OSDe2e aws Weather Report 2021-05-15 12:00:26.85473392 +0000 UTC

Share on:

Summary

Job Name Pass Rate More detail
osde2e-prod-aws-e2e-default 80.47% More Detail
osde2e-prod-aws-e2e-middle-imageset 98.75% More Detail
osde2e-prod-aws-e2e-next 90.62% More Detail
osde2e-prod-aws-e2e-oldest-imageset 98.73% More Detail
osde2e-prod-aws-e2e-upgrade-prod-minus-one-to-next 99.37% More Detail
osde2e-prod-aws-e2e-upgrade-prod-minus-three-to-next 99.06% More Detail
osde2e-prod-aws-e2e-upgrade-prod-minus-two-to-next 99.06% More Detail
osde2e-prod-aws-e2e-upgrade-to-latest 99.37% More Detail
osde2e-stage-aws-e2e-default 97.81% More Detail
osde2e-stage-aws-e2e-middle-imageset 98.12% More Detail
osde2e-stage-aws-e2e-next-y 98.73% More Detail
osde2e-stage-aws-e2e-next-z 98.75% More Detail
osde2e-stage-aws-e2e-oldest-imageset 98.73% More Detail
osde2e-stage-aws-e2e-upgrade-to-latest 98.60% More Detail
osde2e-stage-aws-e2e-upgrade-to-latest-z 99.38% More Detail

osde2e-prod-aws-e2e-default

Overall pass rate: 80.47%

Job ID Install Version Upgrade Version Pass Rate Failures
1393295217553051648 4.7.9 27.50%
  • [install] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster
  • [install] [Suite: e2e] Cluster state should have no alerts
  • [install] [Suite: e2e] ImageStreams should exist in the cluster
  • [install] [Suite: e2e] MachineHealthChecks infra MHC should exist
  • [install] [Suite: e2e] MachineHealthChecks should replace unhealthy nodes
  • [install] [Suite: e2e] MachineHealthChecks worker MHC should exist
  • [install] [Suite: e2e] Pods should be Running or Succeeded
  • [install] [Suite: e2e] Pods should not be Failed
  • [install] [Suite: e2e] Routes should be created for Console
  • [install] [Suite: e2e] Routes should be created for oauth
  • [install] [Suite: e2e] Routes should be functioning for Console
  • [install] [Suite: e2e] Routes should be functioning for oauth
  • [install] [Suite: e2e] Storage sc-list should be able to be expanded
  • [install] [Suite: e2e] Storage storage create PVCs
  • [install] [Suite: e2e] Validation Webhook should exist and be running in the cluster
  • [install] [Suite: e2e] Workload (guestbook) should get created in the cluster
  • [install] [Suite: e2e] Workload (redmine) should get created in the cluster
  • [install] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions can create pods with SCCs
  • [install] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include anyuid
  • [install] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include nonroot
  • [install] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions scc-test new SCC does not break pods
  • [install] [Suite: e2e] [OSD] Samesite Cookie Strict Validating samesite cookie should be set for openshift-console OSD managed routes
  • [install] [Suite: e2e] [OSD] Samesite Cookie Strict Validating samesite cookie should be set for openshift-monitoring OSD managed routes
  • [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook dedicated admins can manage customer user identity
  • [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook dedicated admins cannot manage redhat user identity
  • [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook oauth service account can manage customer user identity
  • [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook oauth service account can manage redhat user identity
  • [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-admins cannot manage customer user identity
  • [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-admins cannot manage redhat user identity
  • [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-cluster-admins can manage customer user identity
  • [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-cluster-admins can manage redhat user identity
  • [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook random authenticated user cannot manage customer user identity
  • [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook random authenticated user cannot manage redhat user identity
  • [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook system:admin can manage customer user identity
  • [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook system:admin can manage redhat user identity
  • [install] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Members of SRE groups can manage all namespaces
  • [install] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users can manage all non-privileged namespaces
  • [install] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users cannot manage privileged namespaces
  • [install] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Privileged users can manage all namespaces
  • [install] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook dedicated admins cannot manage privileged namespaces
  • [install] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
  • [install] [Suite: operators] CloudIngressOperator deployment should exist
  • [install] [Suite: operators] CloudIngressOperator deployment should have all desired replicas ready
  • [install] [Suite: operators] CloudIngressOperator rh-api-test cidr block changes should updated the service
  • [install] [Suite: operators] CloudIngressOperator rh-api-test hostname should resolve
  • [install] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret exist under openshift-config namespace
  • [install] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoleBindings should exist
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoles should exist
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion openshift-monitoring/configure-alertmanager-operator should be present and in succeeded state
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator configmaps should exist
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator deployment should exist
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator deployment should have all desired replicas ready
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator roles with prefix should exist
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator serviceAccounts should exist
  • [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
  • [install] [Suite: operators] [OSD] Managed Velero Operator clusterRoleBindings should exist
  • [install] [Suite: operators] [OSD] Managed Velero Operator clusterRoles should exist
  • [install] [Suite: operators] [OSD] Managed Velero Operator configmaps should exist
  • [install] [Suite: operators] [OSD] Managed Velero Operator deployment should exist
  • [install] [Suite: operators] [OSD] Managed Velero Operator deployment should have all desired replicas ready
  • [install] [Suite: operators] [OSD] Managed Velero Operator roleBindings should exist
  • [install] [Suite: operators] [OSD] Managed Velero Operator roles should exist
  • [install] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit BackupStorageLocations
  • [install] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Backups
  • [install] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DeleteBackupRequests
  • [install] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DownloadRequests
  • [install] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeBackups
  • [install] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeRestores
  • [install] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Restore
  • [install] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit RestricRepository
  • [install] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Schedules
  • [install] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit ServerStatusRequests
  • [install] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit VolumeSnapshotLocations
  • [install] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit BackupStorageLocations
  • [install] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Backups
  • [install] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DeleteBackupRequests
  • [install] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DownloadRequests
  • [install] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeBackups
  • [install] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeRestores
  • [install] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Restore
  • [install] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit RestricRepository
  • [install] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Schedules
  • [install] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit ServerStatusRequests
  • [install] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit VolumeSnapshotLocations
  • [install] [Suite: operators] [OSD] Managed Velero Operator velero backups should be complete
  • [install] [Suite: operators] [OSD] Must Gather Operator Operator Upgrade should upgrade from the replaced version
  • [install] [Suite: operators] [OSD] Must Gather Operator as Members of SRE can manage MustGather CRs in openshift-must-gather-operator namespace
  • [install] [Suite: operators] [OSD] Must Gather Operator as Members of osd-devaccess can manage MustGather CRs in openshift-must-gather-operator namespace
  • [install] [Suite: operators] [OSD] Must Gather Operator clusterRoles should exist
  • [install] [Suite: operators] [OSD] Must Gather Operator clusterServiceVersion openshift-must-gather-operator/must-gather-operator should be present and in succeeded state
  • [install] [Suite: operators] [OSD] Must Gather Operator configmaps should exist
  • [install] [Suite: operators] [OSD] Must Gather Operator deployment should exist
  • [install] [Suite: operators] [OSD] Must Gather Operator deployment should have all desired replicas ready
  • [install] [Suite: operators] [OSD] Prune jobs pruner jobs should works builds-pruner should run successfully
  • [install] [Suite: operators] [OSD] Prune jobs pruner jobs should works deployments-pruner should run successfully
  • [install] [Suite: operators] [OSD] RBAC Dedicated Admins SubjectPermission SubjectPermission should have the expected ClusterRoles, ClusterRoleBindings and RoleBindinsg
  • [install] [Suite: operators] [OSD] RBAC Operator Operator Upgrade should upgrade from the replaced version
  • [install] [Suite: operators] [OSD] RBAC Operator clusterRoles should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion openshift-rbac-permissions/rbac-permissions-operator should be present and in succeeded state
  • [install] [Suite: operators] [OSD] RBAC Operator configmaps should exist
  • [install] [Suite: operators] [OSD] RBAC Operator deployment should exist
  • [install] [Suite: operators] [OSD] RBAC Operator deployment should have all desired replicas ready
  • [install] [Suite: operators] [OSD] Splunk Forwarder Operator Operator Upgrade should upgrade from the replaced version
  • [install] [Suite: operators] [OSD] Splunk Forwarder Operator clusterRoleBindings should exist
  • [install] [Suite: operators] [OSD] Splunk Forwarder Operator clusterRoles should exist
  • [install] [Suite: operators] [OSD] Splunk Forwarder Operator clusterServiceVersion openshift-splunk-forwarder-operator/splunk-forwarder-operator should be present and in succeeded state
  • [install] [Suite: operators] [OSD] Splunk Forwarder Operator configmaps should exist
  • [install] [Suite: operators] [OSD] Splunk Forwarder Operator deployment should exist
  • [install] [Suite: operators] [OSD] Splunk Forwarder Operator deployment should have all desired replicas ready
  • [install] [Suite: operators] [OSD] Splunk Forwarder Operator splunkforwarders admin should be able to manage SplunkForwarders CR
  • [install] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed empty node-label daemonset should get created
  • [install] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed infra node daemonset should get created
  • [install] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed worker node daemonset should get created
  • [install] [Suite: service-definition] [OSD] regularuser validating webhook regularuser validating webhook Privledged users allowed to create autoscalers and delete clusterversion objects
1393355687983058944 4.7.9 97.50%
  • [install] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion openshift-monitoring/configure-alertmanager-operator should be present and in succeeded state
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator configmaps should exist
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator deployment should have all desired replicas ready
1393415995208503296 4.7.9 97.50%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion openshift-monitoring/configure-alertmanager-operator should be present and in succeeded state
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator configmaps should exist
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator deployment should have all desired replicas ready
1393174406162812928 4.7.9 99.38%
  • [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services

osde2e-prod-aws-e2e-middle-imageset

Overall pass rate: 98.75%

Job ID Install Version Upgrade Version Pass Rate Failures
1393174406993285120 4.6.20 98.75%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator roles with prefix should exist
  • [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services

osde2e-prod-aws-e2e-next

Overall pass rate: 90.62%

Job ID Install Version Upgrade Version Pass Rate Failures
1393295217578217472 4.7.9 98.12%
  • [install] [Suite: e2e] Cluster state should include Prometheus data
  • [install] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
  • [install] [Suite: operators] [OSD] Must Gather Operator Operator Upgrade should upgrade from the replaced version
1393355688805142528 4.7.9 68.12%
  • [install] [Suite: e2e] Cluster state should have no alerts
  • [install] [Suite: e2e] Cluster state should include Prometheus data
  • [install] [Suite: e2e] ImageStreams should exist in the cluster
  • [install] [Suite: e2e] MachineHealthChecks infra MHC should exist
  • [install] [Suite: e2e] MachineHealthChecks should replace unhealthy nodes
  • [install] [Suite: e2e] MachineHealthChecks worker MHC should exist
  • [install] [Suite: e2e] Routes should be created for Console
  • [install] [Suite: e2e] Routes should be created for oauth
  • [install] [Suite: e2e] Routes should be functioning for Console
  • [install] [Suite: e2e] Routes should be functioning for oauth
  • [install] [Suite: e2e] Validation Webhook should exist and be running in the cluster
  • [install] [Suite: e2e] Workload (redmine) should get created in the cluster
  • [install] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions can create pods with SCCs
  • [install] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include anyuid
  • [install] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include nonroot
  • [install] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions scc-test new SCC does not break pods
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion openshift-monitoring/configure-alertmanager-operator should be present and in succeeded state
  • [install] [Suite: operators] [OSD] Prune jobs pruner jobs should works builds-pruner should run successfully
  • [install] [Suite: operators] [OSD] Prune jobs pruner jobs should works deployments-pruner should run successfully
  • [install] [Suite: operators] [OSD] Splunk Forwarder Operator Operator Upgrade should upgrade from the replaced version
  • [install] [Suite: operators] [OSD] Splunk Forwarder Operator clusterRoleBindings should exist
  • [install] [Suite: operators] [OSD] Splunk Forwarder Operator clusterRoles should exist
  • [install] [Suite: operators] [OSD] Splunk Forwarder Operator clusterServiceVersion openshift-splunk-forwarder-operator/splunk-forwarder-operator should be present and in succeeded state
  • [install] [Suite: operators] [OSD] Splunk Forwarder Operator configmaps should exist
  • [install] [Suite: operators] [OSD] Splunk Forwarder Operator deployment should exist
  • [install] [Suite: operators] [OSD] Splunk Forwarder Operator deployment should have all desired replicas ready
  • [install] [Suite: operators] [OSD] Splunk Forwarder Operator splunkforwarders admin should be able to manage SplunkForwarders CR
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and customer group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with SRE IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with other IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with SRE IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with other IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage customer users with other IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage non-protected redhat users with other IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage protected redhat users with SRE IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with SRE IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with other IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and no group
1393415995736985600 4.7.9 96.88%
  • [install] [Suite: e2e] Cluster state should have no alerts
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion openshift-monitoring/configure-alertmanager-operator should be present and in succeeded state
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator configmaps should exist
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator deployment should have all desired replicas ready
1393174407840534528 4.7.9 99.38%
  • [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services

