Skip to content

CI: AWS-CNI: pod-to-pod-encryption-v2/pod-to-pod-encryption-v2/curl-ipv4 : Expected to capture packets, but none found. This check might be broken. #37682

@joestringer

Description

@joestringer

CI failure

Failure: https://github.com/cilium/cilium/actions/runs/13339169050/job/37260626000#step:21:275
Hit on PR #37620 (comment) which only changes clustermesh things.

[=] [cilium-test-3] Test [pod-to-pod-encryption-v2] [18/36]
.  [-] Scenario [pod-to-pod-encryption-v2/pod-to-pod-encryption-v2]
  ℹ️  Encryption is disabled: test will fail if plain-text packets are not seen to validates pcap filters are correct
  [.] Action [pod-to-pod-encryption-v2/pod-to-pod-encryption-v2/curl-ipv4: cilium-test-3/client-7b7776c86b-d585x (192.168.110.108) -> cilium-test-3/echo-other-node-7c95b6845f-87sv5 (192.168.110.240:8080)]
  ❌ Expected to capture packets, but none found. This check might be broken.

...

📋 Test Report [cilium-test-3]
❌ 1/19 tests failed (1/125 actions), 17 tests skipped, 0 scenarios skipped:
Test [pod-to-pod-encryption-v2]:
  ❌ pod-to-pod-encryption-v2/pod-to-pod-encryption-v2/curl-ipv4: cilium-test-3/client-7b7776c86b-d585x (192.168.110.108) -> cilium-test-3/echo-other-node-7c95b6845f-87sv5 (192.168.110.240:8080)
🏃[cilium-test-1] Running 7 tests ...

Metadata

Metadata

Assignees

Labels

area/CIContinuous Integration testing issue or flakearea/encryptionImpacts encryption support such as IPSec, WireGuard, or kTLS.ci/flakeThis is a known failure that occurs in the tree. Please investigate me!

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions