metadata:
annotations:
cloud.google.com/cluster_autoscaler_unhelpable_since: 2025-02-18T21:53:07+0000
cloud.google.com/cluster_autoscaler_unhelpable_until: Inf
prow.k8s.io/context: ""
prow.k8s.io/job: gobench
creationTimestamp: "2025-02-18T21:53:07Z"
deletionGracePeriodSeconds: 0
deletionTimestamp: "2025-02-18T21:58:07Z"
finalizers:
- prow.x-k8s.io/gcsk8sreporter
labels:
created-by-prow: "true"
prow.k8s.io/build-id: "1891969218946011136"
prow.k8s.io/context: ""
prow.k8s.io/id: 237d8be0-0aed-4813-bf97-9d4b8027df5c
prow.k8s.io/job: gobench
prow.k8s.io/plank-version: v20240503-28485f4e6
prow.k8s.io/type: periodic
managedFields:
- apiVersion: v1
fieldsType: FieldsV1
fieldsV1:
f:metadata:
f:annotations:
f:cloud.google.com/cluster_autoscaler_unhelpable_since: {}
f:cloud.google.com/cluster_autoscaler_unhelpable_until: {}
manager: cluster-autoscaler
operation: Update
time: "2025-02-18T21:53:07Z"
- apiVersion: v1
fieldsType: FieldsV1
fieldsV1:
f:metadata:
f:annotations:
.: {}
f:prow.k8s.io/context: {}
f:prow.k8s.io/job: {}
f:labels:
.: {}
f:created-by-prow: {}
f:prow.k8s.io/build-id: {}
f:prow.k8s.io/context: {}
f:prow.k8s.io/id: {}
f:prow.k8s.io/job: {}
f:prow.k8s.io/plank-version: {}
f:prow.k8s.io/type: {}
f:spec:
f:automountServiceAccountToken: {}
f:containers:
k:{"name":"sidecar"}:
.: {}
f:env:
.: {}
k:{"name":"JOB_SPEC"}:
.: {}
f:name: {}
f:value: {}
k:{"name":"SIDECAR_OPTIONS"}:
.: {}
f:name: {}
f:value: {}
f:image: {}
f:imagePullPolicy: {}
f:name: {}
f:resources: {}
f:terminationMessagePath: {}
f:terminationMessagePolicy: {}
f:volumeMounts:
.: {}
k:{"mountPath":"/logs"}:
.: {}
f:mountPath: {}
f:name: {}
k:{"mountPath":"/secrets/gcs"}:
.: {}
f:mountPath: {}
f:name: {}
k:{"name":"test"}:
.: {}
f:command: {}
f:env:
.: {}
k:{"name":"ARTIFACTS"}:
.: {}
f:name: {}
f:value: {}
k:{"name":"BUILD_ID"}:
.: {}
f:name: {}
f:value: {}
k:{"name":"BUILD_NUMBER"}:
.: {}
f:name: {}
f:value: {}
k:{"name":"CI"}:
.: {}
f:name: {}
f:value: {}
k:{"name":"ENTRYPOINT_OPTIONS"}:
.: {}
f:name: {}
f:value: {}
k:{"name":"GOPATH"}:
.: {}
f:name: {}
f:value: {}
k:{"name":"JOB_NAME"}:
.: {}
f:name: {}
f:value: {}
k:{"name":"JOB_SPEC"}:
.: {}
f:name: {}
f:value: {}
k:{"name":"JOB_TYPE"}:
.: {}
f:name: {}
f:value: {}
k:{"name":"PROW_JOB_ID"}:
.: {}
f:name: {}
f:value: {}
f:image: {}
f:imagePullPolicy: {}
f:name: {}
f:resources:
.: {}
f:limits:
.: {}
f:cpu: {}
f:requests:
.: {}
f:cpu: {}
f:terminationMessagePath: {}
f:terminationMessagePolicy: {}
f:volumeMounts:
.: {}
k:{"mountPath":"/logs"}:
.: {}
f:mountPath: {}
f:name: {}
k:{"mountPath":"/tools"}:
.: {}
f:mountPath: {}
f:name: {}
f:dnsPolicy: {}
f:enableServiceLinks: {}
f:initContainers:
.: {}
k:{"name":"initupload"}:
.: {}
f:env:
.: {}
k:{"name":"INITUPLOAD_OPTIONS"}:
.: {}
f:name: {}
f:value: {}
k:{"name":"JOB_SPEC"}:
.: {}
f:name: {}
f:value: {}
f:image: {}
f:imagePullPolicy: {}
f:name: {}
f:resources: {}
f:terminationMessagePath: {}
f:terminationMessagePolicy: {}
f:volumeMounts:
.: {}
k:{"mountPath":"/secrets/gcs"}:
.: {}
f:mountPath: {}
f:name: {}
k:{"name":"place-entrypoint"}:
.: {}
f:args: {}
f:image: {}
f:imagePullPolicy: {}
f:name: {}
f:resources: {}
f:terminationMessagePath: {}
f:terminationMessagePolicy: {}
f:volumeMounts:
.: {}
k:{"mountPath":"/tools"}:
.: {}
f:mountPath: {}
f:name: {}
f:nodeSelector: {}
f:restartPolicy: {}
f:schedulerName: {}
f:securityContext: {}
f:terminationGracePeriodSeconds: {}
f:volumes:
.: {}
k:{"name":"gcs-credentials"}:
.: {}
f:name: {}
f:secret:
.: {}
f:defaultMode: {}
f:secretName: {}
k:{"name":"logs"}:
.: {}
f:emptyDir: {}
f:name: {}
k:{"name":"tools"}:
.: {}
f:emptyDir: {}
f:name: {}
manager: prow-controller-manager
operation: Update
time: "2025-02-18T21:53:07Z"
- apiVersion: v1
fieldsType: FieldsV1
fieldsV1:
f:metadata:
f:finalizers:
.: {}
v:"prow.x-k8s.io/gcsk8sreporter": {}
manager: crier
operation: Update
time: "2025-02-18T21:53:08Z"
- apiVersion: v1
fieldsType: FieldsV1
fieldsV1:
f:status:
f:conditions:
.: {}
k:{"type":"PodScheduled"}:
.: {}
f:lastProbeTime: {}
f:lastTransitionTime: {}
f:message: {}
f:reason: {}
f:status: {}
f:type: {}
manager: kube-scheduler
operation: Update
subresource: status
time: "2025-02-18T21:56:41Z"
name: 237d8be0-0aed-4813-bf97-9d4b8027df5c
namespace: test-pods
resourceVersion: "355187655"
uid: 477b556d-d276-49e4-a0fb-b80d74c1dccc
spec:
automountServiceAccountToken: false
containers:
- command:
- /tools/entrypoint
env:
- name: ARTIFACTS
value: /logs/artifacts
- name: BUILD_ID
value: "1891969218946011136"
- name: BUILD_NUMBER
value: "1891969218946011136"
- name: CI
value: "true"
- name: GOPATH
value: /home/prow/go
- name: JOB_NAME
value: gobench
- name: JOB_SPEC
value: '{"type":"periodic","job":"gobench","buildid":"1891969218946011136","prowjobid":"237d8be0-0aed-4813-bf97-9d4b8027df5c","decoration_config":{"timeout":"2h0m0s","grace_period":"15m0s","utility_images":{"clonerefs":"gcr.io/k8s-prow/clonerefs:v20240503-28485f4e6","initupload":"gcr.io/k8s-prow/initupload:v20240503-28485f4e6","entrypoint":"gcr.io/k8s-prow/entrypoint:v20240503-28485f4e6","sidecar":"gcr.io/k8s-prow/sidecar:v20240503-28485f4e6"},"gcs_configuration":{"bucket":"gs://pingcapprow","path_strategy":"explicit"},"gcs_credentials_secret":"gcs-credentials","github_api_endpoints":["http://ghproxy","https://api.github.com"],"github_app_id":"18927","github_app_private_key_secret":{"name":"github-token","key":"cert"}}}'
- name: JOB_TYPE
value: periodic
- name: PROW_JOB_ID
value: 237d8be0-0aed-4813-bf97-9d4b8027df5c
- name: ENTRYPOINT_OPTIONS
value: '{"timeout":7200000000000,"grace_period":900000000000,"artifact_dir":"/logs/artifacts","args":["run_gobench.sh"],"container_name":"test","process_log":"/logs/process-log.txt","marker_file":"/logs/marker-file.txt","metadata_file":"/logs/artifacts/metadata.json"}'
image: public.ecr.aws/b7b7j8u3/tidb_gobench:20250205
imagePullPolicy: IfNotPresent
name: test
resources:
limits:
cpu: "8"
requests:
cpu: "7"
terminationMessagePath: /dev/termination-log
terminationMessagePolicy: FallbackToLogsOnError
volumeMounts:
- mountPath: /logs
name: logs
- mountPath: /tools
name: tools
- env:
- name: JOB_SPEC
value: '{"type":"periodic","job":"gobench","buildid":"1891969218946011136","prowjobid":"237d8be0-0aed-4813-bf97-9d4b8027df5c","decoration_config":{"timeout":"2h0m0s","grace_period":"15m0s","utility_images":{"clonerefs":"gcr.io/k8s-prow/clonerefs:v20240503-28485f4e6","initupload":"gcr.io/k8s-prow/initupload:v20240503-28485f4e6","entrypoint":"gcr.io/k8s-prow/entrypoint:v20240503-28485f4e6","sidecar":"gcr.io/k8s-prow/sidecar:v20240503-28485f4e6"},"gcs_configuration":{"bucket":"gs://pingcapprow","path_strategy":"explicit"},"gcs_credentials_secret":"gcs-credentials","github_api_endpoints":["http://ghproxy","https://api.github.com"],"github_app_id":"18927","github_app_private_key_secret":{"name":"github-token","key":"cert"}}}'
