OSDe2e gcp Weather Report 2021-01-03 12:00:25.264033403 +0000 UTC
Summary
osde2e-int-gcp-e2e-osd-default-plus-one-nightly
Overall pass rate: 0.00%
osde2e-int-gcp-e2e-upgrade-to-latest-z
Overall pass rate: 0.00%
osde2e-prod-gcp-e2e-default
Overall pass rate: 100.00%
osde2e-prod-gcp-e2e-next
Overall pass rate: 99.82%
osde2e-prod-gcp-e2e-osd-nightly-4.7
Overall pass rate: 0.00%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1345414914432307200 |
4.7.0-0.nightly-2021-01-01-203104-nightly |
|
0.00% |
|
osde2e-prod-gcp-e2e-upgrade-to-latest-z
Overall pass rate: 75.12%
osde2e-stage-gcp-e2e-default
Overall pass rate: 99.82%
osde2e-stage-gcp-e2e-next-y
Overall pass rate: 99.82%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1345278796000923648 |
4.7.0-fc.0-candidate |
|
100.00% |
|
1345399590798495744 |
4.7.0-fc.0-candidate |
|
100.00% |
|
1345520429510430720 |
4.7.0-fc.0-candidate |
|
100.00% |
|
1345641186676707328 |
4.7.0-fc.0-candidate |
|
99.28% |
- [install] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users can manage all non-privileged namespaces
|
osde2e-stage-gcp-e2e-upgrade-to-latest
Overall pass rate: 74.82%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1345278794365145088 |
4.6.8 |
4.6.9 |
100.00% |
|
1345641181618376704 |
4.6.8 |
4.6.9 |
49.64% |
- [install] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Privileged users can manage all namespaces
- [upgrade] BeforeSuite
|
osde2e-stage-gcp-e2e-upgrade-to-latest-z
Overall pass rate: 62.50%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1345399589959634944 |
4.6.8 |
4.6.9 |
75.36% |
- [Log Metrics] host-dns-lookup
- [upgrade] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster
- [upgrade] [Suite: e2e] Cluster state should include Prometheus data
- [upgrade] [Suite: e2e] Pods should be Running or Succeeded
- [upgrade] [Suite: e2e] Pods should not be Failed
- [upgrade] [Suite: e2e] Storage should be able to be expanded
- [upgrade] [Suite: e2e] Workload (guestbook) should get created in the cluster
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook dedicated admins can manage customer user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook dedicated admins cannot manage redhat user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook oauth service account can manage customer user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook oauth service account can manage redhat user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-admins cannot manage customer user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-admins cannot manage redhat user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-cluster-admins can manage customer user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-cluster-admins can manage redhat user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook random authenticated user cannot manage customer user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook random authenticated user cannot manage redhat user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook system:admin can manage customer user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook system:admin can manage redhat user identity
- [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Members of SRE groups can manage all namespaces
- [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users can manage all non-privileged namespaces
- [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users cannot manage privileged namespaces
- [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Privileged users can manage all namespaces
- [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook dedicated admins cannot manage privileged namespaces
- [upgrade] [Suite: operators] CloudIngressOperator apischeme apischemes CR instance must be present on cluster
- [upgrade] [Suite: operators] CloudIngressOperator apischeme cluster admin should be allowed to manage apischemes CR
- [upgrade] [Suite: operators] CloudIngressOperator apischeme dedicated admin should not be allowed to manage apischemes CR
- [upgrade] [Suite: operators] CloudIngressOperator rh-api-test cidr block changes should updated the service
- [upgrade] [Suite: operators] CloudIngressOperator rh-api-test hostname should resolve
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoleBindings should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoles should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator configmaps should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should have all desired replicas ready
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator roleBindings should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator roles should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit BackupStorageLocations
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Backups
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DeleteBackupRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DownloadRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeBackups
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeRestores
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Restore
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit RestricRepository
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Schedules
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit ServerStatusRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit VolumeSnapshotLocations
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit BackupStorageLocations
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Backups
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DeleteBackupRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DownloadRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeBackups
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeRestores
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Restore
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit RestricRepository
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Schedules
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit ServerStatusRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit VolumeSnapshotLocations
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero backups should be complete
- [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works builds-pruner should run successfully
- [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works deployments-pruner should run successfully
- [upgrade] [Suite: operators] [OSD] RBAC Operator Operator Upgrade should upgrade from the replaced version
- [upgrade] [Suite: operators] [OSD] RBAC Operator clusterRoles should exist
- [upgrade] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
- [upgrade] [Suite: operators] [OSD] RBAC Operator configmaps should exist
- [upgrade] [Suite: operators] [OSD] RBAC Operator deployment should exist
- [upgrade] [Suite: operators] [OSD] RBAC Operator deployment should have all desired replicas ready
- [upgrade] [Suite: service-definition] [OSD] Privileged Containers Privileged containers are not allowed privileged container should not get created
|
1345520428663181312 |
4.6.8 |
4.6.9 |
49.64% |
- [install] [Suite: e2e] Cluster state should have no alerts
- [upgrade] BeforeSuite
|