-
Notifications
You must be signed in to change notification settings - Fork 858
Closed
Labels
awaiting-maintainerBlock issues from being stale/obsolete/closedBlock issues from being stale/obsolete/closed
Description
This test fails occasionally, with the following output.
Log
Already have image (with digest): gcr.io/google.com/cloudsdktool/cloud-sdk
Fetching cluster endpoint and auth data.
kubeconfig entry generated for standard-upgrade-test-cluster-1-31.
Checking if resources from a previous build of upgrade-test-runner exist and need to be cleaned up on cluster standard-upgrade-test-cluster-1-31.
No resources found in default namespace.
No resources found in default namespace.
No resources found in default namespace.
fleetautoscalers.autoscaling.agones.dev 2025-04-22T22:45:05Z
fleets.agones.dev 2025-04-22T22:45:05Z
gameserverallocationpolicies.multicluster.agones.dev 2025-04-22T22:45:06Z
gameservers.agones.dev 2025-04-22T22:45:06Z
gameserversets.agones.dev 2025-04-22T22:45:06Z
Deleting crds from previous run of upgrade-test-runner on cluster standard-upgrade-test-cluster-1-31.
customresourcedefinition.apiextensions.k8s.io "fleetautoscalers.autoscaling.agones.dev" deleted
customresourcedefinition.apiextensions.k8s.io "fleets.agones.dev" deleted
customresourcedefinition.apiextensions.k8s.io "gameserverallocationpolicies.multicluster.agones.dev" deleted
customresourcedefinition.apiextensions.k8s.io "gameservers.agones.dev" deleted
customresourcedefinition.apiextensions.k8s.io "gameserversets.agones.dev" deleted
kubectl apply -f permissions.yaml on cluster standard-upgrade-test-cluster-1-31
serviceaccount/agones-sa unchanged
role.rbac.authorization.k8s.io/pod-manager unchanged
rolebinding.rbac.authorization.k8s.io/manage-pods unchanged
clusterrole.rbac.authorization.k8s.io/node-reader unchanged
clusterrolebinding.rbac.authorization.k8s.io/read-nodes unchanged
priorityclass.scheduling.k8s.io/high-priority configured
clusterrole.rbac.authorization.k8s.io/namespace-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manage-namespaces unchanged
clusterrole.rbac.authorization.k8s.io/secret-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manage-secrets unchanged
clusterrole.rbac.authorization.k8s.io/priorityclass-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-priorityclasses unchanged
clusterrole.rbac.authorization.k8s.io/poddisruptionbudget-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-poddisruptionbudgets unchanged
clusterrole.rbac.authorization.k8s.io/serviceaccount-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manage-serviceaccounts unchanged
clusterrole.rbac.authorization.k8s.io/apiservices-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manage-apiservices unchanged
clusterrole.rbac.authorization.k8s.io/crd-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-crds unchanged
clusterrole.rbac.authorization.k8s.io/clusterrole-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manager-clusterroles unchanged
clusterrole.rbac.authorization.k8s.io/deployment-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-deployments unchanged
clusterrole.rbac.authorization.k8s.io/webhookconfiguration-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-webhookconfigurations unchanged
clusterrole.rbac.authorization.k8s.io/allocator unchanged
clusterrole.rbac.authorization.k8s.io/controller unchanged
clusterrole.rbac.authorization.k8s.io/sdk unchanged
clusterrolebinding.rbac.authorization.k8s.io/allocator unchanged
clusterrolebinding.rbac.authorization.k8s.io/controller-access unchanged
clusterrolebinding.rbac.authorization.k8s.io/controller:system:auth-delegator unchanged
rolebinding.rbac.authorization.k8s.io/controller-auth-reader unchanged
rolebinding.rbac.authorization.k8s.io/sdk-access unchanged
clusterrole.rbac.authorization.k8s.io/helm-cleanup unchanged
clusterrolebinding.rbac.authorization.k8s.io/helm-cleanup-access unchanged
kubectl apply -f versionMap.yaml on cluster standard-upgrade-test-cluster-1-31
configmap/version-map configured
kubectl apply -f gameserverTemplate.yaml on cluster standard-upgrade-test-cluster-1-31
configmap/gameserver-template unchanged
kubectl apply -f upgradeTest.yaml on cluster standard-upgrade-test-cluster-1-31
job.batch/upgrade-test-runner created
pod/upgrade-test-runner-z6rb2 condition met
Wait for job upgrade-test-runner to complete or fail on cluster standard-upgrade-test-cluster-1-31
Fetching cluster endpoint and auth data.
kubeconfig entry generated for standard-upgrade-test-cluster-1-30.
