OSDe2e aws Weather Report 2021-02-24 12:00:24.508741542 +0000 UTC

Share on:

Summary

Job Name Pass Rate More detail
osde2e-prod-aws-e2e-default 99.74% More Detail
osde2e-prod-aws-e2e-middle-imageset 99.70% More Detail
osde2e-prod-aws-e2e-next 96.67% More Detail
osde2e-prod-aws-e2e-oldest-imageset 99.70% More Detail
osde2e-prod-aws-e2e-upgrade-prod-minus-one-to-next 89.55% More Detail
osde2e-prod-aws-e2e-upgrade-prod-minus-three-to-next 99.39% More Detail
osde2e-prod-aws-e2e-upgrade-to-latest 85.39% More Detail
osde2e-stage-aws-e2e-default 90.48% More Detail
osde2e-stage-aws-e2e-middle-imageset 90.48% More Detail
osde2e-stage-aws-e2e-oldest-imageset 90.48% More Detail
osde2e-stage-aws-e2e-upgrade-to-latest 90.48% More Detail
osde2e-stage-aws-e2e-upgrade-to-latest-z 90.48% More Detail

osde2e-prod-aws-e2e-default

Overall pass rate: 99.74%

Job ID Install Version Upgrade Version Pass Rate Failures
1364243800498638848 4.6.17 99.39%
  • [Log Metrics] host-dns-lookup
  • [install] [Suite: e2e] Cluster state should have no alerts
1364304179681562624 4.6.17 100.00%
1364364636102594560 4.6.17 100.00%
1364425038014451712 4.6.17 100.00%
1364485454002393088 4.6.17 99.39%
  • [Log Metrics] host-dns-lookup
  • [install] [Suite: e2e] Cluster state should have no alerts
1364122993126543360 4.6.17 100.00%
1364183397802446848 4.6.17 99.39%
  • [Log Metrics] host-dns-lookup
  • [install] [Suite: e2e] Cluster state should have no alerts

osde2e-prod-aws-e2e-middle-imageset

Overall pass rate: 99.70%

Job ID Install Version Upgrade Version Pass Rate Failures
1364183399484362752 4.6.6 100.00%
1363820995940454400 4.6.6 99.39%
  • [install] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster

osde2e-prod-aws-e2e-next

Overall pass rate: 96.67%

Job ID Install Version Upgrade Version Pass Rate Failures
1364122995651514368 4.6.17 90.48%
  • [BeforeSuite] cluster-health-check
  • BeforeSuite
1364183400314834944 4.6.17 100.00%
1364243803866664960 4.6.17 97.58%
  • [install] [Suite: e2e] Cluster state should have no alerts
  • [install] [Suite: e2e] Cluster state should include Prometheus data
  • [install] [Suite: e2e] Pods should be Running or Succeeded
  • [install] [Suite: e2e] Pods should not be Failed
1364304179794808832 4.6.17 100.00%
1364364639441260544 4.6.17 100.00%
1364425038073171968 4.6.17 98.18%
  • [Log Metrics] host-dns-lookup
  • [install] [Suite: e2e] Cluster state should include Prometheus data
  • [install] [Suite: e2e] Pods should be Running or Succeeded
  • [install] [Suite: e2e] Pods should not be Failed
1364485456514781184 4.6.17 90.48%
  • [BeforeSuite] cluster-health-check
  • BeforeSuite

osde2e-prod-aws-e2e-oldest-imageset

Overall pass rate: 99.70%

Job ID Install Version Upgrade Version Pass Rate Failures
1364183401157890048 4.5.11 100.00%
1363820997618176000 4.5.11 99.39%
  • [install] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster

osde2e-prod-aws-e2e-upgrade-prod-minus-one-to-next

Overall pass rate: 89.55%

Job ID Install Version Upgrade Version Pass Rate Failures
1364032369840885760 4.6.17-fast 4.6.18 79.09%
  • [Log Metrics] host-dns-lookup
  • [Log Metrics] host-dns-lookup
  • [upgrade] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster
  • [upgrade] [Suite: e2e] Cluster state should have no alerts
  • [upgrade] [Suite: e2e] Cluster state should include Prometheus data
  • [upgrade] [Suite: e2e] ImageStreams should exist in the cluster
  • [upgrade] [Suite: e2e] Routes should be created for Console
  • [upgrade] [Suite: e2e] Routes should be created for oauth
  • [upgrade] [Suite: e2e] Routes should be functioning for Console
  • [upgrade] [Suite: e2e] Routes should be functioning for oauth
  • [upgrade] [Suite: e2e] Validation Webhook should exist and be running in the cluster
  • [upgrade] [Suite: e2e] Workload (guestbook) should get created in the cluster
  • [upgrade] [Suite: e2e] [OSD] Prometheus Exporters should exist and be running in the cluster
  • [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions can create pods with SCCs
  • [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include anyuid
  • [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include nonroot
  • [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions scc-test new SCC does not break pods
  • [upgrade] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
  • [upgrade] [Suite: operators] CloudIngressOperator apischeme apischemes CR instance must be present on cluster
  • [upgrade] [Suite: operators] CloudIngressOperator apischeme cluster admin should be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] CloudIngressOperator apischeme dedicated admin should not be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] CloudIngressOperator rh-api-test cidr block changes should updated the service
  • [upgrade] [Suite: operators] CloudIngressOperator rh-api-test hostname should resolve
  • [upgrade] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret exist under openshift-config namespace
  • [upgrade] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator roleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator roles should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator serviceAccounts should exist
  • [upgrade] [Suite: operators] [OSD] Must Gather Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Must Gather Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Must Gather Operator clusterServiceVersion should exist
  • [upgrade] [Suite: operators] [OSD] Must Gather Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Must Gather Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Must Gather Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] RBAC Dedicated Admins SubjectPermission SubjectPermission should have the expected ClusterRoles, ClusterRoleBindings and RoleBindinsg
  • [upgrade] [Suite: operators] [OSD] RBAC Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] RBAC Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and customer group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage customer users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage non-protected redhat users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage protected redhat users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and no group
1364394768565538816 4.6.17-fast 4.6.18 100.00%

osde2e-prod-aws-e2e-upgrade-prod-minus-three-to-next

Overall pass rate: 99.39%

Job ID Install Version Upgrade Version Pass Rate Failures
1364153184494292992 4.6.16-fast 4.6.18 99.39%
  • [BeforeSuite] cluster-retrieval OCM error
  • [BeforeSuite] cluster-retrieval OCM error

osde2e-prod-aws-e2e-upgrade-to-latest

Overall pass rate: 85.39%

Job ID Install Version Upgrade Version Pass Rate Failures
1364183398666473472 4.6.17-fast 4.6.18 100.00%
1364243803061358592 4.6.17-fast 4.6.18 73.03%
  • [Log Metrics] host-dns-lookup
  • [upgrade] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster
  • [upgrade] [Suite: e2e] Cluster state should have no alerts
  • [upgrade] [Suite: e2e] Cluster state should include Prometheus data
  • [upgrade] [Suite: e2e] ImageStreams should exist in the cluster
  • [upgrade] [Suite: e2e] Validation Webhook should exist and be running in the cluster
  • [upgrade] [Suite: e2e] Workload (guestbook) should get created in the cluster
  • [upgrade] [Suite: e2e] Workload (redmine) should get created in the cluster
  • [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions can create pods with SCCs
  • [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include anyuid
  • [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include nonroot
  • [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions scc-test new SCC does not break pods
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Members of SRE groups can manage all namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users can manage all non-privileged namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users cannot manage privileged namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Privileged users can manage all namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook dedicated admins cannot manage privileged namespaces
  • [upgrade] [Suite: operators] CloudIngressOperator apischeme apischemes CR instance must be present on cluster
  • [upgrade] [Suite: operators] CloudIngressOperator apischeme cluster admin should be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] CloudIngressOperator apischeme dedicated admin should not be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] CloudIngressOperator deployment should exist
  • [upgrade] [Suite: operators] CloudIngressOperator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] CloudIngressOperator publishingstrategies cluster admin should be allowed to manage publishingstrategies CR
  • [upgrade] [Suite: operators] CloudIngressOperator publishingstrategies dedicated admin should not be allowed to manage publishingstrategies CR
  • [upgrade] [Suite: operators] CloudIngressOperator rh-api-test cidr block changes should updated the service
  • [upgrade] [Suite: operators] CloudIngressOperator rh-api-test hostname should resolve
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator roleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator roles should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator serviceAccounts should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator roleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator roles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit BackupStorageLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Backups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DeleteBackupRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DownloadRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeBackups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeRestores
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Restore
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit RestricRepository
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Schedules
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit ServerStatusRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit VolumeSnapshotLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit BackupStorageLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Backups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DeleteBackupRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DownloadRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeBackups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeRestores
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Restore
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit RestricRepository
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Schedules
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit ServerStatusRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit VolumeSnapshotLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero backups should be complete
  • [upgrade] [Suite: operators] [OSD] Must Gather Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Must Gather Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Must Gather Operator clusterServiceVersion should exist
  • [upgrade] [Suite: operators] [OSD] Must Gather Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Must Gather Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Must Gather Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works builds-pruner should run successfully
  • [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works deployments-pruner should run successfully
  • [upgrade] [Suite: operators] [OSD] RBAC Dedicated Admins SubjectPermission SubjectPermission should have the expected ClusterRoles, ClusterRoleBindings and RoleBindinsg
  • [upgrade] [Suite: operators] [OSD] RBAC Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] RBAC Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator clusterServiceVersion should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator splunkforwarders admin should be able to manage SplunkForwarders CR
  • [upgrade] [Suite: service-definition] [OSD] Privileged Containers Privileged containers are not allowed privileged container should not get created
1364425038043811840 4.6.17-fast 4.6.18 100.00%
1364485455675920384 4.6.17-fast 4.6.18 60.00%
  • [Log Metrics] host-dns-lookup
  • [upgrade] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster
  • [upgrade] [Suite: e2e] Cluster state should have no alerts
  • [upgrade] [Suite: e2e] Cluster state should include Prometheus data
  • [upgrade] [Suite: e2e] ImageStreams should exist in the cluster
  • [upgrade] [Suite: e2e] MachineHealthChecks infra MHC should exist
  • [upgrade] [Suite: e2e] MachineHealthChecks should replace unhealthy nodes
  • [upgrade] [Suite: e2e] MachineHealthChecks worker MHC should exist
  • [upgrade] [Suite: e2e] Pods should be Running or Succeeded
  • [upgrade] [Suite: e2e] Pods should not be Failed
  • [upgrade] [Suite: e2e] Routes should be created for Console
  • [upgrade] [Suite: e2e] Routes should be created for oauth
  • [upgrade] [Suite: e2e] Routes should be functioning for Console
  • [upgrade] [Suite: e2e] Routes should be functioning for oauth
  • [upgrade] [Suite: e2e] Storage should be able to be expanded
  • [upgrade] [Suite: e2e] Validation Webhook should exist and be running in the cluster
  • [upgrade] [Suite: e2e] Workload (guestbook) should get created in the cluster
  • [upgrade] [Suite: e2e] Workload (redmine) should get created in the cluster
  • [upgrade] [Suite: e2e] [OSD] Prometheus Exporters should exist and be running in the cluster
  • [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions can create pods with SCCs
  • [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include anyuid
  • [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include nonroot
  • [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions scc-test new SCC does not break pods
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook dedicated admins can manage customer user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook dedicated admins cannot manage redhat user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook oauth service account can manage customer user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook oauth service account can manage redhat user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-admins cannot manage customer user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-admins cannot manage redhat user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-cluster-admins can manage customer user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-cluster-admins can manage redhat user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook random authenticated user cannot manage customer user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook random authenticated user cannot manage redhat user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook system:admin can manage customer user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook system:admin can manage redhat user identity
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Members of SRE groups can manage all namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users can manage all non-privileged namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users cannot manage privileged namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Privileged users can manage all namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook dedicated admins cannot manage privileged namespaces
  • [upgrade] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
  • [upgrade] [Suite: operators] AlertmanagerInhibitions should exist
  • [upgrade] [Suite: operators] CloudIngressOperator apischeme apischemes CR instance must be present on cluster
  • [upgrade] [Suite: operators] CloudIngressOperator apischeme cluster admin should be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] CloudIngressOperator apischeme dedicated admin should not be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] CloudIngressOperator publishingstrategies cluster admin should be allowed to manage publishingstrategies CR
  • [upgrade] [Suite: operators] CloudIngressOperator publishingstrategies dedicated admin should not be allowed to manage publishingstrategies CR
  • [upgrade] [Suite: operators] CloudIngressOperator rh-api-test cidr block changes should updated the service
  • [upgrade] [Suite: operators] CloudIngressOperator rh-api-test hostname should resolve
  • [upgrade] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret exist under openshift-config namespace
  • [upgrade] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator roleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator roles should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator serviceAccounts should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator roleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator roles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit BackupStorageLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Backups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DeleteBackupRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DownloadRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeBackups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeRestores
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Restore
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit RestricRepository
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Schedules
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit ServerStatusRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit VolumeSnapshotLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit BackupStorageLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Backups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DeleteBackupRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DownloadRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeBackups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeRestores
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Restore
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit RestricRepository
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Schedules
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit ServerStatusRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit VolumeSnapshotLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero backups should be complete
  • [upgrade] [Suite: operators] [OSD] Must Gather Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] RBAC Dedicated Admins SubjectPermission SubjectPermission should have the expected ClusterRoles, ClusterRoleBindings and RoleBindinsg
  • [upgrade] [Suite: operators] [OSD] RBAC Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] RBAC Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator clusterServiceVersion should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator splunkforwarders admin should be able to manage SplunkForwarders CR
  • [upgrade] [Suite: service-definition] [OSD] NodeLabels Modifying nodeLabels is not allowed node-label cannot be added
  • [upgrade] [Suite: service-definition] [OSD] Privileged Containers Privileged containers are not allowed privileged container should not get created
  • [upgrade] [Suite: service-definition] [OSD] regularuser validating webhook regularuser validating webhook Privledged users allowed to create autoscalers and delete clusterversion objects
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and customer group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage customer users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage non-protected redhat users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage protected redhat users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and no group
1364122994804264960 4.6.17-fast 4.6.18 93.94%
  • [Log Metrics] host-dns-lookup
  • [upgrade] [Suite: e2e] Storage should be able to be expanded
  • [upgrade] [Suite: e2e] Workload (redmine) should get created in the cluster
  • [upgrade] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
  • [upgrade] [Suite: operators] CloudIngressOperator publishingstrategies cluster admin should be allowed to manage publishingstrategies CR
  • [upgrade] [Suite: operators] CloudIngressOperator publishingstrategies dedicated admin should not be allowed to manage publishingstrategies CR
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator roleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator roles should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator serviceAccounts should exist
  • [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works builds-pruner should run successfully
  • [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works deployments-pruner should run successfully
  • [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed empty node-label daemonset should get created
  • [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed infra node daemonset should get created
  • [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed worker node daemonset should get created

