04:46.923: INFO: 20 / 21 pods in namespace 'kube-system' are running and ready (4 seconds elapsed) May 25 11:04:46.923: INFO: expected 2 pod replicas in namespace 'kube-system', 2 are Running and Ready. May 25 11:04:46.923: INFO: POD NODE PHASE GRACE CONDITIONS May 25 11:04:46.923: INFO: kube-multus-ds-p7tvf v1.21-worker Pending [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2021-05-25 11:04:45 +0000 UTC } {Ready False 0001-01-01 00:00:00 +0000 UTC 2021-05-25 11:04:45 +0000 UTC ContainersNotReady containers with unready status: [kube-multus]} {ContainersReady False 0001-01-01 00:00:00 +0000 UTC 2021-05-25 11:04:45 +0000 UTC ContainersNotReady containers with unready status: [kube-multus]} {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2021-05-25 11:04:45 +0000 UTC }] May 25 11:04:46.923: INFO: May 25 11:04:48.922: INFO: 21 / 21 pods in namespace 'kube-system' are running and ready (6 seconds elapsed) May 25 11:04:48.922: INFO: expected 2 pod replicas in namespace 'kube-system', 2 are Running and Ready. May 25 11:04:48.922: INFO: Waiting up to 5m0s for all daemonsets in namespace 'kube-system' to start May 25 11:04:48.941: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'create-loop-devs' (0 seconds elapsed) May 25 11:04:48.941: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'kindnet' (0 seconds elapsed) May 25 11:04:48.941: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'kube-multus-ds' (0 seconds elapsed) May 25 11:04:48.941: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'kube-proxy' (0 seconds elapsed) May 25 11:04:48.941: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'tune-sysctls' (0 seconds elapsed) May 25 11:04:48.941: INFO: e2e test version: v1.21.1 May 25 11:04:48.942: INFO: kube-apiserver version: v1.21.1 May 25 11:04:48.943: INFO: >>> kubeConfig: /root/.kube/config May 25 11:04:48.950: INFO: Cluster IP family: ipv4 SSSSSSSSSSSSSSSS ------------------------------ May 25 11:04:48.961: INFO: >>> kubeConfig: /root/.kube/config May 25 11:04:48.986: INFO: Cluster IP family: ipv4 SSSSSS ------------------------------ May 25 11:04:48.968: INFO: >>> kubeConfig: /root/.kube/config May 25 11:04:48.993: INFO: Cluster IP family: ipv4 SS ------------------------------ May 25 11:04:48.969: INFO: >>> kubeConfig: /root/.kube/config May 25 11:04:48.995: INFO: Cluster IP family: ipv4 SSS ------------------------------ May 25 11:04:48.971: INFO: >>> kubeConfig: /root/.kube/config May 25 11:04:48.997: INFO: Cluster IP family: ipv4 SSSSSSSSS ------------------------------ May 25 11:04:48.979: INFO: >>> kubeConfig: /root/.kube/config May 25 11:04:49.001: INFO: Cluster IP family: ipv4 S ------------------------------ May 25 11:04:48.979: INFO: >>> kubeConfig: /root/.kube/config May 25 11:04:49.002: INFO: Cluster IP family: ipv4 SSS ------------------------------ May 25 11:04:48.979: INFO: >>> kubeConfig: /root/.kube/config May 25 11:04:49.003: INFO: Cluster IP family: ipv4 SSSSSSSSSSSSSSSS ------------------------------ May 25 11:04:48.979: INFO: >>> kubeConfig: /root/.kube/config May 25 11:04:49.009: INFO: Cluster IP family: ipv4 SSSSSSSSSSSSSSSSSSSSS ------------------------------ May 25 11:04:48.993: INFO: >>> kubeConfig: /root/.kube/config May 25 11:04:49.015: INFO: Cluster IP family: ipv4 SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ May 25 11:04:50.205: INFO: Running AfterSuite actions on all nodes May 25 11:04:50.205: INFO: Running AfterSuite actions on all nodes May 25 11:04:50.205: INFO: Running AfterSuite actions on all nodes May 25 11:04:50.205: INFO: Running AfterSuite actions on all nodes S ------------------------------ May 25 11:04:50.205: INFO: Running AfterSuite actions on all nodes May 25 11:04:50.206: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 25 11:04:49.221: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename bootstrap-token-cleaner W0525 11:04:49.255341 30 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+ May 25 11:04:49.255: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 25 11:04:49.260: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_token_cleaner.go:39 [It] should delete the token secret when the secret expired /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_token_cleaner.go:51 STEP: create a new expired bootstrap token secret STEP: wait for the bootstrap token secret be deleted [AfterEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 25 11:04:51.272: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "bootstrap-token-cleaner-3010" for