Failed Tests
hypershift_framework.go:316: Successfully created hostedcluster e2e-clusters-rrrs4/create-cluster-v2-8g8mk in 1m46s
hypershift_framework.go:115: Summarizing unexpected conditions for HostedCluster create-cluster-v2-8g8mk
util.go:2123: Successfully waited for HostedCluster e2e-clusters-rrrs4/create-cluster-v2-8g8mk to have valid conditions in 75ms
hypershift_framework.go:194: skipping postTeardown()
hypershift_framework.go:175: skipping teardown, already called
util.go:218: Successfully waited for kubeconfig to be published for HostedCluster e2e-clusters-rrrs4/create-cluster-v2-8g8mk in 25ms
util.go:235: Successfully waited for kubeconfig secret to have data in 0s
util.go:281: Successfully waited for a successful connection to the guest API server in 25ms
create_cluster_test.go:1265: fetching mgmt kubeconfig
util.go:218: Successfully waited for kubeconfig to be published for HostedCluster e2e-clusters-rrrs4/create-cluster-v2-8g8mk in 25ms
util.go:235: Successfully waited for kubeconfig secret to have data in 0s
control_plane_pki_operator.go:63: Grabbing customer break-glass credentials from client certificate secret e2e-clusters-rrrs4-create-cluster-v2-8g8mk/customer-system-admin-client-cert-key
control_plane_pki_operator.go:130: validating that the client certificate provides the appropriate access
control_plane_pki_operator.go:116: amending the existing kubeconfig to use break-glass client certificate credentials
control_plane_pki_operator.go:133: issuing SSR to identify the subject we are given using the client certificate
control_plane_pki_operator.go:150: could not send SSR: Post "https://api-create-cluster-v2-8g8mk.aks-e2e.hypershift.azure.devcluster.openshift.com:443/apis/authentication.k8s.io/v1/selfsubjectreviews": dial tcp 135.237.220.120:443: connect: connection refused
control_plane_pki_operator.go:92: generating new break-glass credentials for more than one signer
pki.go:76: loading certificate/key pair from disk for signer customer-break-glass, use $REGENERATE_PKI to generate new ones
control_plane_pki_operator.go:201: creating CSR "2a8ishmik31knre36mh1wspwcyn9onc9zksoue0y7wz2" for signer "customer-break-glass", requesting client auth usages
control_plane_pki_operator.go:211: creating CSRA e2e-clusters-rrrs4-create-cluster-v2-8g8mk/2a8ishmik31knre36mh1wspwcyn9onc9zksoue0y7wz2 to trigger automatic approval of the CSR
control_plane_pki_operator.go:218: Successfully waited for CSR "2a8ishmik31knre36mh1wspwcyn9onc9zksoue0y7wz2" to be approved and signed in 1.025s
control_plane_pki_operator.go:130: validating that the client certificate provides the appropriate access
control_plane_pki_operator.go:116: amending the existing kubeconfig to use break-glass client certificate credentials
control_plane_pki_operator.go:133: issuing SSR to identify the subject we are given using the client certificate
control_plane_pki_operator.go:153: ensuring that the SSR identifies the client certificate as having system:masters power and correct username
pki.go:76: loading certificate/key pair from disk for signer sre-break-glass, use $REGENERATE_PKI to generate new ones
control_plane_pki_operator.go:201: creating CSR "eakf1629odqrp6r2mba4n54wn5d8f2xklbba125bibd" for signer "sre-break-glass", requesting client auth usages
control_plane_pki_operator.go:211: creating CSRA e2e-clusters-rrrs4-create-cluster-v2-8g8mk/eakf1629odqrp6r2mba4n54wn5d8f2xklbba125bibd to trigger automatic approval of the CSR
control_plane_pki_operator.go:218: Successfully waited for CSR "eakf1629odqrp6r2mba4n54wn5d8f2xklbba125bibd" to be approved and signed in 1.025s
control_plane_pki_operator.go:130: validating that the client certificate provides the appropriate access
control_plane_pki_operator.go:116: amending the existing kubeconfig to use break-glass client certificate credentials
control_plane_pki_operator.go:133: issuing SSR to identify the subject we are given using the client certificate
control_plane_pki_operator.go:150: could not send SSR: Post "https://api-create-cluster-v2-8g8mk.aks-e2e.hypershift.azure.devcluster.openshift.com:443/apis/authentication.k8s.io/v1/selfsubjectreviews": dial tcp 135.237.220.120:443: connect: connection refused
control_plane_pki_operator.go:63: Grabbing customer break-glass credentials from client certificate secret e2e-clusters-rrrs4-create-cluster-v2-8g8mk/sre-system-admin-client-cert-key
control_plane_pki_operator.go:130: validating that the client certificate provides the appropriate access
control_plane_pki_operator.go:116: amending the existing kubeconfig to use break-glass client certificate credentials
control_plane_pki_operator.go:133: issuing SSR to identify the subject we are given using the client certificate
control_plane_pki_operator.go:150: could not send SSR: Post "https://api-create-cluster-v2-8g8mk.aks-e2e.hypershift.azure.devcluster.openshift.com:443/apis/authentication.k8s.io/v1/selfsubjectreviews": dial tcp 135.237.220.120:443: connect: connection refused