See <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-aks-conformance-net-policy/644/display/redirect?page=changes>
Changes:
[noreply] Fix action field in NetworkPolicyEvaluation for KNP (#6217)
[noreply] Improve macros for updater job builder (#5330)
[noreply] Add upgrade instructions for Antrea v2.0 (#6261)
[noreply] Upgrade base image of UBI to UBI9 (#5737)
[noreply] Update OVS pipeline document (#5412)
[noreply] Update CHANGELOG for v2.0.0 release (#6266)
------------------------------------------
Started by timer
Running as SYSTEM
Building remotely on antrea-cloud-ci-vm (antrea-cloud) in workspace <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-aks-conformance-net-policy/ws/>
No credentials specified
Wiping out workspace first.
Cloning the remote Git repository
Cloning repository
https://github.com/antrea-io/antrea/
> git init <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-aks-conformance-net-policy/ws/> # timeout=10
Fetching upstream changes from
https://github.com/antrea-io/antrea/
> git --version # timeout=10
> git fetch --tags --progress --
https://github.com/antrea-io/antrea/ +refs/heads/*:refs/remotes/origin/* # timeout=10
> git config remote.origin.url
https://github.com/antrea-io/antrea/ # timeout=10
> git config --add remote.origin.fetch +refs/heads/*:refs/remotes/origin/* # timeout=10
> git config remote.origin.url
https://github.com/antrea-io/antrea/ # timeout=10
Fetching upstream changes from
https://github.com/antrea-io/antrea/
> git fetch --tags --progress --
https://github.com/antrea-io/antrea/ +refs/heads/*:refs/remotes/origin/* # timeout=10
> git rev-parse origin/main^{commit} # timeout=10
Checking out Revision 89363ac43777a5d0e1d81694b2816c9bced1c476 (origin/main)
> git config core.sparsecheckout # timeout=10
> git checkout -f 89363ac43777a5d0e1d81694b2816c9bced1c476 # timeout=10
Commit message: "Update CHANGELOG for v2.0.0 release (#6266)"
> git rev-list --no-walk 9a9db6f35383a5fe1a756dfd1cfa5f65864b3cf9 # timeout=10
[cloud-antrea-aks-conformance-net-policy] $ /bin/bash /tmp/jenkins4304453336852234056.sh
+ REGION=westus
+ RESOURCE_GROUP=antrea-ci-rg
+ SSH_KEY_PATH=/home/ubuntu/.ssh/id_rsa.pub
+ SSH_PRIVATE_KEY_PATH=/home/ubuntu/.ssh/id_rsa
+ RUN_ALL=true
+ RUN_SETUP_ONLY=false
+ RUN_CLEANUP_ONLY=false
+ KUBECONFIG_PATH=/home/ubuntu/jenkins/out/aks
+ TEST_SCRIPT_RC=0
+ MODE=report
+ KUBE_CONFORMANCE_IMAGE_VERSION=auto
+ _usage='Usage: ./ci/test-conformance-aks.sh [--cluster-name <AKSClusterNameToUse>] [--kubeconfig <KubeconfigSavePath>] [--k8s-version <ClusterVersion>] [--azure-app-id <AppID>] [--azure-tenant-id <TenantID>] [--azure-password <Password>] [--aks-region <Region>] [--log-mode <SonobuoyResultLogLevel>] [--setup-only] [--cleanup-only]
Setup a AKS cluster to run K8s e2e community tests (Conformance & Network Policy).
--cluster-name The cluster name to be used for the generated AKS cluster. Must be specified if not run in Jenkins environment.
--kubeconfig Path to save kubeconfig of generated AKS cluster.
--k8s-version AKS K8s cluster version. Defaults to the default K8s version for AKS in the Azure region.
--azure-app-id Azure Service Principal Application ID.
--azure-tenant-id Azure Service Principal Tenant ID.
--azure-password Azure Service Principal Password.
--aks-region The Azure region where the cluster will be initiated. Defaults to westus.
--log-mode Use the flag to set either '\''report'\'', '\''detail'\'', or '\''dump'\'' level data for sonobuoy results.
--setup-only Only perform setting up the cluster and run test.
--cleanup-only Only perform cleaning up the cluster.'
