Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Area:Networking] network isolation when using a plugin that isolates namespaces by default should allow communication from default to non-default namespace on the same node [Suite:openshift/conformance/parallel] #18486

Closed
aveshagarwal opened this issue Feb 6, 2018 · 2 comments
Assignees
Labels
kind/test-flake Categorizes issue or PR as related to test flakes. sig/networking

Comments

@aveshagarwal
Copy link
Contributor

https://openshift-gce-devel.appspot.com/build/origin-ci-test/pr-logs/pull/18475/test_pull_request_origin_extended_networking_minimal/13883/

/tmp/openshift/build-rpms/rpm/BUILD/origin-3.9.0/_output/local/go/src/github.com/openshift/origin/test/extended/networking/isolation.go:41
Expected error:
    <*errors.errorString | 0xc4201efbd0>: {
        s: "timed out waiting for the condition",
    }
    timed out waiting for the condition
not to have occurred
/tmp/openshift/build-rpms/rpm/BUILD/origin-3.9.0/_output/local/go/src/github.com/openshift/origin/vendor/k8s.io/kubernetes/test/e2e/framework/util.go:4499
@jwforres
Copy link
Member

jwforres commented Feb 7, 2018

@openshift/sig-networking

@jwforres jwforres added the kind/test-flake Categorizes issue or PR as related to test flakes. label Feb 7, 2018
@danwinship danwinship assigned danwinship and unassigned knobunc Feb 7, 2018
@danwinship
Copy link
Contributor

This eventually ends up being a dup of #13241. It keeps failing to be able to create the pod with errors like:

Feb 06 17:35:20 nettest-node-1 dockerd-current[192]: container_linux.go:247: starting container process caused "process_linux.go:327: setting cgroup config for procHooks process caused \"failed to write a *:* rwm to devices.deny: open /sys/fs/cgroup/devices/system.slice/docker-871fc6f89264c02a8812d6ebfe72dd6b1215652b59d7f521db3fd01d116e0d7b.scope/system.slice/docker-871fc6f89264c02a8812d6ebfe72dd6b1215652b59d7f521db3fd01d116e0d7b.scope/system.slice/docker-3c93353d77d95c6b6114de44c0ca765d0252df9a56e0321f87c80aa027133d07.scope/devices.deny: no such file or directory\""

(This is some sort of problem with the dind environment.)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/test-flake Categorizes issue or PR as related to test flakes. sig/networking
Projects
None yet
Development

No branches or pull requests

5 participants