osde2e-prod-aws-e2e-oldest-imageset

Overall pass rate: 98.73%

Job ID Install Version Upgrade Version Pass Rate Failures
1393174408679395328 4.5.11 98.73%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator roles with prefix should exist
  • [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services

osde2e-prod-aws-e2e-upgrade-prod-minus-one-to-next

Overall pass rate: 99.37%

Job ID Install Version Upgrade Version Pass Rate Failures
1393385819296763904 4.7.9-candidate 4.8.0-fc.3 99.37%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator configmaps should exist

osde2e-prod-aws-e2e-upgrade-prod-minus-three-to-next

Overall pass rate: 99.06%

Job ID Install Version Upgrade Version Pass Rate Failures
1393144192422645760 4.7.8-candidate 4.8.0-fc.3 99.06%
  • [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
  • [upgrade] [Suite: informing] [OSD] User Workload Monitoring User Workload Monitoring has the required prerequisites for testing
  • [upgrade] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services

osde2e-prod-aws-e2e-upgrade-prod-minus-two-to-next

Overall pass rate: 99.06%

Job ID Install Version Upgrade Version Pass Rate Failures
1393083805371207680 4.7.8-candidate 4.8.0-fc.3 99.06%
  • [install] [Suite: e2e] Cluster state should include Prometheus data
  • [upgrade] [Suite: e2e] Cluster state should have no alerts
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Members of SRE groups can manage all namespaces

osde2e-prod-aws-e2e-upgrade-to-latest

Overall pass rate: 99.37%

Job ID Install Version Upgrade Version Pass Rate Failures
1393295218110894080 4.7.9-candidate 4.8.0-fc.3 99.37%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: informing] CloudIngressOperator publishingstrategy-public-private should be able to toggle the default applicationingress from public to private

osde2e-stage-aws-e2e-default

Overall pass rate: 97.81%

Job ID Install Version Upgrade Version Pass Rate Failures
1393355699718721536 4.7.9 99.38%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
1393415999927095296 4.7.9 96.88%
  • [install] [Suite: e2e] Cluster state should have no alerts
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion openshift-monitoring/configure-alertmanager-operator should be present and in succeeded state
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator configmaps should exist
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator deployment should have all desired replicas ready
1393174414543032320 4.7.9 98.75%
  • [install] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users can manage all non-privileged namespaces
  • [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
1393295218924589056 4.7.9 96.25%
  • [install] [Suite: e2e] Cluster state should have no alerts
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion openshift-monitoring/configure-alertmanager-operator should be present and in succeeded state
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator configmaps should exist
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator deployment should have all desired replicas ready
  • [install] [Suite: operators] [OSD] Must Gather Operator Operator Upgrade should upgrade from the replaced version

