Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CI: K8sPolicyTest Basic Test Validate to-entities policies Validate toEntities All #17521

Closed
maintainer-s-little-helper bot opened this issue Oct 4, 2021 · 6 comments
Labels
area/CI Continuous Integration testing issue or flake ci/flake This is a known failure that occurs in the tree. Please investigate me! stale The stale bot thinks this issue is old. Add "pinned" label to prevent this from becoming stale.

Comments

@maintainer-s-little-helper
Copy link

Test Name

K8sPolicyTest Basic Test Validate to-entities policies Validate toEntities All

Failure Output

FAIL: Found 2 k8s-app=cilium logs matching list of errors that must be investigated:

Stacktrace

Click to show.
/home/jenkins/workspace/Cilium-PR-K8s-1.16-net-next/src/github.com/cilium/cilium/test/ginkgo-ext/scopes.go:427
Found 2 k8s-app=cilium logs matching list of errors that must be investigated:
JoinEP: 
level=error
/home/jenkins/workspace/Cilium-PR-K8s-1.16-net-next/src/github.com/cilium/cilium/test/ginkgo-ext/scopes.go:425

Standard Output

Click to show.
Number of "context deadline exceeded" in logs: 0
Number of "level=error" in logs: 0
Number of "level=warning" in logs: 0
Number of "Cilium API handler panicked" in logs: 0
Number of "Goroutine took lock for more than" in logs: 0
No errors/warnings found in logs
Number of "context deadline exceeded" in logs: 0
Number of "level=error" in logs: 0
Number of "level=warning" in logs: 0
Number of "Cilium API handler panicked" in logs: 0
Number of "Goroutine took lock for more than" in logs: 0
No errors/warnings found in logs
⚠️  Found "JoinEP: " in logs 14 times
⚠️  Found "level=error" in logs 29 times
Number of "context deadline exceeded" in logs: 5
⚠️  Number of "level=error" in logs: 29
⚠️  Number of "level=warning" in logs: 43
Number of "Cilium API handler panicked" in logs: 0
Number of "Goroutine took lock for more than" in logs: 0
Top 5 errors/warnings:
Error while rewriting endpoint BPF program
endpoint regeneration failed
JoinEP: Failed to load program
generating BPF for endpoint failed, keeping stale directory.
Regeneration of endpoint failed
Cilium pods: [cilium-5lkrn cilium-7x6sk]
Netpols loaded: 
CiliumNetworkPolicies loaded: 202110012124k8spolicytestbasictestchecksallkindofkubernetespoli::to-entities-all 
Endpoint Policy Enforcement:
Pod                          Ingress   Egress
prometheus-d87f8f984-ql6xx             
coredns-5fc58db489-j45cc               
app1-5798c5fb6b-8rpds                  
app1-5798c5fb6b-qgb76                  
app2-5cc5d58844-mqtdx                  
app3-6c7856c5b5-4s2x4                  
grafana-7fd557d749-jl76c               
Cilium agent 'cilium-5lkrn': Status: Ok  Health: Ok Nodes "" ContinerRuntime:  Kubernetes: Ok KVstore: Ok Controllers: Total 25 Failed 0
Cilium agent 'cilium-7x6sk': Status: Ok  Health: Ok Nodes "" ContinerRuntime:  Kubernetes: Ok KVstore: Ok Controllers: Total 45 Failed 0


Standard Error

Click to show.
21:30:52 STEP: Running BeforeEach block for EntireTestsuite K8sPolicyTest Basic Test
21:30:54 STEP: WaitforPods(namespace="202110012124k8spolicytestbasictestchecksallkindofkubernetespoli", filter="-l zgroup=testapp")
21:30:54 STEP: WaitforPods(namespace="202110012124k8spolicytestbasictestchecksallkindofkubernetespoli", filter="-l zgroup=testapp") => <nil>
21:30:54 STEP: Running BeforeAll block for EntireTestsuite K8sPolicyTest Basic Test Validate to-entities policies
21:30:54 STEP: Installing toEntities All
21:30:57 STEP: Verifying policy correctness
21:30:57 STEP: HTTP connectivity from pod to pod
21:30:57 STEP: HTTP connectivity from pod to pod
21:30:57 STEP: ICMP connectivity to 8.8.8.8
21:30:57 STEP: ICMP connectivity to 8.8.8.8
21:30:57 STEP: HTTP connectivity to 1.1.1.1
21:30:57 STEP: DNS lookup of kubernetes.default.svc.cluster.local
21:30:57 STEP: DNS lookup of kubernetes.default.svc.cluster.local
21:30:57 STEP: HTTP connectivity to 1.1.1.1
21:31:01 STEP: Installing deny toEntities All
21:33:53 STEP: Verifying policy correctness
21:33:53 STEP: HTTP connectivity from pod to pod
21:33:53 STEP: DNS lookup of kubernetes.default.svc.cluster.local
21:33:53 STEP: HTTP connectivity to 1.1.1.1
21:33:53 STEP: HTTP connectivity to 1.1.1.1
21:33:53 STEP: ICMP connectivity to 8.8.8.8
21:33:53 STEP: DNS lookup of kubernetes.default.svc.cluster.local
21:33:53 STEP: HTTP connectivity from pod to pod
21:33:53 STEP: ICMP connectivity to 8.8.8.8
=== Test Finished at 2021-10-01T21:34:55Z====
21:34:55 STEP: Running JustAfterEach block for EntireTestsuite K8sPolicyTest
FAIL: Found 2 k8s-app=cilium logs matching list of errors that must be investigated:
JoinEP: 
level=error
===================== TEST FAILED =====================
21:34:55 STEP: Running AfterFailed block for EntireTestsuite K8sPolicyTest
cmd: kubectl get pods -o wide --all-namespaces
Exitcode: 0 
Stdout:
 	 NAMESPACE                                                         NAME                               READY   STATUS    RESTARTS   AGE   IP              NODE   NOMINATED NODE   READINESS GATES
	 202110012124k8spolicytestbasictestchecksallkindofkubernetespoli   app1-5798c5fb6b-8rpds              2/2     Running   0          10m   10.0.0.216      k8s1   <none>           <none>
	 202110012124k8spolicytestbasictestchecksallkindofkubernetespoli   app1-5798c5fb6b-qgb76              2/2     Running   0          10m   10.0.0.10       k8s1   <none>           <none>
	 202110012124k8spolicytestbasictestchecksallkindofkubernetespoli   app2-5cc5d58844-mqtdx              1/1     Running   0          10m   10.0.0.173      k8s1   <none>           <none>
	 202110012124k8spolicytestbasictestchecksallkindofkubernetespoli   app3-6c7856c5b5-4s2x4              1/1     Running   0          10m   10.0.0.175      k8s1   <none>           <none>
	 cilium-monitoring                                                 grafana-7fd557d749-jl76c           1/1     Running   0          11m   10.0.0.183      k8s1   <none>           <none>
	 cilium-monitoring                                                 prometheus-d87f8f984-ql6xx         1/1     Running   0          11m   10.0.0.46       k8s1   <none>           <none>
	 kube-system                                                       cilium-5lkrn                       1/1     Running   0          11m   192.168.36.12   k8s2   <none>           <none>
	 kube-system                                                       cilium-7x6sk                       1/1     Running   0          11m   192.168.36.11   k8s1   <none>           <none>
	 kube-system                                                       cilium-operator-77558f6976-5z97f   1/1     Running   0          11m   192.168.36.12   k8s2   <none>           <none>
	 kube-system                                                       cilium-operator-77558f6976-rzxsv   1/1     Running   0          11m   192.168.36.13   k8s3   <none>           <none>
	 kube-system                                                       coredns-5fc58db489-j45cc           1/1     Running   0          10m   10.0.1.70       k8s2   <none>           <none>
	 kube-system                                                       etcd-k8s1                          1/1     Running   0          14m   192.168.36.11   k8s1   <none>           <none>
	 kube-system                                                       kube-apiserver-k8s1                1/1     Running   0          14m   192.168.36.11   k8s1   <none>           <none>
	 kube-system                                                       kube-controller-manager-k8s1       1/1     Running   0          14m   192.168.36.11   k8s1   <none>           <none>
	 kube-system                                                       kube-scheduler-k8s1                1/1     Running   0          14m   192.168.36.11   k8s1   <none>           <none>
	 kube-system                                                       log-gatherer-2njpj                 1/1     Running   0          11m   192.168.36.12   k8s2   <none>           <none>
	 kube-system                                                       log-gatherer-h4ss8                 1/1     Running   0          11m   192.168.36.11   k8s1   <none>           <none>
	 kube-system                                                       log-gatherer-mctqb                 1/1     Running   0          11m   192.168.36.13   k8s3   <none>           <none>
	 kube-system                                                       registry-adder-khbt5               1/1     Running   0          12m   192.168.36.13   k8s3   <none>           <none>
	 kube-system                                                       registry-adder-s6589               1/1     Running   0          12m   192.168.36.11   k8s1   <none>           <none>
	 kube-system                                                       registry-adder-xmr5g               1/1     Running   0          12m   192.168.36.12   k8s2   <none>           <none>
	 
