OSDe2e gcp Weather Report 2021-02-02 12:00:22.838386988 +0000 UTC

Share on:

Summary

Job Name Pass Rate More detail
osde2e-int-gcp-e2e-upgrade-to-latest-z 0.00% More Detail
osde2e-prod-gcp-e2e-default 100.00% More Detail
osde2e-prod-gcp-e2e-next 100.00% More Detail
osde2e-prod-gcp-e2e-upgrade-to-latest-z 85.69% More Detail
osde2e-stage-gcp-e2e-default 98.55% More Detail
osde2e-stage-gcp-e2e-next-y 98.37% More Detail
osde2e-stage-gcp-e2e-next-z 98.37% More Detail

osde2e-int-gcp-e2e-upgrade-to-latest-z

Overall pass rate: 0.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1356150445596217344 4.6.8 4.6.13 0.00%
  • [install] BeforeSuite

osde2e-prod-gcp-e2e-default

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1356150455662546944 4.6.8 100.00%
1356271261273034752 4.6.8 100.00%
1356392119140356096 4.6.13 100.00%
1356512712393232384 4.6.13 100.00%

osde2e-prod-gcp-e2e-next

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1356150458179129344 4.6.13 100.00%
1356271263785422848 4.6.13 100.00%
1356392122495799296 4.6.13 100.00%
1356512714914009088 4.6.13 100.00%

osde2e-prod-gcp-e2e-upgrade-to-latest-z

Overall pass rate: 85.69%

Job ID Install Version Upgrade Version Pass Rate Failures
1356150457344462848 4.6.8 4.6.13 100.00%
1356271262963339264 4.6.8 4.6.13 71.38%
  • [Log Metrics] host-dns-lookup
  • [upgrade] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster
  • [upgrade] [Suite: e2e] ImageStreams should exist in the cluster
  • [upgrade] [Suite: e2e] Pods should be Running or Succeeded
  • [upgrade] [Suite: e2e] Pods should not be Failed
  • [upgrade] [Suite: e2e] Workload (guestbook) should get created in the cluster
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Members of SRE groups can manage all namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users can manage all non-privileged namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users cannot manage privileged namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Privileged users can manage all namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook dedicated admins cannot manage privileged namespaces
  • [upgrade] [Suite: operators] CloudIngressOperator deployment should exist
  • [upgrade] [Suite: operators] CloudIngressOperator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] CloudIngressOperator rh-api-test cidr block changes should updated the service
  • [upgrade] [Suite: operators] CloudIngressOperator rh-api-test hostname should resolve
  • [upgrade] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret exist under openshift-config namespace
  • [upgrade] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator roleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator roles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit BackupStorageLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Backups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DeleteBackupRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DownloadRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeBackups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeRestores
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Restore
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit RestricRepository
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Schedules
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit ServerStatusRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit VolumeSnapshotLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit BackupStorageLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Backups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DeleteBackupRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DownloadRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeBackups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeRestores
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Restore
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit RestricRepository
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Schedules
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit ServerStatusRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit VolumeSnapshotLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero backups should be complete
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator clusterServiceVersion should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator splunkforwarders admin should be able to manage SplunkForwarders CR
  • [upgrade] [Suite: service-definition] [OSD] regularuser validating webhook regularuser validating webhook Privledged users allowed to create autoscalers and delete clusterversion objects
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and customer group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage customer users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage non-protected redhat users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage protected redhat users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and no group

osde2e-stage-gcp-e2e-default

Overall pass rate: 98.55%

Job ID Install Version Upgrade Version Pass Rate Failures
1356512706521206784 4.6.13 98.55%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
1356150449861824512 4.6.8 98.55%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
1356271256244064256 4.6.8 98.55%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
1356392114107191296 4.6.13 98.55%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist

osde2e-stage-gcp-e2e-next-y

Overall pass rate: 98.37%

Job ID Install Version Upgrade Version Pass Rate Failures
1356392116627968000 4.7.0-fc.5-candidate 98.55%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
1356512709046177792 4.7.0-fc.5-candidate 98.55%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
1356150452307103744 4.7.0-fc.5-candidate 98.55%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
1356271258769035264 4.7.0-fc.5-candidate 97.83%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] Splunk Forwarder Operator Operator Upgrade should upgrade from the replaced version

osde2e-stage-gcp-e2e-next-z

Overall pass rate: 98.37%

Job ID Install Version Upgrade Version Pass Rate Failures
1356392117462634496 4.6.15-fast 98.55%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
1356512709914398720 4.6.15-fast 98.55%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
1356150453150158848 4.6.15-candidate 97.83%
  • [install] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
1356271259624673280 4.6.15-candidate 98.55%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist