OSDe2e gcp Weather Report 2020-11-04 12:06:32.876809434 +0000 UTC
Summary
osde2e-int-gcp-e2e-osd-default-nightly
Overall pass rate: 98.06%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1323656367088603136 |
4.5.0-0.nightly-2020-10-31-200727 |
|
99.19% |
- [install] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users can manage all non-privileged namespaces
|
1323777095620366336 |
4.5.0-0.nightly-2020-11-02-080846 |
|
96.92% |
- [install] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage apischemes CR
- [install] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage publishingstrategies CR
- [install] [Suite: operators] [OSD] Cloud Ingress Operator deployment should exist
- [install] [Suite: operators] [OSD] Cloud Ingress Operator deployment should have all desired replicas ready
|
osde2e-int-gcp-e2e-osd-default-plus-one-nightly
Overall pass rate: 97.31%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1323656368665661440 |
4.6.0-0.nightly-2020-11-02-081936 |
|
100.00% |
|
1323777097302282240 |
4.6.0-0.nightly-2020-11-03-172112 |
|
94.62% |
- [install] [Suite: e2e] Cluster state should have no alerts
- [install] [Suite: e2e] Pods should be Running or Succeeded
- [install] [Suite: e2e] Workload (redmine) should get created in the cluster
- [install] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage apischemes CR
- [install] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage publishingstrategies CR
- [install] [Suite: operators] [OSD] Cloud Ingress Operator deployment should exist
- [install] [Suite: operators] [OSD] Cloud Ingress Operator deployment should have all desired replicas ready
|
osde2e-prod-gcp-e2e-default
Overall pass rate: 64.10%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1323777109109248000 |
4.5.11 |
|
96.15% |
- [install] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage apischemes CR
- [install] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage publishingstrategies CR
- [install] [Suite: operators] [OSD] Cloud Ingress Operator deployment should exist
- [install] [Suite: operators] [OSD] Cloud Ingress Operator deployment should have all desired replicas ready
- [install] [Suite: operators] [OSD] Splunk Forwarder Operator Operator Upgrade should upgrade from the replaced version
|
1323897803692314624 |
4.5.11 |
|
96.15% |
- [install] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
- [install] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage apischemes CR
- [install] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage publishingstrategies CR
- [install] [Suite: operators] [OSD] Cloud Ingress Operator deployment should exist
- [install] [Suite: operators] [OSD] Cloud Ingress Operator deployment should have all desired replicas ready
|
1323656380422295552 |
4.5.11 |
|
0.00% |
|
osde2e-prod-gcp-e2e-next
Overall pass rate: 98.46%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1323656382083239936 |
4.6.1 |
|
100.00% |
|
1323777110724055040 |
4.6.1 |
|
96.92% |
- [install] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage apischemes CR
- [install] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage publishingstrategies CR
- [install] [Suite: operators] [OSD] Cloud Ingress Operator deployment should exist
- [install] [Suite: operators] [OSD] Cloud Ingress Operator deployment should have all desired replicas ready
|
osde2e-prod-gcp-e2e-upgrade-default-next
Overall pass rate: 89.11%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1323535588552347648 |
4.5.11 |
4.5.16 |
100.00% |
|
1323656381248573440 |
4.5.11 |
4.5.16 |
78.23% |
- [Log Metrics] host-dns-lookup
- [upgrade] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster
- [upgrade] [Suite: e2e] MachineHealthChecks should exist
- [upgrade] [Suite: e2e] MachineHealthChecks should replace unhealthy nodes
- [upgrade] [Suite: e2e] Workload (redmine) should get created in the cluster
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook dedicated admins can manage customer user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook dedicated admins cannot manage redhat user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook oauth service account can manage customer user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook oauth service account can manage redhat user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-admins cannot manage customer user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-admins cannot manage redhat user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-cluster-admins can manage customer user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-cluster-admins can manage redhat user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook random authenticated user cannot manage customer user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook random authenticated user cannot manage redhat user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook system:admin can manage customer user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook system:admin can manage redhat user identity
- [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Members of SRE groups can manage all namespaces
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoleBindings should exist
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoles should exist
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator configmaps should exist
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator deployment should exist
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator deployment should have all desired replicas ready
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator roleBindings should exist
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator roles should exist
- [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works builds-pruner should run successfully
- [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works deployments-pruner should run successfully
- [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works image-pruner should run successfully
- [upgrade] [Suite: operators] [OSD] RBAC Operator Operator Upgrade should upgrade from the replaced version
- [upgrade] [Suite: service-definition] [OSD] regularuser validating webhook regularuser validating webhook unpriv users cannot create autoscalers
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and customer group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with SRE IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with other IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with SRE IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with other IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage customer users with other IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage non-protected redhat users with other IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage protected redhat users with SRE IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with SRE IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with other IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and no group
|
osde2e-stage-gcp-e2e-default
Overall pass rate: 98.46%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1323656373703020544 |
4.5.11 |
|
100.00% |
|
1323777102406750208 |
4.5.11 |
|
96.92% |
- [install] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage apischemes CR
- [install] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage publishingstrategies CR
- [install] [Suite: operators] [OSD] Cloud Ingress Operator deployment should exist
- [install] [Suite: operators] [OSD] Cloud Ingress Operator deployment should have all desired replicas ready
|
osde2e-stage-gcp-e2e-next-y
Overall pass rate: 98.46%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1323656376223797248 |
4.6.1 |
|
100.00% |
|
1323777104868806656 |
4.6.1 |
|
96.92% |
- [install] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage apischemes CR
- [install] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage publishingstrategies CR
- [install] [Suite: operators] [OSD] Cloud Ingress Operator deployment should exist
- [install] [Suite: operators] [OSD] Cloud Ingress Operator deployment should have all desired replicas ready
|
osde2e-stage-gcp-e2e-next-z
Overall pass rate: 98.46%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1323656377083629568 |
4.5.17-candidate |
|
100.00% |
|
1323777105699278848 |
4.5.17-candidate |
|
96.92% |
- [install] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage apischemes CR
- [install] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage publishingstrategies CR
- [install] [Suite: operators] [OSD] Cloud Ingress Operator deployment should exist
- [install] [Suite: operators] [OSD] Cloud Ingress Operator deployment should have all desired replicas ready
|
osde2e-stage-gcp-e2e-upgrade-default-next-z
Overall pass rate: 100.00%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1323656375401713664 |
4.5.11 |
4.5.16 |
100.00% |
|