Stderr:
 	 

Fetching command output from pods [cilium-5lkrn cilium-7x6sk]
cmd: kubectl exec -n kube-system cilium-5lkrn -c cilium-agent -- cilium service list
Exitcode: 0 
Stdout:
 	 ID   Frontend              Service Type   Backend                   
	 1    10.96.0.10:53         ClusterIP      1 => 10.0.1.70:53         
	 2    10.96.0.10:9153       ClusterIP      1 => 10.0.1.70:9153       
	 3    10.98.21.66:3000      ClusterIP      1 => 10.0.0.183:3000      
	 4    10.102.155.210:9090   ClusterIP      1 => 10.0.0.46:9090       
	 5    10.96.0.1:443         ClusterIP      1 => 192.168.36.11:6443   
	 6    10.96.221.39:69       ClusterIP      1 => 10.0.0.216:69        
	                                           2 => 10.0.0.10:69         
	 7    10.96.221.39:80       ClusterIP      1 => 10.0.0.216:80        
	                                           2 => 10.0.0.10:80         
	 
Stderr:
 	 

cmd: kubectl exec -n kube-system cilium-5lkrn -c cilium-agent -- cilium endpoint list
Exitcode: 0 
Stdout:
 	 ENDPOINT   POLICY (ingress)   POLICY (egress)   IDENTITY   LABELS (source:key[=value])                       IPv6        IPv4         STATUS   
	            ENFORCEMENT        ENFORCEMENT                                                                                             
	 552        Disabled           Enabled           40336      k8s:io.cilium.k8s.policy.cluster=default          fd02::15f   10.0.1.70    ready   
	                                                            k8s:io.cilium.k8s.policy.serviceaccount=coredns                                    
	                                                            k8s:io.kubernetes.pod.namespace=kube-system                                        
	                                                            k8s:k8s-app=kube-dns                                                               
	 659        Disabled           Disabled          1          k8s:cilium.io/ci-node=k8s2                                                 ready   
	                                                            reserved:host                                                                      
	 1223       Disabled           Enabled           4          reserved:health                                   fd02::1fc   10.0.1.128   ready   
	 
Stderr:
 	 

cmd: kubectl exec -n kube-system cilium-7x6sk -c cilium-agent -- cilium service list
Exitcode: 0 
Stdout:
 	 ID   Frontend              Service Type   Backend                   
	 1    10.96.0.10:53         ClusterIP      1 => 10.0.1.70:53         
	 2    10.96.0.10:9153       ClusterIP      1 => 10.0.1.70:9153       
	 3    10.98.21.66:3000      ClusterIP      1 => 10.0.0.183:3000      
	 4    10.102.155.210:9090   ClusterIP      1 => 10.0.0.46:9090       
	 5    10.96.0.1:443         ClusterIP      1 => 192.168.36.11:6443   
	 6    10.96.221.39:80       ClusterIP      1 => 10.0.0.216:80        
	                                           2 => 10.0.0.10:80         
	 7    10.96.221.39:69       ClusterIP      1 => 10.0.0.216:69        
	                                           2 => 10.0.0.10:69         
	 