Checking if resources from a previous build of upgrade-test-runner exist and need to be cleaned up on cluster standard-upgrade-test-cluster-1-30.
No resources found in default namespace.
No resources found in default namespace.
No resources found in default namespace.
fleetautoscalers.autoscaling.agones.dev 2025-04-22T22:45:25Z
fleets.agones.dev 2025-04-22T22:45:25Z
gameserverallocationpolicies.multicluster.agones.dev 2025-04-22T22:45:25Z
gameservers.agones.dev 2025-04-22T22:45:25Z
gameserversets.agones.dev 2025-04-22T22:45:26Z
Deleting crds from previous run of upgrade-test-runner on cluster standard-upgrade-test-cluster-1-30.
customresourcedefinition.apiextensions.k8s.io "fleetautoscalers.autoscaling.agones.dev" deleted
customresourcedefinition.apiextensions.k8s.io "fleets.agones.dev" deleted
customresourcedefinition.apiextensions.k8s.io "gameserverallocationpolicies.multicluster.agones.dev" deleted
customresourcedefinition.apiextensions.k8s.io "gameservers.agones.dev" deleted
customresourcedefinition.apiextensions.k8s.io "gameserversets.agones.dev" deleted
kubectl apply -f permissions.yaml on cluster standard-upgrade-test-cluster-1-30
serviceaccount/agones-sa unchanged
role.rbac.authorization.k8s.io/pod-manager unchanged
rolebinding.rbac.authorization.k8s.io/manage-pods unchanged
clusterrole.rbac.authorization.k8s.io/node-reader unchanged
clusterrolebinding.rbac.authorization.k8s.io/read-nodes unchanged
priorityclass.scheduling.k8s.io/high-priority configured
clusterrole.rbac.authorization.k8s.io/namespace-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manage-namespaces unchanged
clusterrole.rbac.authorization.k8s.io/secret-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manage-secrets unchanged
clusterrole.rbac.authorization.k8s.io/priorityclass-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-priorityclasses unchanged
clusterrole.rbac.authorization.k8s.io/poddisruptionbudget-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-poddisruptionbudgets unchanged
clusterrole.rbac.authorization.k8s.io/serviceaccount-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manage-serviceaccounts unchanged
clusterrole.rbac.authorization.k8s.io/apiservices-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manage-apiservices unchanged
clusterrole.rbac.authorization.k8s.io/crd-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-crds unchanged
clusterrole.rbac.authorization.k8s.io/clusterrole-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manager-clusterroles unchanged
clusterrole.rbac.authorization.k8s.io/deployment-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-deployments unchanged
clusterrole.rbac.authorization.k8s.io/webhookconfiguration-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-webhookconfigurations unchanged
clusterrole.rbac.authorization.k8s.io/allocator unchanged
clusterrole.rbac.authorization.k8s.io/controller unchanged
clusterrole.rbac.authorization.k8s.io/sdk unchanged
clusterrolebinding.rbac.authorization.k8s.io/allocator unchanged
clusterrolebinding.rbac.authorization.k8s.io/controller-access unchanged
clusterrolebinding.rbac.authorization.k8s.io/controller:system:auth-delegator unchanged
rolebinding.rbac.authorization.k8s.io/controller-auth-reader unchanged
rolebinding.rbac.authorization.k8s.io/sdk-access unchanged
clusterrole.rbac.authorization.k8s.io/helm-cleanup unchanged
clusterrolebinding.rbac.authorization.k8s.io/helm-cleanup-access unchanged
kubectl apply -f versionMap.yaml on cluster standard-upgrade-test-cluster-1-30
configmap/version-map configured
kubectl apply -f gameserverTemplate.yaml on cluster standard-upgrade-test-cluster-1-30
configmap/gameserver-template unchanged
kubectl apply -f upgradeTest.yaml on cluster standard-upgrade-test-cluster-1-30
job.batch/upgrade-test-runner created
pod/upgrade-test-runner-rk494 condition met
Wait for job upgrade-test-runner to complete or fail on cluster standard-upgrade-test-cluster-1-30
Fetching cluster endpoint and auth data.