this suite. [AfterEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_token_cleaner.go:43 • ------------------------------ {"msg":"PASSED [sig-cluster-lifecycle] [Feature:BootstrapTokens] should delete the token secret when the secret expired","total":-1,"completed":1,"skipped":60,"failed":0} May 25 11:04:51.284: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 25 11:04:49.400: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename bootstrap-signer W0525 11:04:49.429720 27 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+ May 25 11:04:49.429: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 25 11:04:49.433: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_signer.go:51 [It] should sign the new added bootstrap tokens /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_signer.go:55 STEP: create a new bootstrap token secret STEP: wait for the bootstrap token secret be signed [AfterEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 25 11:04:51.445: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "bootstrap-signer-218" for this suite. [AfterEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_signer.go:43 STEP: delete the bootstrap token secret • ------------------------------ {"msg":"PASSED [sig-cluster-lifecycle] [Feature:BootstrapTokens] should sign the new added bootstrap tokens","total":-1,"completed":1,"skipped":153,"failed":0} May 25 11:04:51.462: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 25 11:04:50.159: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename bootstrap-signer W0525 11:04:50.193922 26 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+ May 25 11:04:50.194: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 25 11:04:50.198: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_signer.go:51 [It] should delete the signed bootstrap tokens from clusterInfo ConfigMap when bootstrap token is deleted /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_signer.go:108 STEP: create a new bootstrap token secret STEP: wait for the bootstrap secret be signed STEP: delete the bootstrap token secret STEP: wait for the bootstrap token removed from cluster-info ConfigMap [AfterEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 25 11:04:54.220: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "bootstrap-signer-2067" for this suite. [AfterEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_signer.go:43 • ------------------------------ {"msg":"PASSED [sig-cluster-lifecycle] [Feature:BootstrapTokens] should delete the signed bootstrap tokens from clusterInfo ConfigMap when bootstrap token is deleted","total":-1,"completed":1,"skipped":705,"failed":0} May 25 11:04:54.233: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 25 11:04:49.745: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename bootstrap-token-cleaner W0525 11:04:49.779959 22 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+ May 25 11:04:49.780: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 25 11:04:49.783: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_token_cleaner.go:39 [It] should not delete the token secret when the secret is not expired /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_token_cleaner.go:69 STEP: create a new expired bootstrap token secret STEP: wait for the bootstrap token secret not be deleted [AfterEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 25 11:05:09.799: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "bootstrap-token-cleaner-4767" for this suite. [AfterEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_token_cleaner.go:43 STEP: delete the bootstrap token secret • [SLOW TEST:20.070 seconds] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/framework.go:23 should not delete the token secret when the secret is not expired /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_token_cleaner.go:69 ------------------------------ {"msg":"PASSED [sig-cluster-lifecycle] [Feature:BootstrapTokens] should not delete the token secret when the secret is not expired","total":-1,"completed":1,"skipped":409,"failed":0} May 25 11:05:09.817: INFO: Running AfterSuite actions on all nodes May 25 11:05:09.817: INFO: Running AfterSuite actions on node 1 May 25 11:05:09.817: INFO: Skipping dumping logs from cluster Ran 4 of 5771 Specs in 27.183 seconds SUCCESS! -- 4 Passed | 0 Failed | 0 Pending | 5767 Skipped Ginkgo ran 1 suite in 28.984961019s Test Suite Passed