Stderr:
 	 

cmd: kubectl exec -n kube-system cilium-7x6sk -c cilium-agent -- cilium endpoint list
Exitcode: 0 
Stdout:
 	 ENDPOINT   POLICY (ingress)   POLICY (egress)   IDENTITY   LABELS (source:key[=value])                                                                       IPv6       IPv4         STATUS   
	            ENFORCEMENT        ENFORCEMENT                                                                                                                                            
	 121        Disabled           Enabled           59843      k8s:id=app3                                                                                       fd02::58   10.0.0.175   ready   
	                                                            k8s:io.cilium.k8s.policy.cluster=default                                                                                          
	                                                            k8s:io.cilium.k8s.policy.serviceaccount=default                                                                                   
	                                                            k8s:io.kubernetes.pod.namespace=202110012124k8spolicytestbasictestchecksallkindofkubernetespoli                                   
	                                                            k8s:zgroup=testapp                                                                                                                
	 286        Disabled           Enabled           4          reserved:health                                                                                   fd02::e0   10.0.0.93    ready   
	 322        Disabled           Enabled           18673      k8s:app=grafana                                                                                   fd02::3    10.0.0.183   ready   
	                                                            k8s:io.cilium.k8s.policy.cluster=default                                                                                          
	                                                            k8s:io.cilium.k8s.policy.serviceaccount=default                                                                                   
	                                                            k8s:io.kubernetes.pod.namespace=cilium-monitoring                                                                                 
	 2518       Disabled           Enabled           28149      k8s:appSecond=true                                                                                fd02::d2   10.0.0.173   ready   
	                                                            k8s:id=app2                                                                                                                       
	                                                            k8s:io.cilium.k8s.policy.cluster=default                                                                                          
	                                                            k8s:io.cilium.k8s.policy.serviceaccount=app2-account                                                                              
	                                                            k8s:io.kubernetes.pod.namespace=202110012124k8spolicytestbasictestchecksallkindofkubernetespoli                                   
	                                                            k8s:zgroup=testapp                                                                                                                
	 2756       Disabled           Enabled           38339      k8s:id=app1                                                                                       fd02::e3   10.0.0.10    ready   
	                                                            k8s:io.cilium.k8s.policy.cluster=default                                                                                          
	                                                            k8s:io.cilium.k8s.policy.serviceaccount=app1-account                                                                              
	                                                            k8s:io.kubernetes.pod.namespace=202110012124k8spolicytestbasictestchecksallkindofkubernetespoli                                   
	                                                            k8s:zgroup=testapp                                                                                                                
	 2994       Disabled           Enabled           38339      k8s:id=app1                                                                                       fd02::62   10.0.0.216   ready   
	                                                            k8s:io.cilium.k8s.policy.cluster=default                                                                                          
	                                                            k8s:io.cilium.k8s.policy.serviceaccount=app1-account                                                                              
	                                                            k8s:io.kubernetes.pod.namespace=202110012124k8spolicytestbasictestchecksallkindofkubernetespoli                                   
	                                                            k8s:zgroup=testapp                                                                                                                
	 3706       Disabled           Enabled           20568      k8s:app=prometheus                                                                                fd02::9d   10.0.0.46    ready   
	                                                            k8s:io.cilium.k8s.policy.cluster=default                                                                                          
	                                                            k8s:io.cilium.k8s.policy.serviceaccount=prometheus-k8s                                                                            
	                                                            k8s:io.kubernetes.pod.namespace=cilium-monitoring                                                                                 
	 3737       Disabled           Disabled          1          k8s:cilium.io/ci-node=k8s1                                                                                                ready   
	                                                            k8s:node-role.kubernetes.io/master                                                                                                
	                                                            reserved:host                                                                                                                     
	 
Stderr:
 	 

===================== Exiting AfterFailed =====================
21:35:14 STEP: Running AfterEach for block EntireTestsuite K8sPolicyTest Basic Test
21:35:15 STEP: Running AfterEach for block EntireTestsuite K8sPolicyTest
21:35:15 STEP: Running AfterEach for block EntireTestsuite

[[ATTACHMENT|fb5423ed_K8sPolicyTest_Basic_Test_Validate_to-entities_policies_Validate_toEntities_All.zip]]


ZIP Links:

Click to show.

https://jenkins.cilium.io/job/Cilium-PR-K8s-1.16-net-next//1554/artifact/fb5423ed_K8sPolicyTest_Basic_Test_Validate_to-entities_policies_Validate_toEntities_All.zip
https://jenkins.cilium.io/job/Cilium-PR-K8s-1.16-net-next//1554/artifact/test_results_Cilium-PR-K8s-1.16-net-next_1554_BDD-Test-PR.zip

Jenkins URL: https://jenkins.cilium.io/job/Cilium-PR-K8s-1.16-net-next/1554/

If this is a duplicate of an existing flake, comment 'Duplicate of #<issue-number>' and close this issue.

@maintainer-s-little-helper maintainer-s-little-helper bot added the ci/flake This is a known failure that occurs in the tree. Please investigate me! label Oct 4, 2021
@borkmann
Copy link
Member

borkmann commented Oct 4, 2021

From agent log Link not found:

2021-10-01T21:31:00.595384169Z level=debug msg="Finished writing ELF" error="<nil>" new-elf-path=780_next/bpf_lxc.o subsys=elf template-path=/var/run/cilium/state/templates/4128499e596760db8b5015bae885bf1dcdd1513d8910efa6f6b65fd547342d06/bpf_lxc.o
2021-10-01T21:31:00.595572813Z level=warning msg="JoinEP: Failed to load program" containerID= datapathPolicyRevision=40 desiredPolicyRevision=41 endpointID=780 error="Failed to replace Qdisc for lxcf27e8a9b6905: Link not found" file-path=780_next/bpf_lxc.o identity=40336 ipv4= ipv6= k8sPodName=/ subsys=datapath-loader veth=lxcf27e8a9b6905
2021-10-01T21:31:00.595639136Z level=error msg="Error while rewriting endpoint BPF program" containerID= datapathPolicyRevision=40 desiredPolicyRevision=41 endpointID=780 error="Failed to replace Qdisc for lxcf27e8a9b6905: Link not found" identity=40336 ipv4= ipv6= k8sPodName=/ subsys=endpoint

@maintainer-s-little-helper
Copy link
Author

PR #17640 hit this flake with 98.50% similarity:

Click to show.

Test Name

K8sPolicyTest Basic Test Validate to-entities policies Validate toEntities All

Failure Output

FAIL: Found 2 k8s-app=cilium logs matching list of errors that must be investigated:

Stacktrace

Click to show.
/home/jenkins/workspace/Cilium-PR-K8s-1.16-net-next/src/github.com/cilium/cilium/test/ginkgo-ext/scopes.go:427
Found 2 k8s-app=cilium logs matching list of errors that must be investigated:
JoinEP: 
level=error
/home/jenkins/workspace/Cilium-PR-K8s-1.16-net-next/src/github.com/cilium/cilium/test/ginkgo-ext/scopes.go:425

Standard Output

Click to show.
Number of "context deadline exceeded" in logs: 0
Number of "level=error" in logs: 0
Number of "level=warning" in logs: 0
Number of "Cilium API handler panicked" in logs: 0
Number of "Goroutine took lock for more than" in logs: 0
No errors/warnings found in logs
Number of "context deadline exceeded" in logs: 0
Number of "level=error" in logs: 0
Number of "level=warning" in logs: 0
Number of "Cilium API handler panicked" in logs: 0
Number of "Goroutine took lock for more than" in logs: 0
No errors/warnings found in logs
⚠️  Found "JoinEP: " in logs 14 times
⚠️  Found "level=error" in logs 29 times
Number of "context deadline exceeded" in logs: 5
⚠️  Number of "level=error" in logs: 29
⚠️  Number of "level=warning" in logs: 43
Number of "Cilium API handler panicked" in logs: 0
Number of "Goroutine took lock for more than" in logs: 0
Top 5 errors/warnings:
Error while rewriting endpoint BPF program
endpoint regeneration failed
Regeneration of endpoint failed
JoinEP: Failed to load program
generating BPF for endpoint failed, keeping stale directory.
Cilium pods: [cilium-hlqtp cilium-kjgpk]
Netpols loaded: 
CiliumNetworkPolicies loaded: 202110261133k8spolicytestbasictestchecksallkindofkubernetespoli::to-entities-all 
Endpoint Policy Enforcement:
Pod                        Ingress   Egress
app1-5798c5fb6b-9skkz                
app1-5798c5fb6b-g4v47                
app2-5cc5d58844-hzddb                
app3-6c7856c5b5-pxkm5                
coredns-5fc58db489-rv7qn             
Cilium agent 'cilium-hlqtp': Status: Ok  Health: Ok Nodes "" ContinerRuntime:  Kubernetes: Ok KVstore: Ok Controllers: Total 27 Failed 0
Cilium agent 'cilium-kjgpk': Status: Ok  Health: Ok Nodes "" ContinerRuntime:  Kubernetes: Ok KVstore: Ok Controllers: Total 38 Failed 0


Standard Error

Click to show.
11:39:20 STEP: Running BeforeEach block for EntireTestsuite K8sPolicyTest Basic Test
11:39:22 STEP: WaitforPods(namespace="202110261133k8spolicytestbasictestchecksallkindofkubernetespoli", filter="-l zgroup=testapp")
11:39:22 STEP: WaitforPods(namespace="202110261133k8spolicytestbasictestchecksallkindofkubernetespoli", filter="-l zgroup=testapp") => <nil>
11:39:22 STEP: Running BeforeAll block for EntireTestsuite K8sPolicyTest Basic Test Validate to-entities policies
11:39:22 STEP: Installing toEntities All
11:39:24 STEP: Verifying policy correctness
11:39:24 STEP: HTTP connectivity from pod to pod
11:39:24 STEP: DNS lookup of kubernetes.default.svc.cluster.local
11:39:24 STEP: HTTP connectivity to 1.1.1.1
11:39:24 STEP: HTTP connectivity from pod to pod
11:39:24 STEP: ICMP connectivity to 8.8.8.8
11:39:24 STEP: ICMP connectivity to 8.8.8.8
11:39:24 STEP: HTTP connectivity to 1.1.1.1
11:39:24 STEP: DNS lookup of kubernetes.default.svc.cluster.local
11:39:29 STEP: Installing deny toEntities All
11:42:21 STEP: Verifying policy correctness
11:42:21 STEP: DNS lookup of kubernetes.default.svc.cluster.local
11:42:21 STEP: HTTP connectivity from pod to pod
11:42:21 STEP: ICMP connectivity to 8.8.8.8
11:42:21 STEP: ICMP connectivity to 8.8.8.8
11:42:21 STEP: HTTP connectivity to 1.1.1.1
11:42:21 STEP: HTTP connectivity to 1.1.1.1
11:42:21 STEP: HTTP connectivity from pod to pod
11:42:21 STEP: DNS lookup of kubernetes.default.svc.cluster.local
=== Test Finished at 2021-10-26T11:43:22Z====
11:43:22 STEP: Running JustAfterEach block for EntireTestsuite K8sPolicyTest
FAIL: Found 2 k8s-app=cilium logs matching list of errors that must be investigated:
JoinEP: 
level=error
===================== TEST FAILED =====================
11:43:23 STEP: Running AfterFailed block for EntireTestsuite K8sPolicyTest
cmd: kubectl get pods -o wide --all-namespaces
Exitcode: 0 
Stdout:
 	 NAMESPACE                                                         NAME                               READY   STATUS    RESTARTS   AGE   IP              NODE   NOMINATED NODE   READINESS GATES
	 202110261133k8spolicytestbasictestchecksallkindofkubernetespoli   app1-5798c5fb6b-9skkz              2/2     Running   0          10m   10.0.1.3        k8s1   <none>           <none>
	 202110261133k8spolicytestbasictestchecksallkindofkubernetespoli   app1-5798c5fb6b-g4v47              2/2     Running   0          10m   10.0.1.30       k8s1   <none>           <none>
	 202110261133k8spolicytestbasictestchecksallkindofkubernetespoli   app2-5cc5d58844-hzddb              1/1     Running   0          10m   10.0.1.94       k8s1   <none>           <none>
	 202110261133k8spolicytestbasictestchecksallkindofkubernetespoli   app3-6c7856c5b5-pxkm5              1/1     Running   0          10m   10.0.1.161      k8s1   <none>           <none>
	 cilium-monitoring                                                 grafana-7fd557d749-rxpbf           0/1     Running   0          78m   10.0.0.11       k8s1   <none>           <none>
	 cilium-monitoring                                                 prometheus-d87f8f984-d5s5n         1/1     Running   0          78m   10.0.0.52       k8s1   <none>           <none>
	 kube-system                                                       cilium-hlqtp                       1/1     Running   0          11m   192.168.36.12   k8s2   <none>           <none>
	 kube-system                                                       cilium-kjgpk                       1/1     Running   0          11m   192.168.36.11   k8s1   <none>           <none>
	 kube-system                                                       cilium-operator-77b788f486-79dkg   1/1     Running   0          11m   192.168.36.13   k8s3   <none>           <none>
	 kube-system                                                       cilium-operator-77b788f486-rzfj4   1/1     Running   0          11m   192.168.36.12   k8s2   <none>           <none>
	 kube-system                                                       coredns-5fc58db489-rv7qn           1/1     Running   0          10m   10.0.0.251      k8s2   <none>           <none>
	 kube-system                                                       etcd-k8s1                          1/1     Running   0          81m   192.168.36.11   k8s1   <none>           <none>
	 kube-system                                                       kube-apiserver-k8s1                1/1     Running   0          81m   192.168.36.11   k8s1   <none>           <none>
	 kube-system                                                       kube-controller-manager-k8s1       1/1     Running   0          81m   192.168.36.11   k8s1   <none>           <none>
	 kube-system                                                       kube-scheduler-k8s1                1/1     Running   0          81m   192.168.36.11   k8s1   <none>           <none>
	 kube-system                                                       log-gatherer-qnn44                 1/1     Running   0          78m   192.168.36.13   k8s3   <none>           <none>
	 kube-system                                                       log-gatherer-vptxc                 1/1     Running   0          78m   192.168.36.11   k8s1   <none>           <none>
	 kube-system                                                       log-gatherer-xklm9                 1/1     Running   0          78m   192.168.36.12   k8s2   <none>           <none>
	 kube-system                                                       registry-adder-7k4p6               1/1     Running   0          79m   192.168.36.13   k8s3   <none>           <none>
	 kube-system                                                       registry-adder-gv4mp               1/1     Running   0          79m   192.168.36.12   k8s2   <none>           <none>
	 kube-system                                                       registry-adder-hfns9               1/1     Running   0          79m   192.168.36.11   k8s1   <none>           <none>
	 