kubeconfig entry generated for standard-upgrade-test-cluster-1-32.
Checking if resources from a previous build of upgrade-test-runner exist and need to be cleaned up on cluster standard-upgrade-test-cluster-1-32.
No resources found in default namespace.
No resources found in default namespace.
No resources found in default namespace.
fleetautoscalers.autoscaling.agones.dev 2025-04-22T22:45:44Z
fleets.agones.dev 2025-04-22T22:45:44Z
gameserverallocationpolicies.multicluster.agones.dev 2025-04-22T22:45:45Z
gameservers.agones.dev 2025-04-22T22:45:44Z
gameserversets.agones.dev 2025-04-22T22:45:45Z
Deleting crds from previous run of upgrade-test-runner on cluster standard-upgrade-test-cluster-1-32.
customresourcedefinition.apiextensions.k8s.io "fleetautoscalers.autoscaling.agones.dev" deleted
customresourcedefinition.apiextensions.k8s.io "fleets.agones.dev" deleted
customresourcedefinition.apiextensions.k8s.io "gameserverallocationpolicies.multicluster.agones.dev" deleted
customresourcedefinition.apiextensions.k8s.io "gameservers.agones.dev" deleted
customresourcedefinition.apiextensions.k8s.io "gameserversets.agones.dev" deleted
kubectl apply -f permissions.yaml on cluster standard-upgrade-test-cluster-1-32
serviceaccount/agones-sa unchanged
role.rbac.authorization.k8s.io/pod-manager unchanged
rolebinding.rbac.authorization.k8s.io/manage-pods unchanged
clusterrole.rbac.authorization.k8s.io/node-reader unchanged
clusterrolebinding.rbac.authorization.k8s.io/read-nodes unchanged
priorityclass.scheduling.k8s.io/high-priority configured
clusterrole.rbac.authorization.k8s.io/namespace-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manage-namespaces unchanged
clusterrole.rbac.authorization.k8s.io/secret-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manage-secrets unchanged
clusterrole.rbac.authorization.k8s.io/priorityclass-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-priorityclasses unchanged
clusterrole.rbac.authorization.k8s.io/poddisruptionbudget-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-poddisruptionbudgets unchanged
clusterrole.rbac.authorization.k8s.io/serviceaccount-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manage-serviceaccounts unchanged
clusterrole.rbac.authorization.k8s.io/apiservices-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manage-apiservices unchanged
clusterrole.rbac.authorization.k8s.io/crd-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-crds unchanged
clusterrole.rbac.authorization.k8s.io/clusterrole-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manager-clusterroles unchanged
clusterrole.rbac.authorization.k8s.io/deployment-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-deployments unchanged
clusterrole.rbac.authorization.k8s.io/webhookconfiguration-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-webhookconfigurations unchanged
clusterrole.rbac.authorization.k8s.io/allocator unchanged
clusterrole.rbac.authorization.k8s.io/controller unchanged
clusterrole.rbac.authorization.k8s.io/sdk unchanged
clusterrolebinding.rbac.authorization.k8s.io/allocator unchanged
clusterrolebinding.rbac.authorization.k8s.io/controller-access unchanged
clusterrolebinding.rbac.authorization.k8s.io/controller:system:auth-delegator unchanged
rolebinding.rbac.authorization.k8s.io/controller-auth-reader unchanged
rolebinding.rbac.authorization.k8s.io/sdk-access unchanged
clusterrole.rbac.authorization.k8s.io/helm-cleanup unchanged
clusterrolebinding.rbac.authorization.k8s.io/helm-cleanup-access unchanged
kubectl apply -f versionMap.yaml on cluster standard-upgrade-test-cluster-1-32
configmap/version-map configured
kubectl apply -f gameserverTemplate.yaml on cluster standard-upgrade-test-cluster-1-32
configmap/gameserver-template unchanged
kubectl apply -f upgradeTest.yaml on cluster standard-upgrade-test-cluster-1-32
job.batch/upgrade-test-runner created
pod/upgrade-test-runner-x746g condition met
Wait for job upgrade-test-runner to complete or fail on cluster standard-upgrade-test-cluster-1-32
Fetching cluster endpoint and auth data.
