Skip to content

Refactor Instance Watcher #6792

Refactor Instance Watcher

Refactor Instance Watcher #6792

Triggered via pull request February 23, 2026 14:08
Status Failure
Total duration 19m 3s
Artifacts 3

ci.yml

on: pull_request
Build Unsigned Snapshot
7m 6s
Build Unsigned Snapshot
Cache Dependencies
0s
Cache Dependencies
Lint
3m 50s
Lint
Vulnerability Scan  /  Vulnerability Check
1m 29s
Vulnerability Scan / Vulnerability Check
Unit Tests
3m 56s
Unit Tests
Unit tests with race condition detection
3m 38s
Unit tests with race condition detection
Matrix: Integration Tests
Matrix: Integration Tests - Official OSS Images
Matrix: Integration Tests - Official Plus Images
Matrix: Metrics Integration Tests - Official OSS Images
Matrix: Metrics Integration Tests - Official Plus Images
Matrix: Upgrade Tests
Fit to window
Zoom out
Zoom in

Annotations

23 errors and 5 warnings
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.SpanLinkCount
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.SpanLinkAttributeCount
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.SpanEventCount
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.SpanEventAttributeCount
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.SpanAttributeValueLength
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.SpanAttributeCount
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.BatchSpanProcessorScheduleDelay
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.BatchSpanProcessorMaxQueueSize
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.BatchSpanProcessorMaxExportBatchSize
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.BatchSpanProcessorExportTimeout
Metrics Integration Tests - Official Plus Images (alpine, 3.22, r35, alpine, /nginx-plus/agent)
The strategy configuration was canceled because "plus-metrics-tests.debian_bookworm_r35_debia" failed
Metrics Integration Tests - Official Plus Images (alpine, 3.21, r34, alpine, /nginx-plus/agent)
The strategy configuration was canceled because "plus-metrics-tests.debian_bookworm_r35_debia" failed
Metrics Integration Tests - Official Plus Images (debian, bookworm, r34, debian, /nginx-plus/agent)
The strategy configuration was canceled because "plus-metrics-tests.debian_bookworm_r35_debia" failed
Integration Tests - Official OSS Images (alpine, mainline, alpine)
Process completed with exit code 2.
Integration Tests - Official OSS Images (bookworm, stable, debian)
The strategy configuration was canceled because "official-oss-image-integration-tests.alpine_mainline_alpine" failed
Integration Tests - Official OSS Images (bookworm, mainline, debian)
The strategy configuration was canceled because "official-oss-image-integration-tests.alpine_mainline_alpine" failed
Integration Tests - Official OSS Images (bookworm, mainline, debian)
Process completed with exit code 2.
Integration Tests - Official Plus Images (debian, bookworm, r34, debian, /nginx-plus/agent)
The strategy configuration was canceled because "official-plus-image-integration-tests.alpine_3_22_r35_alpine__n" failed
Vulnerability Scan / Vulnerability Check
Failed to restore: Cache service responded with 400
The 'as' keyword should match the case of the 'from' keyword: test/docker/load/Dockerfile#L80
FromAsCasing: 'as' and 'FROM' keywords' casing do not match More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/
The 'as' keyword should match the case of the 'from' keyword: test/docker/load/Dockerfile#L58
FromAsCasing: 'as' and 'FROM' keywords' casing do not match More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals: test/docker/load/Dockerfile#L78
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals: test/docker/load/Dockerfile#L56
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/

Artifacts

Produced during runtime
Name Size Digest
load-test-results
384 Bytes
sha256:e51ab05ab1cf5041582d7a7d873a0d5f74f146080c2044a4bc0bbb08f302dee1
nginx-agent-unsigned-snapshots Expired
73.4 MB
sha256:25ed6c2692e1cae978e7652af70d850f5fae5b83492804b35742addcee31787a
nginx~agent~FPG5S9.dockerbuild
305 KB
sha256:dd63e22841683ebb1f9bc6e1e54338d529843c1d1becf80a4b5b16f6edd685c1