+ [[ 11 -gt 0 ]]
+ key=--azure-app-id
+ case $key in
+ AZURE_APP_ID=****
+ shift 2
+ [[ 9 -gt 0 ]]
+ key=--azure-password
+ case $key in
+ AZURE_PASSWORD=****
+ shift 2
+ [[ 7 -gt 0 ]]
+ key=--azure-tenant-id
+ case $key in
+ AZURE_TENANT_ID=****
+ shift 2
+ [[ 5 -gt 0 ]]
+ key=--cluster-name
+ case $key in
+ CLUSTER=cloud-antrea-aks-conformance-net-policy-644
+ shift 2
+ [[ 3 -gt 0 ]]
+ key=--log-mode
+ case $key in
+ MODE=detail
+ shift 2
+ [[ 1 -gt 0 ]]
+ key=--setup-only
+ case $key in
+ RUN_SETUP_ONLY=true
+ RUN_ALL=false
+ shift
+ [[ 0 -gt 0 ]]
+++ dirname ./ci/test-conformance-aks.sh
++ cd ./ci
++ pwd
+ THIS_DIR=<
https://jenkins.antrea-ci.rocks/job/cloud-antrea-aks-conformance-net-policy/ws/ci>
+ GIT_CHECKOUT_DIR=<
https://jenkins.antrea-ci.rocks/job/cloud-antrea-aks-conformance-net-policy/ws/ci/..>
+ pushd <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-aks-conformance-net-policy/ws/ci>
+ source <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-aks-conformance-net-policy/ws/ci/jenkins/utils.sh>
+ [[ false == true ]]
+ [[ true == true ]]
+ setup_aks
+ echo '=== This cluster to be created is named: cloud-antrea-aks-conformance-net-policy-644 in resource group antrea-ci-rg ==='
=== This cluster to be created is named: cloud-antrea-aks-conformance-net-policy-644 in resource group antrea-ci-rg ===
+ echo CLUSTERNAME=cloud-antrea-aks-conformance-net-policy-644
+ [[ -n '' ]]
+ echo '=== Using the following az cli version ==='
=== Using the following az cli version ===
+ az --version
WARNING: You have 2 updates available. Consider updating your CLI installation with 'az upgrade'
Please let us know how we are doing:
https://aka.ms/azureclihats
and let us know if you're interested in trying out our newest features:
https://aka.ms/CLIUXstudy
azure-cli 2.26.1 *
core 2.26.1 *
telemetry 1.0.6
Python location '/opt/az/bin/python3'
Extensions directory '/home/ubuntu/.azure/cliextensions'
Python (Linux) 3.6.10 (default, Jul 14 2021, 08:08:50)
[GCC 7.5.0]
Legal docs and information:
aka.ms/AzureCliLegal
+ echo '=== Logging into Azure Cloud ==='
=== Logging into Azure Cloud ===
+ az login --service-principal --username **** --password **** --tenant ****
[
{
"cloudName": "AzureCloud",
"homeTenantId": "****",
"id": "22e33c8b-efc5-40c0-a98f-6776331509cc",
"isDefault": true,
"managedByTenants": [],
"name": "antrea",
"state": "Enabled",
"tenantId": "****",
"user": {
"name": "****",
"type": "servicePrincipal"
}
}
]
+ echo '=== Using the following kubectl ==='
=== Using the following kubectl ===
+ which kubectl
/usr/bin/kubectl
+ echo '=== Creating a resource group ==='
=== Creating a resource group ===
+ az group create --name antrea-ci-rg --location westus
{
"id": "/subscriptions/22e33c8b-efc5-40c0-a98f-6776331509cc/resourceGroups/antrea-ci-rg",
"location": "westus",
"managedBy": null,
"name": "antrea-ci-rg",
"properties": {
"provisioningState": "Succeeded"
},
"tags": null,
"type": "Microsoft.Resources/resourceGroups"
}
+ [[ -z '' ]]
++ az aks get-versions -l westus -o json
++ jq -r '.orchestrators[] | select(.default==true).orchestratorVersion'
+ K8S_VERSION=1.28.5
+ echo '=== Creating a cluster in AKS ==='
=== Creating a cluster in AKS ===
+ az aks create --resource-group antrea-ci-rg --name cloud-antrea-aks-conformance-net-policy-644 --node-count 2 --enable-node-public-ip --ssh-key-value /home/ubuntu/.ssh/id_rsa.pub --network-plugin azure --kubernetes-version 1.28.5 --service-principal **** --client-secret ****
ERROR: (QuotaExceeded) Code="OperationNotAllowed" Message="Operation could not be completed as it results in exceeding approved standardDSv2Family Cores quota. Additional details - Deployment Model: Resource Manager, Location: westus, Current Limit: 10, Current Usage: 8, Additional Required: 4, (Minimum) New Limit Required: 12. Submit a request for Quota increase at
https://aka.ms/ProdportalCRP/#blade/Microsoft_Azure_Capacity/UsageAndQuota.ReactView/Parameters/%7B%22subscriptionId%22:%2222e33c8b-efc5-40c0-a98f-6776331509cc%22,%22command%22:%22openQuotaApprovalBlade%22,%22quotas%22:[%7B%22location%22:%22westus%22,%22providerId%22:%22Microsoft.Compute%22,%22resourceName%22:%22standardDSv2Family%22,%22quotaRequest%22:%7B%22properties%22:%7B%22limit%22:12,%22unit%22:%22Count%22,%22name%22:%7B%22value%22:%22standardDSv2Family%22%7D%7D%7D%7D]%7D by specifying parameters listed in the ‘Details’ section for deployment to succeed. Please read more about quota limits at
https://docs.microsoft.com/en-us/azure/azure-supportability/per-vm-quota-requests"
Build step 'Execute shell' marked build as failure
Archiving artifacts