Stderr:
 	 

Fetching command output from pods [cilium-hlqtp cilium-kjgpk]
cmd: kubectl exec -n kube-system cilium-hlqtp -c cilium-agent -- cilium service list
Exitcode: 0 
Stdout:
 	 ID   Frontend             Service Type   Backend                   
	 1    10.96.0.1:443        ClusterIP      1 => 192.168.36.11:6443   
	 2    10.96.0.10:9153      ClusterIP      1 => 10.0.0.251:9153      
	 3    10.96.0.10:53        ClusterIP      1 => 10.0.0.251:53        
	 4    10.100.45.254:3000   ClusterIP                                
	 5    10.102.176.93:9090   ClusterIP      1 => 10.0.0.52:9090       
	 6    10.98.193.167:80     ClusterIP      1 => 10.0.1.30:80         
	                                          2 => 10.0.1.3:80          
	 7    10.98.193.167:69     ClusterIP      1 => 10.0.1.30:69         
	                                          2 => 10.0.1.3:69          
	 
Stderr:
 	 

cmd: kubectl exec -n kube-system cilium-hlqtp -c cilium-agent -- cilium endpoint list
Exitcode: 0 
Stdout:
 	 ENDPOINT   POLICY (ingress)   POLICY (egress)   IDENTITY   LABELS (source:key[=value])                       IPv6       IPv4         STATUS   
	            ENFORCEMENT        ENFORCEMENT                                                                                            
	 144        Disabled           Enabled           4          reserved:health                                   fd02::de   10.0.0.185   ready   
	 1664       Disabled           Disabled          1          k8s:cilium.io/ci-node=k8s2                                                ready   
	                                                            reserved:host                                                                     
	 3875       Disabled           Enabled           10091      k8s:io.cilium.k8s.policy.cluster=default          fd02::20   10.0.0.251   ready   
	                                                            k8s:io.cilium.k8s.policy.serviceaccount=coredns                                   
	                                                            k8s:io.kubernetes.pod.namespace=kube-system                                       
	                                                            k8s:k8s-app=kube-dns                                                              
	 
Stderr:
 	 

cmd: kubectl exec -n kube-system cilium-kjgpk -c cilium-agent -- cilium service list
Exitcode: 0 
Stdout:
 	 ID   Frontend             Service Type   Backend                   
	 1    10.102.176.93:9090   ClusterIP      1 => 10.0.0.52:9090       
	 2    10.96.0.1:443        ClusterIP      1 => 192.168.36.11:6443   
	 3    10.96.0.10:53        ClusterIP      1 => 10.0.0.251:53        
	 4    10.96.0.10:9153      ClusterIP      1 => 10.0.0.251:9153      
	 5    10.100.45.254:3000   ClusterIP                                
	 6    10.98.193.167:69     ClusterIP      1 => 10.0.1.30:69         
	                                          2 => 10.0.1.3:69          
	 7    10.98.193.167:80     ClusterIP      1 => 10.0.1.30:80         
	                                          2 => 10.0.1.3:80          
	 
Stderr:
 	 

cmd: kubectl exec -n kube-system cilium-kjgpk -c cilium-agent -- cilium endpoint list
Exitcode: 0 
Stdout:
 	 ENDPOINT   POLICY (ingress)   POLICY (egress)   IDENTITY   LABELS (source:key[=value])                                                                       IPv6        IPv4         STATUS   
	            ENFORCEMENT        ENFORCEMENT                                                                                                                                             
	 58         Disabled           Enabled           5719       k8s:id=app1                                                                                       fd02::1c9   10.0.1.3     ready   
	                                                            k8s:io.cilium.k8s.policy.cluster=default                                                                                           
	                                                            k8s:io.cilium.k8s.policy.serviceaccount=app1-account                                                                               
	                                                            k8s:io.kubernetes.pod.namespace=202110261133k8spolicytestbasictestchecksallkindofkubernetespoli                                    
	                                                            k8s:zgroup=testapp                                                                                                                 
	 175        Disabled           Enabled           5719       k8s:id=app1                                                                                       fd02::115   10.0.1.30    ready   
	                                                            k8s:io.cilium.k8s.policy.cluster=default                                                                                           
	                                                            k8s:io.cilium.k8s.policy.serviceaccount=app1-account                                                                               
	                                                            k8s:io.kubernetes.pod.namespace=202110261133k8spolicytestbasictestchecksallkindofkubernetespoli                                    
	                                                            k8s:zgroup=testapp                                                                                                                 
	 673        Disabled           Disabled          1          k8s:cilium.io/ci-node=k8s1                                                                                                 ready   
	                                                            k8s:node-role.kubernetes.io/master                                                                                                 
	                                                            reserved:host                                                                                                                      
	 2431       Disabled           Enabled           4          reserved:health                                                                                   fd02::1a1   10.0.1.102   ready   
	 3148       Disabled           Enabled           1368       k8s:appSecond=true                                                                                fd02::1f5   10.0.1.94    ready   
	                                                            k8s:id=app2                                                                                                                        
	                                                            k8s:io.cilium.k8s.policy.cluster=default                                                                                           
	                                                            k8s:io.cilium.k8s.policy.serviceaccount=app2-account                                                                               
	                                                            k8s:io.kubernetes.pod.namespace=202110261133k8spolicytestbasictestchecksallkindofkubernetespoli                                    
	                                                            k8s:zgroup=testapp                                                                                                                 
	 3410       Disabled           Enabled           24330      k8s:id=app3                                                                                       fd02::189   10.0.1.161   ready   
	                                                            k8s:io.cilium.k8s.policy.cluster=default                                                                                           
	                                                            k8s:io.cilium.k8s.policy.serviceaccount=default                                                                                    
	                                                            k8s:io.kubernetes.pod.namespace=202110261133k8spolicytestbasictestchecksallkindofkubernetespoli                                    
	                                                            k8s:zgroup=testapp                                                                                                                 
	 
