Skip to content

Refactor Instance Watcher #6791

Refactor Instance Watcher

Refactor Instance Watcher #6791

Triggered via pull request February 23, 2026 13:58
Status Failure
Total duration 16m 35s
Artifacts 3

ci.yml

on: pull_request
Build Unsigned Snapshot
4m 27s
Build Unsigned Snapshot
Cache Dependencies
0s
Cache Dependencies
Lint
3m 38s
Lint
Vulnerability Scan  /  Vulnerability Check
1m 29s
Vulnerability Scan / Vulnerability Check
Unit Tests
3m 42s
Unit Tests
Unit tests with race condition detection
3m 58s
Unit tests with race condition detection
Matrix: Integration Tests
Matrix: Integration Tests - Official OSS Images
Matrix: Integration Tests - Official Plus Images
Matrix: Metrics Integration Tests - Official OSS Images
Matrix: Metrics Integration Tests - Official Plus Images
Matrix: Upgrade Tests
Fit to window
Zoom out
Zoom in

Annotations

18 errors and 5 warnings
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.SpanLinkCount
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.SpanLinkAttributeCount
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.SpanEventCount
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.SpanEventAttributeCount
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.SpanAttributeValueLength
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.SpanAttributeCount
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.BatchSpanProcessorScheduleDelay
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.BatchSpanProcessorMaxQueueSize
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.BatchSpanProcessorMaxExportBatchSize
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.BatchSpanProcessorExportTimeout
Unit Tests
Process completed with exit code 2.
Integration Tests - Official OSS Images (bookworm, stable, debian)
Process completed with exit code 2.
Integration Tests - Official OSS Images (alpine, stable, alpine)
The strategy configuration was canceled because "official-oss-image-integration-tests.bookworm_stable_debian" failed
Integration Tests - Official OSS Images (alpine, stable, alpine)
The operation was canceled.
Integration Tests - Official OSS Images (alpine, mainline, alpine)
The strategy configuration was canceled because "official-oss-image-integration-tests.bookworm_stable_debian" failed
Integration Tests - Official OSS Images (alpine, mainline, alpine)
The operation was canceled.
Integration Tests - Official OSS Images (bookworm, mainline, debian)
The strategy configuration was canceled because "official-oss-image-integration-tests.bookworm_stable_debian" failed
Integration Tests - Official OSS Images (bookworm, mainline, debian)
The operation was canceled.
Vulnerability Scan / Vulnerability Check
Failed to restore: Cache service responded with 400
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals: test/docker/load/Dockerfile#L56
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/
The 'as' keyword should match the case of the 'from' keyword: test/docker/load/Dockerfile#L80
FromAsCasing: 'as' and 'FROM' keywords' casing do not match More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/
The 'as' keyword should match the case of the 'from' keyword: test/docker/load/Dockerfile#L58
FromAsCasing: 'as' and 'FROM' keywords' casing do not match More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals: test/docker/load/Dockerfile#L78
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/

Artifacts

Produced during runtime
Name Size Digest
load-test-results
385 Bytes
sha256:b27cbc883c3e79fdb6f8d67113da13487f54a84b2729bd0a2337b0c3e435115d
nginx-agent-unsigned-snapshots Expired
73.4 MB
sha256:c272ae525f19bfd6419855a004779cfdd365718e37cca76dd635f9ffbd59fcfb
nginx~agent~NKDWEM.dockerbuild
312 KB
sha256:a85a4d536031180fe020613afb157efa34a2d8d061bce67df5e90f0d98735c65