osde2e-stage-aws-e2e-default

Overall pass rate: 90.48%

Job ID Install Version Upgrade Version Pass Rate Failures
1364183402848194560 4.6.17 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite
1364243805531803648 4.6.17 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite
1364304179815780352 4.6.17 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite
1364364641110593536 4.6.17 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite
1364425038534545408 4.6.17 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite
1364485457362030592 4.6.17 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite
1364122996481986560 4.6.17 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite

osde2e-stage-aws-e2e-middle-imageset

Overall pass rate: 90.48%

Job ID Install Version Upgrade Version Pass Rate Failures
1363821001812480000 4.6.6 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite
1364183405347999744 4.6.6 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite

osde2e-stage-aws-e2e-oldest-imageset

Overall pass rate: 90.48%

Job ID Install Version Upgrade Version Pass Rate Failures
1363821004324868096 4.4.16 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite
1364183407860387840 4.4.16 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite

osde2e-stage-aws-e2e-upgrade-to-latest

Overall pass rate: 90.48%

Job ID Install Version Upgrade Version Pass Rate Failures
1364243809721913344 4.6.17-candidate 4.7.0 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite
1364304181149569024 4.6.17-candidate 4.7.0 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite
1364364643631370240 4.6.17-candidate 4.7.0 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite
1364425040174518272 4.6.17-candidate 4.7.0 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite
1364485459085889536 4.6.17-candidate 4.7.0 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite
1364122998168096768 4.6.17-candidate 4.7.0 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite
1364183404509138944 4.6.17-candidate 4.7.0 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite

osde2e-stage-aws-e2e-upgrade-to-latest-z

Overall pass rate: 90.48%

Job ID Install Version Upgrade Version Pass Rate Failures
1364364641966231552 4.6.17-candidate 4.6.18 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite
1364425039365017600 4.6.17-candidate 4.6.18 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite
1364485458196697088 4.6.17-candidate 4.6.18 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite
1364122997312458752 4.6.17-candidate 4.6.18 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite
1364183403674472448 4.6.17-candidate 4.6.18 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite
1364243808048386048 4.6.17-candidate 4.6.18 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite
1364304180314902528 4.6.17-candidate 4.6.18 90.48%
  • [BeforeSuite] cluster-setup
  • BeforeSuite