Stderr:
 	 

===================== Exiting AfterFailed =====================
11:43:40 STEP: Running AfterEach for block EntireTestsuite K8sPolicyTest Basic Test
11:43:40 STEP: Running AfterEach for block EntireTestsuite K8sPolicyTest
11:43:41 STEP: Running AfterEach for block EntireTestsuite

[[ATTACHMENT|e94023cc_K8sPolicyTest_Basic_Test_Validate_to-entities_policies_Validate_toEntities_All.zip]]


ZIP Links:

Click to show.

https://jenkins.cilium.io/job/Cilium-PR-K8s-1.16-net-next//1776/artifact/e94023cc_K8sPolicyTest_Basic_Test_Validate_to-entities_policies_Validate_toEntities_All.zip
https://jenkins.cilium.io/job/Cilium-PR-K8s-1.16-net-next//1776/artifact/test_results_Cilium-PR-K8s-1.16-net-next_1776_BDD-Test-PR.zip

Jenkins URL: https://jenkins.cilium.io/job/Cilium-PR-K8s-1.16-net-next/1776/

If this is a duplicate of an existing flake, comment 'Duplicate of #<issue-number>' and close this issue.

@maintainer-s-little-helper
Copy link
Author

PR #18232 hit this flake with 98.50% similarity:

Click to show.

Test Name

K8sPolicyTest Basic Test Validate to-entities policies Validate toEntities All

Failure Output

FAIL: Found 2 k8s-app=cilium logs matching list of errors that must be investigated:

Stacktrace

Click to show.
/home/jenkins/workspace/Cilium-PR-K8s-1.16-net-next/src/github.com/cilium/cilium/test/ginkgo-ext/scopes.go:427
Found 2 k8s-app=cilium logs matching list of errors that must be investigated:
JoinEP: 
level=error
/home/jenkins/workspace/Cilium-PR-K8s-1.16-net-next/src/github.com/cilium/cilium/test/ginkgo-ext/scopes.go:425

Standard Output

Click to show.
Number of "context deadline exceeded" in logs: 0
Number of "level=error" in logs: 0
Number of "level=warning" in logs: 0
Number of "Cilium API handler panicked" in logs: 0
Number of "Goroutine took lock for more than" in logs: 0
No errors/warnings found in logs
Number of "context deadline exceeded" in logs: 0
Number of "level=error" in logs: 0
Number of "level=warning" in logs: 0
Number of "Cilium API handler panicked" in logs: 0
Number of "Goroutine took lock for more than" in logs: 0
No errors/warnings found in logs
⚠️  Found "JoinEP: " in logs 14 times
⚠️  Found "level=error" in logs 29 times
Number of "context deadline exceeded" in logs: 5
⚠️  Number of "level=error" in logs: 29
⚠️  Number of "level=warning" in logs: 43
Number of "Cilium API handler panicked" in logs: 0
Number of "Goroutine took lock for more than" in logs: 0
Top 5 errors/warnings:
Error while rewriting endpoint BPF program
endpoint regeneration failed
JoinEP: Failed to load program
generating BPF for endpoint failed, keeping stale directory.
Regeneration of endpoint failed
Cilium pods: [cilium-2g4r4 cilium-mmqn6]
Netpols loaded: 
CiliumNetworkPolicies loaded: 202112101924k8spolicytestbasictestchecksallkindofkubernetespoli::to-entities-all 
Endpoint Policy Enforcement:
Pod                          Ingress   Egress
prometheus-d87f8f984-8ww54             
coredns-8cfc78c54-p9qrt                
app1-5798c5fb6b-7w2q8                  
app1-5798c5fb6b-f2t8z                  
app2-5cc5d58844-vv2m6                  
app3-6c7856c5b5-9pcn4                  
grafana-7fd557d749-b4rs4               
Cilium agent 'cilium-2g4r4': Status: Ok  Health: Ok Nodes "" ContinerRuntime:  Kubernetes: Ok KVstore: Ok Controllers: Total 25 Failed 0
Cilium agent 'cilium-mmqn6': Status: Ok  Health: Ok Nodes "" ContinerRuntime:  Kubernetes: Ok KVstore: Ok Controllers: Total 45 Failed 0


