OSDe2e aws Weather Report 2020-12-31 12:00:19.167174668 +0000 UTC

Share on:

Summary

Job Name Pass Rate More detail
osde2e-int-aws-e2e-osd-default-plus-one-nightly 0.00% More Detail
osde2e-int-aws-e2e-upgrade-to-latest-z 0.00% More Detail
osde2e-prod-aws-e2e-default 83.09% More Detail
osde2e-prod-aws-e2e-middle-imageset 100.00% More Detail
osde2e-prod-aws-e2e-next 83.33% More Detail
osde2e-prod-aws-e2e-oldest-imageset 99.28% More Detail
osde2e-prod-aws-e2e-upgrade-prod-minus-four-to-next 100.00% More Detail
osde2e-prod-aws-e2e-upgrade-prod-minus-one-to-next 99.82% More Detail
osde2e-prod-aws-e2e-upgrade-prod-minus-three-to-next 0.00% More Detail
osde2e-prod-aws-e2e-upgrade-prod-minus-two-to-next 0.00% More Detail
osde2e-prod-aws-e2e-upgrade-to-latest 57.43% More Detail
osde2e-stage-aws-e2e-default 83.09% More Detail
osde2e-stage-aws-e2e-middle-imageset 0.00% More Detail
osde2e-stage-aws-e2e-next-y 83.33% More Detail
osde2e-stage-aws-e2e-next-z 50.00% More Detail
osde2e-stage-aws-e2e-oldest-imageset 49.64% More Detail
osde2e-stage-aws-e2e-upgrade-to-latest 100.00% More Detail
osde2e-stage-aws-e2e-upgrade-to-latest-z 78.99% More Detail

osde2e-int-aws-e2e-osd-default-plus-one-nightly

Overall pass rate: 0.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1344191614418948096 4.7.0-0.nightly-2020-12-21-160112 0.00%
  • [install] BeforeSuite
1344312413578596352 4.7.0-0.nightly-2020-12-21-160112 0.00%
  • [install] BeforeSuite
1344433251485224960 4.7.0-0.nightly-2020-12-30-221800-nightly 0.00%
  • [install] BeforeSuite

osde2e-int-aws-e2e-upgrade-to-latest-z

Overall pass rate: 0.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1344433250650558464 4.6.8 4.6.9 0.00%
  • [install] BeforeSuite

osde2e-prod-aws-e2e-default

Overall pass rate: 83.09%

Job ID Install Version Upgrade Version Pass Rate Failures
1344312416313282560 4.6.8 100.00%
1344372803243085824 4.6.8 100.00%
1344433254018584576 4.6.8 0.00%
  • [install] BeforeSuite
1344493597801582592 4.6.8 98.55%
  • [install] [Suite: e2e] Cluster state should have no alerts
  • [install] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
1344191616990056448 4.6.8 100.00%
1344252016041398272 4.6.8 100.00%

osde2e-prod-aws-e2e-middle-imageset

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1343889619015438336 4.6.1 100.00%
1344252017794617344 4.6.1 100.00%

osde2e-prod-aws-e2e-next

Overall pass rate: 83.33%

Job ID Install Version Upgrade Version Pass Rate Failures
1344312418624344064 4.6.8 100.00%
  • [Log Metrics] host-dns-lookup
1344372803343749120 4.6.8 0.00%
  • [install] BeforeSuite
1344433256543555584 4.6.9 100.00%
  • [Log Metrics] host-dns-lookup
1344493598132932608 4.6.9 100.00%
1344191619515027456 4.6.8 100.00%
  • [Log Metrics] host-dns-lookup
1344252018574757888 4.6.8 100.00%

osde2e-prod-aws-e2e-oldest-imageset

Overall pass rate: 99.28%

Job ID Install Version Upgrade Version Pass Rate Failures
1343889620726714368 4.4.11 99.28%
  • [install] [Suite: e2e] Pods should be Running or Succeeded
1344252019371675648 4.4.11 99.28%
  • [install] [Suite: e2e] Pods should be Running or Succeeded

osde2e-prod-aws-e2e-upgrade-prod-minus-four-to-next

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1344282207014883328 4.6.1 4.6.8 100.00%