osde2e-stage-aws-e2e-middle-imageset

Overall pass rate: 98.12%

Job ID Install Version Upgrade Version Pass Rate Failures
1393174415407058944 4.6.21 98.12%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator roles with prefix should exist
  • [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services

osde2e-stage-aws-e2e-next-y

Overall pass rate: 98.73%

Job ID Install Version Upgrade Version Pass Rate Failures
1393295219780227072 4.8.0-fc.3-candidate 98.73%
  • [install] [Suite: operators] [OSD] RBAC Operator Operator Upgrade should upgrade from the replaced version
  • [install] [Suite: operators] [OSD] Splunk Forwarder Operator Operator Upgrade should upgrade from the replaced version
1393355700540805120 4.8.0-fc.3-candidate 98.73%
  • [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
  • [install] [Suite: operators] [OSD] RBAC Operator Operator Upgrade should upgrade from the replaced version
1393416000761761792 4.8.0-fc.3-candidate 97.47%
  • [install] [Suite: e2e] Pods should be Running or Succeeded
  • [install] [Suite: e2e] Pods should not be Failed
  • [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
  • [install] [Suite: operators] [OSD] Must Gather Operator Operator Upgrade should upgrade from the replaced version
1393174416224948224 4.8.0-fc.3-candidate 99.37%
  • [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
1393234819965521920 4.8.0-fc.3-candidate 99.37%
  • [install] [Suite: operators] [OSD] RBAC Operator Operator Upgrade should upgrade from the replaced version

osde2e-stage-aws-e2e-next-z

Overall pass rate: 98.75%

Job ID Install Version Upgrade Version Pass Rate Failures
1393295220602310656 4.7.11-candidate 99.38%
  • [install] [Suite: e2e] Cluster state should include Prometheus data
1393355702222721024 4.7.11-candidate 100.00%
1393416001596428288 4.7.11-candidate 96.88%
  • [install] [Suite: e2e] Pods should be Running or Succeeded
  • [install] [Suite: e2e] Pods should not be Failed
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [install] [Suite: operators] [OSD] OSD Metrics Exporter Basic Test Operator Upgrade should upgrade from the replaced version
  • [install] [Suite: operators] [OSD] RBAC Operator Operator Upgrade should upgrade from the replaced version

osde2e-stage-aws-e2e-oldest-imageset

Overall pass rate: 98.73%

Job ID Install Version Upgrade Version Pass Rate Failures
1393174418745724928 4.5.11 98.73%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator roles with prefix should exist
  • [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services

osde2e-stage-aws-e2e-upgrade-to-latest

Overall pass rate: 98.60%

Job ID Install Version Upgrade Version Pass Rate Failures
1393234821660020736 4.7.9-candidate 4.8.0-fc.3 99.37%
  • [upgrade] [Suite: informing] [OSD] pod validating webhook pod webhook Verify the validation webhook service is running
  • [upgrade] [Suite: operators] [OSD] RBAC Operator Operator Upgrade should upgrade from the replaced version
1393355703061581824 4.7.9-candidate 4.8.0-fc.3 97.82%
  • [install] [Suite: e2e] Storage storage create PVCs
  • [upgrade] [Suite: e2e] Cluster state should include Prometheus data
  • [upgrade] [Suite: e2e] Pods should be Running or Succeeded
  • [upgrade] [Suite: e2e] Pods should not be Failed
  • [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include anyuid
  • [upgrade] [Suite: operators] [OSD] RBAC Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator Operator Upgrade should upgrade from the replaced version

osde2e-stage-aws-e2e-upgrade-to-latest-z

Overall pass rate: 99.38%

Job ID Install Version Upgrade Version Pass Rate Failures
1393295221483114496 4.7.9-candidate 4.7.11 99.38%
  • [upgrade] [Suite: informing] CloudIngressOperator publishingstrategy-public-private should be able to toggle the default applicationingress from public to private
  • [upgrade] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services