Standard Error

Click to show.
19:30:49 STEP: Running BeforeEach block for EntireTestsuite K8sPolicyTest Basic Test
19:30:51 STEP: WaitforPods(namespace="202112101924k8spolicytestbasictestchecksallkindofkubernetespoli", filter="-l zgroup=testapp")
19:30:51 STEP: WaitforPods(namespace="202112101924k8spolicytestbasictestchecksallkindofkubernetespoli", filter="-l zgroup=testapp") => <nil>
19:30:51 STEP: Running BeforeAll block for EntireTestsuite K8sPolicyTest Basic Test Validate to-entities policies
19:30:51 STEP: Installing toEntities All
19:30:53 STEP: Verifying policy correctness
19:30:53 STEP: HTTP connectivity from pod to pod
19:30:53 STEP: HTTP connectivity to 1.1.1.1
19:30:53 STEP: HTTP connectivity from pod to pod
19:30:53 STEP: ICMP connectivity to 8.8.8.8
19:30:53 STEP: DNS lookup of kubernetes.default.svc.cluster.local
19:30:53 STEP: DNS lookup of kubernetes.default.svc.cluster.local
19:30:53 STEP: HTTP connectivity to 1.1.1.1
19:30:53 STEP: ICMP connectivity to 8.8.8.8
19:30:57 STEP: Installing deny toEntities All
19:33:43 STEP: Verifying policy correctness
19:33:43 STEP: HTTP connectivity from pod to pod
19:33:43 STEP: DNS lookup of kubernetes.default.svc.cluster.local
19:33:43 STEP: HTTP connectivity from pod to pod
19:33:43 STEP: HTTP connectivity to 1.1.1.1
19:33:43 STEP: ICMP connectivity to 8.8.8.8
19:33:43 STEP: ICMP connectivity to 8.8.8.8
19:33:43 STEP: DNS lookup of kubernetes.default.svc.cluster.local
19:33:43 STEP: HTTP connectivity to 1.1.1.1
=== Test Finished at 2021-12-10T19:34:45Z====
19:34:45 STEP: Running JustAfterEach block for EntireTestsuite K8sPolicyTest
FAIL: Found 2 k8s-app=cilium logs matching list of errors that must be investigated:
JoinEP: 
level=error
===================== TEST FAILED =====================
19:34:46 STEP: Running AfterFailed block for EntireTestsuite K8sPolicyTest
cmd: kubectl get pods -o wide --all-namespaces
Exitcode: 0 
Stdout:
 	 NAMESPACE                                                         NAME                               READY   STATUS    RESTARTS   AGE   IP              NODE   NOMINATED NODE   READINESS GATES
	 202112101924k8spolicytestbasictestchecksallkindofkubernetespoli   app1-5798c5fb6b-7w2q8              2/2     Running   0          10m   10.0.0.38       k8s1   <none>           <none>
	 202112101924k8spolicytestbasictestchecksallkindofkubernetespoli   app1-5798c5fb6b-f2t8z              2/2     Running   0          10m   10.0.0.250      k8s1   <none>           <none>
	 202112101924k8spolicytestbasictestchecksallkindofkubernetespoli   app2-5cc5d58844-vv2m6              1/1     Running   0          10m   10.0.0.103      k8s1   <none>           <none>
	 202112101924k8spolicytestbasictestchecksallkindofkubernetespoli   app3-6c7856c5b5-9pcn4              1/1     Running   0          10m   10.0.0.15       k8s1   <none>           <none>
	 cilium-monitoring                                                 grafana-7fd557d749-b4rs4           1/1     Running   0          11m   10.0.0.248      k8s1   <none>           <none>
	 cilium-monitoring                                                 prometheus-d87f8f984-8ww54         1/1     Running   0          11m   10.0.0.246      k8s1   <none>           <none>
	 kube-system                                                       cilium-2g4r4                       1/1     Running   0          11m   192.168.56.12   k8s2   <none>           <none>
	 kube-system                                                       cilium-mmqn6                       1/1     Running   0          11m   192.168.56.11   k8s1   <none>           <none>
	 kube-system                                                       cilium-operator-64d887b764-nnp8p   1/1     Running   0          11m   192.168.56.12   k8s2   <none>           <none>
	 kube-system                                                       cilium-operator-64d887b764-vbwcq   1/1     Running   0          11m   192.168.56.13   k8s3   <none>           <none>
	 kube-system                                                       coredns-8cfc78c54-p9qrt            1/1     Running   0          10m   10.0.1.37       k8s2   <none>           <none>
	 kube-system                                                       etcd-k8s1                          1/1     Running   0          16m   192.168.56.11   k8s1   <none>           <none>
	 kube-system                                                       kube-apiserver-k8s1                1/1     Running   0          16m   192.168.56.11   k8s1   <none>           <none>
	 kube-system                                                       kube-controller-manager-k8s1       1/1     Running   0          16m   192.168.56.11   k8s1   <none>           <none>
	 kube-system                                                       kube-scheduler-k8s1                1/1     Running   0          15m   192.168.56.11   k8s1   <none>           <none>
	 kube-system                                                       log-gatherer-mps7p                 1/1     Running   0          11m   192.168.56.12   k8s2   <none>           <none>
	 kube-system                                                       log-gatherer-tdqvj                 1/1     Running   0          11m   192.168.56.13   k8s3   <none>           <none>
	 kube-system                                                       log-gatherer-tznx5                 1/1     Running   0          11m   192.168.56.11   k8s1   <none>           <none>
	 kube-system                                                       registry-adder-7vpls               1/1     Running   0          12m   192.168.56.13   k8s3   <none>           <none>
	 kube-system                                                       registry-adder-8h7sw               1/1     Running   0          12m   192.168.56.11   k8s1   <none>           <none>
	 kube-system                                                       registry-adder-tsf94               1/1     Running   0          12m   192.168.56.12   k8s2   <none>           <none>
	 
Stderr:
 	 

Fetching command output from pods [cilium-2g4r4 cilium-mmqn6]
cmd: kubectl exec -n kube-system cilium-2g4r4 -c cilium-agent -- cilium service list
Exitcode: 0 
Stdout:
 	 ID   Frontend              Service Type   Backend                   
	 1    10.101.216.17:9090    ClusterIP      1 => 10.0.0.246:9090      
	 2    10.96.0.1:443         ClusterIP      1 => 192.168.56.11:6443   
	 3    10.96.0.10:53         ClusterIP      1 => 10.0.1.37:53         
	 4    10.96.0.10:9153       ClusterIP      1 => 10.0.1.37:9153       
	 5    10.109.237.135:3000   ClusterIP      1 => 10.0.0.248:3000      
	 6    10.99.203.250:80      ClusterIP      1 => 10.0.0.250:80        
	                                           2 => 10.0.0.38:80         
	 7    10.99.203.250:69      ClusterIP      1 => 10.0.0.250:69        
	                                           2 => 10.0.0.38:69         
	 
Stderr:
 	 

cmd: kubectl exec -n kube-system cilium-2g4r4 -c cilium-agent -- cilium endpoint list
Exitcode: 0 
Stdout:
 	 ENDPOINT   POLICY (ingress)   POLICY (egress)   IDENTITY   LABELS (source:key[=value])                       IPv6        IPv4         STATUS   
	            ENFORCEMENT        ENFORCEMENT                                                                                             
	 2          Disabled           Enabled           19619      k8s:io.cilium.k8s.policy.cluster=default          fd02::133   10.0.1.37    ready   
	                                                            k8s:io.cilium.k8s.policy.serviceaccount=coredns                                    
	                                                            k8s:io.kubernetes.pod.namespace=kube-system                                        
	                                                            k8s:k8s-app=kube-dns                                                               
	 1612       Disabled           Enabled           4          reserved:health                                   fd02::1ae   10.0.1.125   ready   
	 2933       Disabled           Disabled          1          k8s:cilium.io/ci-node=k8s2                                                 ready   
	                                                            reserved:host                                                                      
	 