osde2e-prod-aws-e2e-upgrade-prod-minus-one-to-next

Overall pass rate: 99.82%

Job ID Install Version Upgrade Version Pass Rate Failures
1344101004550868992 4.6.6 4.6.8 100.00%
  • [Log Metrics] cluster-mgmt-500
  • [Log Metrics] cluster-mgmt-500
1344463397931978752 4.6.6 4.6.9 99.64%
  • [upgrade] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded

osde2e-prod-aws-e2e-upgrade-prod-minus-three-to-next

Overall pass rate: 0.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1344221805316935680 4.6.3 4.6.8 0.00%
  • [install] BeforeSuite

osde2e-prod-aws-e2e-upgrade-prod-minus-two-to-next

Overall pass rate: 0.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1344161416008962048 4.6.4 4.6.8 0.00%
  • [install] BeforeSuite

osde2e-prod-aws-e2e-upgrade-to-latest

Overall pass rate: 57.43%

Job ID Install Version Upgrade Version Pass Rate Failures
1344493597818359808 4.6.8 4.6.9 65.22%
  • [Log Metrics] host-dns-lookup
  • [upgrade] [Suite: e2e] Cluster state should have no alerts
  • [upgrade] [Suite: e2e] Cluster state should include Prometheus data
  • [upgrade] [Suite: e2e] ImageStreams should exist in the cluster
  • [upgrade] [Suite: e2e] MachineHealthChecks infra MHC should exist
  • [upgrade] [Suite: e2e] MachineHealthChecks should replace unhealthy nodes
  • [upgrade] [Suite: e2e] MachineHealthChecks worker MHC should exist
  • [upgrade] [Suite: e2e] Pods should be Running or Succeeded
  • [upgrade] [Suite: e2e] Pods should not be Failed
  • [upgrade] [Suite: e2e] Routes should be created for Console
  • [upgrade] [Suite: e2e] Routes should be created for oauth
  • [upgrade] [Suite: e2e] Routes should be functioning for Console
  • [upgrade] [Suite: e2e] Routes should be functioning for oauth
  • [upgrade] [Suite: e2e] Storage should be able to be expanded
  • [upgrade] [Suite: e2e] Workload (guestbook) should get created in the cluster
  • [upgrade] [Suite: e2e] Workload (redmine) should get created in the cluster
  • [upgrade] [Suite: e2e] [OSD] Prometheus Exporters should exist and be running in the cluster
  • [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions can create pods with SCCs
  • [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include anyuid
  • [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include nonroot
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Members of SRE groups can manage all namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users can manage all non-privileged namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users cannot manage privileged namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Privileged users can manage all namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook dedicated admins cannot manage privileged namespaces
  • [upgrade] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
  • [upgrade] [Suite: operators] CloudIngressOperator deployment should exist
  • [upgrade] [Suite: operators] CloudIngressOperator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] CloudIngressOperator publishingstrategies cluster admin should be allowed to manage publishingstrategies CR
  • [upgrade] [Suite: operators] CloudIngressOperator publishingstrategies dedicated admin should not be allowed to manage publishingstrategies CR
  • [upgrade] [Suite: operators] CloudIngressOperator rh-api-test cidr block changes should updated the service
  • [upgrade] [Suite: operators] CloudIngressOperator rh-api-test hostname should resolve
  • [upgrade] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret exist under openshift-config namespace
  • [upgrade] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator roleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator roles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit BackupStorageLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Backups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DeleteBackupRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DownloadRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeBackups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeRestores
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Restore
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit RestricRepository
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Schedules
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit ServerStatusRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit VolumeSnapshotLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit BackupStorageLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Backups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DeleteBackupRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DownloadRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeBackups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeRestores
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Restore
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit RestricRepository
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Schedules
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit ServerStatusRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit VolumeSnapshotLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero backups should be complete
  • [upgrade] [Suite: operators] [OSD] RBAC Dedicated Admins SubjectPermission SubjectPermission should have the expected ClusterRoles, ClusterRoleBindings and RoleBindinsg
  • [upgrade] [Suite: operators] [OSD] RBAC Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] RBAC Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: service-definition] [OSD] Privileged Containers Privileged containers are not allowed privileged container should not get created
  • [upgrade] [Suite: service-definition] [OSD] regularuser validating webhook regularuser validating webhook Privledged users allowed to create autoscalers and delete clusterversion objects
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and customer group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage customer users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage non-protected redhat users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage protected redhat users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and no group
1344433255683723264 4.6.8 4.6.9 49.64%
  • [install] [Suite: e2e] Workload (redmine) should get created in the cluster
  • [upgrade] BeforeSuite