- name: SIDECAR_OPTIONS
value: '{"gcs_options":{"items":["/logs/artifacts"],"bucket":"gs://pingcapprow","path_strategy":"explicit","gcs_credentials_file":"/secrets/gcs/service-account.json","dry_run":false},"entries":[{"args":["run_gobench.sh"],"container_name":"test","process_log":"/logs/process-log.txt","marker_file":"/logs/marker-file.txt","metadata_file":"/logs/artifacts/metadata.json"}],"censoring_options":{}}'
image: gcr.io/k8s-prow/sidecar:v20240503-28485f4e6
imagePullPolicy: IfNotPresent
name: sidecar
resources: {}
terminationMessagePath: /dev/termination-log
terminationMessagePolicy: FallbackToLogsOnError
volumeMounts:
- mountPath: /logs
name: logs
- mountPath: /secrets/gcs
name: gcs-credentials
dnsPolicy: ClusterFirst
enableServiceLinks: true
initContainers:
- env:
- name: INITUPLOAD_OPTIONS
value: '{"bucket":"gs://pingcapprow","path_strategy":"explicit","gcs_credentials_file":"/secrets/gcs/service-account.json","dry_run":false}'
- name: JOB_SPEC
value: '{"type":"periodic","job":"gobench","buildid":"1891969218946011136","prowjobid":"237d8be0-0aed-4813-bf97-9d4b8027df5c","decoration_config":{"timeout":"2h0m0s","grace_period":"15m0s","utility_images":{"clonerefs":"gcr.io/k8s-prow/clonerefs:v20240503-28485f4e6","initupload":"gcr.io/k8s-prow/initupload:v20240503-28485f4e6","entrypoint":"gcr.io/k8s-prow/entrypoint:v20240503-28485f4e6","sidecar":"gcr.io/k8s-prow/sidecar:v20240503-28485f4e6"},"gcs_configuration":{"bucket":"gs://pingcapprow","path_strategy":"explicit"},"gcs_credentials_secret":"gcs-credentials","github_api_endpoints":["http://ghproxy","https://api.github.com"],"github_app_id":"18927","github_app_private_key_secret":{"name":"github-token","key":"cert"}}}'
image: gcr.io/k8s-prow/initupload:v20240503-28485f4e6
imagePullPolicy: IfNotPresent
name: initupload
resources: {}
terminationMessagePath: /dev/termination-log
terminationMessagePolicy: FallbackToLogsOnError
volumeMounts:
- mountPath: /secrets/gcs
name: gcs-credentials
- args:
- --copy-mode-only
image: gcr.io/k8s-prow/entrypoint:v20240503-28485f4e6
imagePullPolicy: IfNotPresent
name: place-entrypoint
resources: {}
terminationMessagePath: /dev/termination-log
terminationMessagePolicy: FallbackToLogsOnError
volumeMounts:
- mountPath: /tools
name: tools
nodeSelector:
type: gobench
preemptionPolicy: PreemptLowerPriority
priority: 0
restartPolicy: Never
schedulerName: default-scheduler
securityContext: {}
serviceAccount: default
serviceAccountName: default
terminationGracePeriodSeconds: 1125
tolerations:
- effect: NoExecute
key: node.kubernetes.io/not-ready
operator: Exists
tolerationSeconds: 300
- effect: NoExecute
key: node.kubernetes.io/unreachable
operator: Exists
tolerationSeconds: 300
volumes:
- emptyDir: {}
name: logs
- emptyDir: {}
name: tools
- name: gcs-credentials
secret:
defaultMode: 420
secretName: gcs-credentials
status:
conditions:
- lastProbeTime: null
lastTransitionTime: "2025-02-18T21:53:07Z"
message: '0/12 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/disk-pressure:
}, 2 node(s) didn''t match Pod''s node affinity/selector, 9 Insufficient cpu.
preemption: 0/12 nodes are available: 3 Preemption is not helpful for scheduling,
9 No preemption victims found for incoming pod.'
reason: Unschedulable
status: "False"
type: PodScheduled
phase: Pending
qosClass: Burstable