Stderr:
 	 

cmd: kubectl exec -n kube-system cilium-mmqn6 -c cilium-agent -- cilium service list
Exitcode: 0 
Stdout:
 	 ID   Frontend              Service Type   Backend                   
	 1    10.96.0.1:443         ClusterIP      1 => 192.168.56.11:6443   
	 2    10.96.0.10:53         ClusterIP      1 => 10.0.1.37:53         
	 3    10.96.0.10:9153       ClusterIP      1 => 10.0.1.37:9153       
	 4    10.109.237.135:3000   ClusterIP      1 => 10.0.0.248:3000      
	 5    10.101.216.17:9090    ClusterIP      1 => 10.0.0.246:9090      
	 6    10.99.203.250:80      ClusterIP      1 => 10.0.0.250:80        
	                                           2 => 10.0.0.38:80         
	 7    10.99.203.250:69      ClusterIP      1 => 10.0.0.250:69        
	                                           2 => 10.0.0.38:69         
	 
Stderr:
 	 

cmd: kubectl exec -n kube-system cilium-mmqn6 -c cilium-agent -- cilium endpoint list
Exitcode: 0 
Stdout:
 	 ENDPOINT   POLICY (ingress)   POLICY (egress)   IDENTITY   LABELS (source:key[=value])                                                                       IPv6       IPv4         STATUS   
	            ENFORCEMENT        ENFORCEMENT                                                                                                                                            
	 163        Disabled           Enabled           44250      k8s:id=app3                                                                                       fd02::83   10.0.0.15    ready   
	                                                            k8s:io.cilium.k8s.policy.cluster=default                                                                                          
	                                                            k8s:io.cilium.k8s.policy.serviceaccount=default                                                                                   
	                                                            k8s:io.kubernetes.pod.namespace=202112101924k8spolicytestbasictestchecksallkindofkubernetespoli                                   
	                                                            k8s:zgroup=testapp                                                                                                                
	 297        Disabled           Enabled           64881      k8s:app=grafana                                                                                   fd02::47   10.0.0.248   ready   
	                                                            k8s:io.cilium.k8s.policy.cluster=default                                                                                          
	                                                            k8s:io.cilium.k8s.policy.serviceaccount=default                                                                                   
	                                                            k8s:io.kubernetes.pod.namespace=cilium-monitoring                                                                                 
	 1261       Disabled           Enabled           20147      k8s:app=prometheus                                                                                fd02::40   10.0.0.246   ready   
	                                                            k8s:io.cilium.k8s.policy.cluster=default                                                                                          
	                                                            k8s:io.cilium.k8s.policy.serviceaccount=prometheus-k8s                                                                            
	                                                            k8s:io.kubernetes.pod.namespace=cilium-monitoring                                                                                 
	 1532       Disabled           Enabled           2234       k8s:appSecond=true                                                                                fd02::df   10.0.0.103   ready   
	                                                            k8s:id=app2                                                                                                                       
	                                                            k8s:io.cilium.k8s.policy.cluster=default                                                                                          
	                                                            k8s:io.cilium.k8s.policy.serviceaccount=app2-account                                                                              
	                                                            k8s:io.kubernetes.pod.namespace=202112101924k8spolicytestbasictestchecksallkindofkubernetespoli                                   
	                                                            k8s:zgroup=testapp                                                                                                                
	 2258       Disabled           Enabled           16288      k8s:id=app1                                                                                       fd02::c8   10.0.0.38    ready   
	                                                            k8s:io.cilium.k8s.policy.cluster=default                                                                                          
	                                                            k8s:io.cilium.k8s.policy.serviceaccount=app1-account                                                                              
	                                                            k8s:io.kubernetes.pod.namespace=202112101924k8spolicytestbasictestchecksallkindofkubernetespoli                                   
	                                                            k8s:zgroup=testapp                                                                                                                
	 2368       Disabled           Enabled           16288      k8s:id=app1                                                                                       fd02::e2   10.0.0.250   ready   
	                                                            k8s:io.cilium.k8s.policy.cluster=default                                                                                          
	                                                            k8s:io.cilium.k8s.policy.serviceaccount=app1-account                                                                              
	                                                            k8s:io.kubernetes.pod.namespace=202112101924k8spolicytestbasictestchecksallkindofkubernetespoli                                   
	                                                            k8s:zgroup=testapp                                                                                                                
	 3280       Disabled           Disabled          1          k8s:cilium.io/ci-node=k8s1                                                                                                ready   
	                                                            k8s:node-role.kubernetes.io/master                                                                                                
	                                                            reserved:host                                                                                                                     
	 3834       Disabled           Enabled           4          reserved:health                                                                                   fd02::5f   10.0.0.81    ready   
	 
Stderr:
 	 

===================== Exiting AfterFailed =====================
19:35:04 STEP: Running AfterEach for block EntireTestsuite K8sPolicyTest Basic Test
19:35:04 STEP: Running AfterEach for block EntireTestsuite K8sPolicyTest
19:35:04 STEP: Running AfterEach for block EntireTestsuite

[[ATTACHMENT|bd5f172c_K8sPolicyTest_Basic_Test_Validate_to-entities_policies_Validate_toEntities_All.zip]]


ZIP Links:

Click to show.

https://jenkins.cilium.io/job/Cilium-PR-K8s-1.16-net-next//2166/artifact/bd5f172c_K8sPolicyTest_Basic_Test_Validate_to-entities_policies_Validate_toEntities_All.zip
https://jenkins.cilium.io/job/Cilium-PR-K8s-1.16-net-next//2166/artifact/test_results_Cilium-PR-K8s-1.16-net-next_2166_BDD-Test-PR.zip

Jenkins URL: https://jenkins.cilium.io/job/Cilium-PR-K8s-1.16-net-next/2166/

If this is a duplicate of an existing flake, comment 'Duplicate of #<issue-number>' and close this issue.

@aanm aanm added the area/CI Continuous Integration testing issue or flake label Jan 6, 2022
@github-actions
Copy link

github-actions bot commented Jul 9, 2022

This issue has been automatically marked as stale because it has not
had recent activity. It will be closed if no further activity occurs.

@github-actions github-actions bot added stale The stale bot thinks this issue is old. Add "pinned" label to prevent this from becoming stale. and removed stale The stale bot thinks this issue is old. Add "pinned" label to prevent this from becoming stale. labels Jul 9, 2022
@github-actions
Copy link

This issue has been automatically marked as stale because it has not
had recent activity. It will be closed if no further activity occurs.

@github-actions github-actions bot added the stale The stale bot thinks this issue is old. Add "pinned" label to prevent this from becoming stale. label Sep 14, 2022
@github-actions
Copy link

This issue has not seen any activity since it was marked stale.
Closing.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/CI Continuous Integration testing issue or flake ci/flake This is a known failure that occurs in the tree. Please investigate me! stale The stale bot thinks this issue is old. Add "pinned" label to prevent this from becoming stale.
Projects
None yet
Development

No branches or pull requests

2 participants