osde2e-stage-aws-e2e-default

Overall pass rate: 83.09%

Job ID Install Version Upgrade Version Pass Rate Failures
1344433257369833472 4.6.8 100.00%
1344493598967599104 4.6.8 99.28%
  • [install] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Members of SRE groups can manage all namespaces
1344191621180166144 4.6.8 0.00%
  • [install] BeforeSuite
1344252020210536448 4.6.8 99.28%
  • [Log Metrics] host-dns-lookup
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
1344312419454816256 4.6.8 100.00%
  • [Log Metrics] host-dns-lookup
1344372803377303552 4.6.8 100.00%

osde2e-stage-aws-e2e-middle-imageset

Overall pass rate: 0.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1343889624107323392 4.5.22-fast 0.00%
  • [install] BeforeSuite
1344252022727118848 4.5.22-fast 0.00%
  • [install] BeforeSuite

osde2e-stage-aws-e2e-next-y

Overall pass rate: 83.33%

Job ID Install Version Upgrade Version Pass Rate Failures
1344191624531415040 4.7.0-fc.0-candidate 0.00%
  • [install] BeforeSuite
1344252024396451840 4.7.0-fc.0-candidate 100.00%
  • [Log Metrics] host-dns-lookup
1344312422806065152 4.7.0-fc.0-candidate 100.00%
  • [Log Metrics] host-dns-lookup
1344372806221041664 4.7.0-fc.0-candidate 100.00%
1344433260712693760 4.7.0-fc.0-candidate 100.00%
  • [Log Metrics] host-dns-lookup
1344493602327236608 4.7.0-fc.0-candidate 100.00%

osde2e-stage-aws-e2e-next-z

Overall pass rate: 50.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1344191623696748544 4.6.9-candidate 0.00%
  • [install] BeforeSuite
1344252023641477120 4.6.9-candidate 0.00%
  • [install] BeforeSuite
1344312421979787264 4.6.9-candidate 100.00%
1344372805386375168 4.6.9-candidate 100.00%

osde2e-stage-aws-e2e-oldest-imageset

Overall pass rate: 49.64%

Job ID Install Version Upgrade Version Pass Rate Failures
1343889626569379840 4.4.11-fast 0.00%
  • [install] BeforeSuite
1344252025235312640 4.4.11-fast 99.28%
  • [install] [Suite: e2e] Pods should be Running or Succeeded

osde2e-stage-aws-e2e-upgrade-to-latest

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1344493600649515008 4.6.8 4.6.9 100.00%
1344433259034972160 4.6.8 4.6.9 100.00%
  • [Log Metrics] host-dns-lookup
  • [Log Metrics] host-dns-lookup

osde2e-stage-aws-e2e-upgrade-to-latest-z

Overall pass rate: 78.99%

Job ID Install Version Upgrade Version Pass Rate Failures
1344493599810654208 4.6.8 4.6.9 78.99%
  • [Log Metrics] host-dns-lookup
  • [upgrade] [Suite: e2e] Pods should be Running or Succeeded
  • [upgrade] [Suite: e2e] Pods should not be Failed
  • [upgrade] [Suite: e2e] Storage should be able to be expanded
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Members of SRE groups can manage all namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users can manage all non-privileged namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users cannot manage privileged namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Privileged users can manage all namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook dedicated admins cannot manage privileged namespaces
  • [upgrade] [Suite: operators] CloudIngressOperator rh-api-test cidr block changes should updated the service
  • [upgrade] [Suite: operators] CloudIngressOperator rh-api-test hostname should resolve
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator roleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator roles should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator serviceAccounts should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator roleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator roles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit BackupStorageLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Backups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DeleteBackupRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DownloadRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeBackups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeRestores
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Restore
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit RestricRepository
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Schedules
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit ServerStatusRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit VolumeSnapshotLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit BackupStorageLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Backups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DeleteBackupRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DownloadRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeBackups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeRestores
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Restore
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit RestricRepository
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Schedules
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit ServerStatusRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit VolumeSnapshotLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero backups should be complete
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator clusterServiceVersion should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator splunkforwarders admin should be able to manage SplunkForwarders CR