kubeconfig entry generated for gke-autopilot-upgrade-test-cluster-1-31.
priorityclass.scheduling.k8s.io/low-priority configured
Warning: autopilot-default-resources-mutator:Autopilot updated Deployment default/evictable-pods-deployment: adjusted 'cpu' resource to meet requirements for containers [ubuntu] (see http://g.co/gke/autopilot-defaults).
deployment.apps/evictable-pods-deployment configured
Checking if resources from a previous build of upgrade-test-runner exist and need to be cleaned up on cluster gke-autopilot-upgrade-test-cluster-1-31.
No resources found in default namespace.
No resources found in default namespace.
No resources found in default namespace.
fleetautoscalers.autoscaling.agones.dev 2025-04-22T22:46:13Z
fleets.agones.dev 2025-04-22T22:46:12Z
gameserverallocationpolicies.multicluster.agones.dev 2025-04-22T22:46:13Z
gameservers.agones.dev 2025-04-22T22:46:13Z
gameserversets.agones.dev 2025-04-22T22:46:13Z
Deleting crds from previous run of upgrade-test-runner on cluster gke-autopilot-upgrade-test-cluster-1-31.
customresourcedefinition.apiextensions.k8s.io "fleetautoscalers.autoscaling.agones.dev" deleted
customresourcedefinition.apiextensions.k8s.io "fleets.agones.dev" deleted
customresourcedefinition.apiextensions.k8s.io "gameserverallocationpolicies.multicluster.agones.dev" deleted
customresourcedefinition.apiextensions.k8s.io "gameservers.agones.dev" deleted
customresourcedefinition.apiextensions.k8s.io "gameserversets.agones.dev" deleted
kubectl apply -f permissions.yaml on cluster gke-autopilot-upgrade-test-cluster-1-31
serviceaccount/agones-sa unchanged
role.rbac.authorization.k8s.io/pod-manager unchanged
rolebinding.rbac.authorization.k8s.io/manage-pods unchanged
clusterrole.rbac.authorization.k8s.io/node-reader unchanged
clusterrolebinding.rbac.authorization.k8s.io/read-nodes unchanged
priorityclass.scheduling.k8s.io/high-priority configured
clusterrole.rbac.authorization.k8s.io/namespace-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manage-namespaces unchanged
clusterrole.rbac.authorization.k8s.io/secret-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manage-secrets unchanged
clusterrole.rbac.authorization.k8s.io/priorityclass-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-priorityclasses unchanged
clusterrole.rbac.authorization.k8s.io/poddisruptionbudget-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-poddisruptionbudgets unchanged
clusterrole.rbac.authorization.k8s.io/serviceaccount-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manage-serviceaccounts unchanged
clusterrole.rbac.authorization.k8s.io/apiservices-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manage-apiservices unchanged
clusterrole.rbac.authorization.k8s.io/crd-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-crds unchanged
clusterrole.rbac.authorization.k8s.io/clusterrole-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manager-clusterroles unchanged
clusterrole.rbac.authorization.k8s.io/deployment-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-deployments unchanged
clusterrole.rbac.authorization.k8s.io/webhookconfiguration-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-webhookconfigurations unchanged
clusterrole.rbac.authorization.k8s.io/allocator unchanged
clusterrole.rbac.authorization.k8s.io/controller unchanged
clusterrole.rbac.authorization.k8s.io/sdk unchanged
clusterrolebinding.rbac.authorization.k8s.io/allocator unchanged
