OSDe2e gcp Weather Report 2020-10-31 12:00:40.081123889 +0000 UTC
Summary
osde2e-int-gcp-e2e-osd-default-nightly
Overall pass rate: 100.00%
osde2e-int-gcp-e2e-osd-default-plus-one-nightly
Overall pass rate: 100.00%
osde2e-int-gcp-e2e-osd-default-plus-two-nightly
Overall pass rate: 100.00%
osde2e-prod-gcp-e2e-default
Overall pass rate: 33.33%
osde2e-prod-gcp-e2e-next
Overall pass rate: 100.00%
osde2e-prod-gcp-e2e-upgrade-default-next
Overall pass rate: 82.80%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1322448468584697856 |
4.5.11 |
4.5.16 |
100.00% |
|
1322206876904984576 |
4.5.11 |
4.5.16 |
98.79% |
- [Log Metrics] host-dns-lookup
- [upgrade] [Suite: e2e] Storage should be able to be expanded
- [upgrade] [Suite: e2e] Validation Webhook should exist and be running in the cluster
- [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator Operator Upgrade should upgrade from the replaced version
|
1322327712857067520 |
4.5.11 |
4.5.16 |
49.60% |
- [install] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Privileged users can manage all namespaces
- [upgrade] BeforeSuite
|
osde2e-stage-gcp-e2e-default
Overall pass rate: 100.00%
osde2e-stage-gcp-e2e-next-y
Overall pass rate: 100.00%
osde2e-stage-gcp-e2e-next-z
Overall pass rate: 100.00%
osde2e-stage-gcp-e2e-upgrade-default-next-z
Overall pass rate: 93.55%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1322206871041347584 |
4.5.11 |
4.5.16 |
100.00% |
|
1322327707006013440 |
4.5.11 |
4.5.16 |
80.65% |
- [Log Metrics] host-dns-lookup
- [upgrade] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster
- [upgrade] [Suite: e2e] Cluster state should have no alerts
- [upgrade] [Suite: e2e] Cluster state should include Prometheus data
- [upgrade] [Suite: e2e] ImageStreams should exist in the cluster
- [upgrade] [Suite: e2e] Pods should be Running or Succeeded
- [upgrade] [Suite: e2e] Pods should not be Failed
- [upgrade] [Suite: e2e] Validation Webhook should exist and be running in the cluster
- [upgrade] [Suite: e2e] Workload (redmine) should get created in the cluster
- [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Members of SRE groups can manage all namespaces
- [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users can manage all non-privileged namespaces
- [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users cannot manage privileged namespaces
- [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Privileged users can manage all namespaces
- [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook dedicated admins cannot manage privileged namespaces
- [upgrade] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret exist under openshift-config namespace
- [upgrade] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoleBindings should exist
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoles should exist
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator configmaps should exist
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator deployment should exist
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator deployment should have all desired replicas ready
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator roleBindings should exist
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator roles should exist
- [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator Operator Upgrade should upgrade from the replaced version
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and customer group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with SRE IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with other IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with SRE IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with other IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage customer users with other IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage non-protected redhat users with other IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage protected redhat users with SRE IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with SRE IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with other IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and no group
|
1322448461873811456 |
4.5.11 |
4.5.16 |
100.00% |
|