clusterrolebinding.rbac.authorization.k8s.io/controller-access unchanged
clusterrolebinding.rbac.authorization.k8s.io/controller:system:auth-delegator unchanged
rolebinding.rbac.authorization.k8s.io/controller-auth-reader unchanged
rolebinding.rbac.authorization.k8s.io/sdk-access unchanged
clusterrole.rbac.authorization.k8s.io/helm-cleanup unchanged
clusterrolebinding.rbac.authorization.k8s.io/helm-cleanup-access unchanged
kubectl apply -f versionMap.yaml on cluster gke-autopilot-upgrade-test-cluster-1-31
configmap/version-map configured
kubectl apply -f gameserverTemplate.yaml on cluster gke-autopilot-upgrade-test-cluster-1-31
configmap/gameserver-template unchanged
kubectl apply -f upgradeTest.yaml on cluster gke-autopilot-upgrade-test-cluster-1-31
Warning: autopilot-default-resources-mutator:Autopilot updated Job default/upgrade-test-runner: defaulted unspecified 'cpu' resource for containers [upgrade-test-controller] (see http://g.co/gke/autopilot-defaults).
job.batch/upgrade-test-runner created
pod/upgrade-test-runner-j5z6h condition met
Wait for job upgrade-test-runner to complete or fail on cluster gke-autopilot-upgrade-test-cluster-1-31
Fetching cluster endpoint and auth data.
kubeconfig entry generated for gke-autopilot-upgrade-test-cluster-1-30.
priorityclass.scheduling.k8s.io/low-priority configured
Warning: autopilot-default-resources-mutator:Autopilot updated Deployment default/evictable-pods-deployment: adjusted 'cpu' resource to meet requirements for containers [ubuntu] (see http://g.co/gke/autopilot-defaults).
deployment.apps/evictable-pods-deployment configured
Checking if resources from a previous build of upgrade-test-runner exist and need to be cleaned up on cluster gke-autopilot-upgrade-test-cluster-1-30.
No resources found in default namespace.
No resources found in default namespace.
No resources found in default namespace.
fleetautoscalers.autoscaling.agones.dev 2025-04-22T22:46:30Z
fleets.agones.dev 2025-04-22T22:46:30Z
gameserverallocationpolicies.multicluster.agones.dev 2025-04-22T22:46:30Z
gameservers.agones.dev 2025-04-22T22:46:30Z
gameserversets.agones.dev 2025-04-22T22:46:30Z
Deleting crds from previous run of upgrade-test-runner on cluster gke-autopilot-upgrade-test-cluster-1-30.
customresourcedefinition.apiextensions.k8s.io "fleetautoscalers.autoscaling.agones.dev" deleted
customresourcedefinition.apiextensions.k8s.io "fleets.agones.dev" deleted
customresourcedefinition.apiextensions.k8s.io "gameserverallocationpolicies.multicluster.agones.dev" deleted
customresourcedefinition.apiextensions.k8s.io "gameservers.agones.dev" deleted
customresourcedefinition.apiextensions.k8s.io "gameserversets.agones.dev" deleted
kubectl apply -f permissions.yaml on cluster gke-autopilot-upgrade-test-cluster-1-30
serviceaccount/agones-sa unchanged
role.rbac.authorization.k8s.io/pod-manager unchanged
rolebinding.rbac.authorization.k8s.io/manage-pods unchanged
clusterrole.rbac.authorization.k8s.io/node-reader unchanged
clusterrolebinding.rbac.authorization.k8s.io/read-nodes unchanged
priorityclass.scheduling.k8s.io/high-priority configured
clusterrole.rbac.authorization.k8s.io/namespace-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manage-namespaces unchanged
clusterrole.rbac.authorization.k8s.io/secret-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manage-secrets unchanged
clusterrole.rbac.authorization.k8s.io/priorityclass-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-priorityclasses unchanged
clusterrole.rbac.authorization.k8s.io/poddisruptionbudget-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-poddisruptionbudgets unchanged
clusterrole.rbac.authorization.k8s.io/serviceaccount-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manage-serviceaccounts unchanged
clusterrole.rbac.authorization.k8s.io/apiservices-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manage-apiservices unchanged
clusterrole.rbac.authorization.k8s.io/crd-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-crds unchanged
clusterrole.rbac.authorization.k8s.io/clusterrole-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manager-clusterroles unchanged
clusterrole.rbac.authorization.k8s.io/deployment-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-deployments unchanged
clusterrole.rbac.authorization.k8s.io/webhookconfiguration-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-webhookconfigurations unchanged
clusterrole.rbac.authorization.k8s.io/allocator unchanged
clusterrole.rbac.authorization.k8s.io/controller unchanged
clusterrole.rbac.authorization.k8s.io/sdk unchanged
clusterrolebinding.rbac.authorization.k8s.io/allocator unchanged
clusterrolebinding.rbac.authorization.k8s.io/controller-access unchanged
clusterrolebinding.rbac.authorization.k8s.io/controller:system:auth-delegator unchanged
rolebinding.rbac.authorization.k8s.io/controller-auth-reader unchanged
rolebinding.rbac.authorization.k8s.io/sdk-access unchanged
clusterrole.rbac.authorization.k8s.io/helm-cleanup unchanged
clusterrolebinding.rbac.authorization.k8s.io/helm-cleanup-access unchanged
kubectl apply -f versionMap.yaml on cluster gke-autopilot-upgrade-test-cluster-1-30
configmap/version-map configured
kubectl apply -f gameserverTemplate.yaml on cluster gke-autopilot-upgrade-test-cluster-1-30
configmap/gameserver-template unchanged
kubectl apply -f upgradeTest.yaml on cluster gke-autopilot-upgrade-test-cluster-1-30
Warning: autopilot-default-resources-mutator:Autopilot updated Job default/upgrade-test-runner: defaulted unspecified 'cpu' resource for containers [upgrade-test-controller] (see http://g.co/gke/autopilot-defaults).
job.batch/upgrade-test-runner created
pod/upgrade-test-runner-gbvd9 condition met
Wait for job upgrade-test-runner to complete or fail on cluster gke-autopilot-upgrade-test-cluster-1-30
Fetching cluster endpoint and auth data.
kubeconfig entry generated for gke-autopilot-upgrade-test-cluster-1-32.
priorityclass.scheduling.k8s.io/low-priority configured
Warning: autopilot-default-resources-mutator:Autotopilot updated Deployment default/evictable-pods-deployment: adjusted 'cpu' resource to meet requirements for containers [ubuntu] (see http://g.co/gke/autopilot-defaults).
deployment.apps/evictable-pods-deployment configured
Checking if resources from a previous build of upgrade-test-runner exist and need to be cleaned up on cluster gke-autopilot-upgrade-test-cluster-1-32.
No resources found in default namespace.
No resources found in default namespace.
No resources found in default namespace.
fleetautoscalers.autoscaling.agones.dev 2025-04-22T22:46:53Z
fleets.agones.dev 2025-04-22T22:46:53Z
gameserverallocationpolicies.multicluster.agones.dev 2025-04-22T22:46:54Z
gameservers.agones.dev 2025-04-22T22:46:53Z
gameserversets.agones.dev 2025-04-22T22:46:54Z
Deleting crds from previous run of upgrade-test-runner on cluster gke-autopilot-upgrade-test-cluster-1-32.
customresourcedefinition.apiextensions.k8s.io "fleetautoscalers.autoscaling.agones.dev" deleted
customresourcedefinition.apiextensions.k8s.io "fleets.agones.dev" deleted
customresourcedefinition.apiextensions.k8s.io "gameserverallocationpolicies.multicluster.agones.dev" deleted
customresourcedefinition.apiextensions.k8s.io "gameservers.agones.dev" deleted
customresourcedefinition.apiextensions.k8s.io "gameserversets.agones.dev" deleted
kubectl apply -f permissions.yaml on cluster gke-autopilot-upgrade-test-cluster-1-32
serviceaccount/agones-sa unchanged
role.rbac.authorization.k8s.io/pod-manager unchanged
rolebinding.rbac.authorization.k8s.io/manage-pods unchanged
clusterrole.rbac.authorization.k8s.io/node-reader unchanged
clusterrolebinding.rbac.authorization.k8s.io/read-nodes unchanged
priorityclass.scheduling.k8s.io/high-priority configured
clusterrole.rbac.authorization.k8s.io/namespace-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manage-namespaces unchanged
clusterrole.rbac.authorization.k8s.io/secret-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manage-secrets unchanged
clusterrole.rbac.authorization.k8s.io/priorityclass-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-priorityclasses unchanged
clusterrole.rbac.authorization.k8s.io/poddisruptionbudget-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-poddisruptionbudgets unchanged
clusterrole.rbac.authorization.k8s.io/serviceaccount-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manage-serviceaccounts unchanged
clusterrole.rbac.authorization.k8s.io/apiservices-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manage-apiservices unchanged
clusterrole.rbac.authorization.k8s.io/crd-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-crds unchanged
clusterrole.rbac.authorization.k8s.io/clusterrole-manager unchanged
clusterrolebinding.rbac.authorization.k8s.io/manager-clusterroles unchanged
clusterrole.rbac.authorization.k8s.io/deployment-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-deployments unchanged
clusterrole.rbac.authorization.k8s.io/webhookconfiguration-creator unchanged
clusterrolebinding.rbac.authorization.k8s.io/create-webhookconfigurations unchanged
clusterrole.rbac.authorization.k8s.io/allocator unchanged
clusterrole.rbac.authorization.k8s.io/controller unchanged
clusterrole.rbac.authorization.k8s.io/sdk unchanged
clusterrolebinding.rbac.authorization.k8s.io/allocator unchanged
clusterrolebinding.rbac.authorization.k8s.io/controller-access unchanged
clusterrolebinding.rbac.authorization.k8s.io/controller:system:auth-delegator unchanged
rolebinding.rbac.authorization.k8s.io/controller-auth-reader unchanged
rolebinding.rbac.authorization.k8s.io/sdk-access unchanged
clusterrole.rbac.authorization.k8s.io/helm-cleanup unchanged
clusterrolebinding.rbac.authorization.k8s.io/helm-cleanup-access unchanged
kubectl apply -f versionMap.yaml on cluster gke-autopilot-upgrade-test-cluster-1-32
configmap/version-map configured
kubectl apply -f gameserverTemplate.yaml on cluster gke-autopilot-upgrade-test-cluster-1-32
configmap/gameserver-template unchanged
kubectl apply -f upgradeTest.yaml on cluster gke-autopilot-upgrade-test-cluster-1-32
Warning: autopilot-default-resources-mutator:Autopilot updated Job default/upgrade-test-runner: defaulted unspecified 'cpu' resource for containers [upgrade-test-controller] (see http://g.co/gke/autopilot-defaults).
job.batch/upgrade-test-runner created
pod/upgrade-test-runner-jlsfz condition met
Wait for job upgrade-test-runner to complete or fail on cluster gke-autopilot-upgrade-test-cluster-1-32
SuccessCriteriaMetSuccessCriteriaMetFailureTargetSuccessCriteriaMet/tmp/tmp.aPfSQ3MT5V/standard-upgrade-test-cluster-1-31.log: SuccessCriteriaMet
Complete/tmp/tmp.aPfSQ3MT5V/standard-upgrade-test-cluster-1-30.log: Complete
/tmp/tmp.aPfSQ3MT5V/standard-upgrade-test-cluster-1-32.log: SuccessCriteriaMet
/tmp/tmp.aPfSQ3MT5V/gke-autopilot-upgrade-test-cluster-1-31.log: FailureTarget
Cleaning up any remaining running pids: 2856
- As starting thought is to output the log file contents on failure, so we can see what the issue is.
Metadata
Metadata
Assignees
Labels
awaiting-maintainerBlock issues from being stale/obsolete/closedBlock issues from being stale/obsolete/closed