OSDe2e aws Weather Report 2020-10-31 12:00:33.556193717 +0000 UTC
Summary
osde2e-int-aws-e2e-osd-default-nightly
Overall pass rate: 100.00%
osde2e-int-aws-e2e-osd-default-plus-one-nightly
Overall pass rate: 100.00%
osde2e-int-aws-e2e-osd-default-plus-two-nightly
Overall pass rate: 99.73%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1322085946581061632 |
4.7.0-0.nightly-2020-10-27-051128 |
|
100.00% |
- [Log Metrics] host-dns-lookup
|
1322206854943608832 |
4.7.0-0.nightly-2020-10-27-051128 |
|
100.00% |
|
1322327690220408832 |
4.7.0-0.nightly-2020-10-27-051128 |
|
99.19% |
- [Log Metrics] host-dns-lookup
- [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
|
osde2e-prod-aws-e2e-default
Overall pass rate: 83.33%
osde2e-prod-aws-e2e-middle-imageset
Overall pass rate: 100.00%
osde2e-prod-aws-e2e-next
Overall pass rate: 99.60%
osde2e-prod-aws-e2e-oldest-imageset
Overall pass rate: 100.00%
osde2e-prod-aws-e2e-upgrade-default-next
Overall pass rate: 94.42%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1322388045298667520 |
4.5.11 |
4.5.16 |
66.94% |
- [Log Metrics] host-dns-lookup
- [upgrade] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster
- [upgrade] [Suite: e2e] ImageStreams should exist in the cluster
- [upgrade] [Suite: e2e] MachineHealthChecks should exist
- [upgrade] [Suite: e2e] MachineHealthChecks should replace unhealthy nodes
- [upgrade] [Suite: e2e] Storage should be able to be expanded
- [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Members of SRE groups can manage all namespaces
- [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users can manage all non-privileged namespaces
- [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users cannot manage privileged namespaces
- [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Privileged users can manage all namespaces
- [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook dedicated admins cannot manage privileged namespaces
- [upgrade] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret exist under openshift-config namespace
- [upgrade] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoleBindings should exist
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoles should exist
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator configmaps should exist
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator deployment should exist
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator deployment should have all desired replicas ready
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator roleBindings should exist
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator roles should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoleBindings should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoles should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator configmaps should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should have all desired replicas ready
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator roleBindings should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator roles should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit BackupStorageLocations
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Backups
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DeleteBackupRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DownloadRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeBackups
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeRestores
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Restore
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit RestricRepository
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Schedules
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit ServerStatusRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit VolumeSnapshotLocations
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit BackupStorageLocations
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Backups
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DeleteBackupRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DownloadRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeBackups
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeRestores
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Restore
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit RestricRepository
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Schedules
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit ServerStatusRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit VolumeSnapshotLocations
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero backups should be complete
- [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works builds-pruner should run successfully
- [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works deployments-pruner should run successfully
- [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works image-pruner should run successfully
- [upgrade] [Suite: operators] [OSD] RBAC Operator Operator Upgrade should upgrade from the replaced version
- [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator Operator Upgrade should upgrade from the replaced version
- [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed empty node-label daemonset should get created
- [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed infra node daemonset should get created
- [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed worker node daemonset should get created
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and customer group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with SRE IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with other IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with SRE IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with other IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage customer users with other IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage non-protected redhat users with other IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage protected redhat users with SRE IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with SRE IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with other IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and no group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and RH group
- [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and no group
|
1322448443410485248 |
4.5.11 |
4.5.16 |
99.60% |
- [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator Operator Upgrade should upgrade from the replaced version
|
1322025533705293824 |
4.5.11 |
4.5.16 |
100.00% |
|
1322206856763936768 |
4.5.11 |
4.5.16 |
100.00% |
|
1322267244830396416 |
4.5.11 |
4.5.16 |
100.00% |
|
1322327691881353216 |
4.5.11 |
4.5.16 |
100.00% |
|
osde2e-prod-aws-e2e-upgrade-prod-minus-one-to-next
Overall pass rate: 100.00%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1322357839934525440 |
4.4.16 |
4.5.16 |
100.00% |
|
osde2e-prod-aws-e2e-upgrade-prod-minus-two-to-next
Overall pass rate: 100.00%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1322055741502132224 |
4.4.11 |
4.4.16 |
100.00% |
|
osde2e-stage-aws-e2e-default
Overall pass rate: 66.67%
osde2e-stage-aws-e2e-middle-imageset
Overall pass rate: 100.00%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1322146466583547904 |
4.5.16-fast |
|
100.00% |
|
osde2e-stage-aws-e2e-next-y
Overall pass rate: 83.20%
osde2e-stage-aws-e2e-next-z
Overall pass rate: 83.33%
osde2e-stage-aws-e2e-oldest-imageset
Overall pass rate: 100.00%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1322146469787996160 |
4.4.11-fast |
|
100.00% |
|
osde2e-stage-aws-e2e-upgrade-default-next
Overall pass rate: 0.00%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1322206860131962880 |
4.5.11 |
4.6.0-rc.4 |
0.00% |
|
osde2e-stage-aws-e2e-upgrade-default-next-z
Overall pass rate: 87.84%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1322206859314073600 |
4.5.11 |
4.5.16 |
49.60% |
- [install] [Suite: operators] [OSD] Managed Velero Operator deployment should have all desired replicas ready
- [upgrade] BeforeSuite
|
1322267246994657280 |
4.5.11 |
4.5.16 |
100.00% |
|
1322327694561513472 |
4.5.11 |
4.5.16 |
100.00% |
|
1322388045520965632 |
4.5.11 |
4.5.16 |
100.00% |
|
1322448446765928448 |
4.5.11 |
4.5.16 |
100.00% |
|
1322025535076831232 |
4.5.11 |
4.5.16 |
77.42% |
- [Log Metrics] host-dns-lookup
- [upgrade] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster
- [upgrade] [Suite: e2e] Cluster state should include Prometheus data
- [upgrade] [Suite: e2e] Workload (guestbook) should get created in the cluster
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook dedicated admins can manage customer user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook dedicated admins cannot manage redhat user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook oauth service account can manage customer user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook oauth service account can manage redhat user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-admins cannot manage customer user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-admins cannot manage redhat user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-cluster-admins can manage customer user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-cluster-admins can manage redhat user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook random authenticated user cannot manage customer user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook random authenticated user cannot manage redhat user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook system:admin can manage customer user identity
- [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook system:admin can manage redhat user identity
- [upgrade] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoleBindings should exist
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoles should exist
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator configmaps should exist
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator deployment should exist
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator deployment should have all desired replicas ready
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator roleBindings should exist
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator roles should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoleBindings should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoles should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator configmaps should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should have all desired replicas ready
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator roleBindings should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator roles should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit BackupStorageLocations
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Backups
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DeleteBackupRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DownloadRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeBackups
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeRestores
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Restore
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit RestricRepository
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Schedules
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit ServerStatusRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit VolumeSnapshotLocations
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit BackupStorageLocations
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Backups
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DeleteBackupRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DownloadRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeBackups
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeRestores
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Restore
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit RestricRepository
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Schedules
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit ServerStatusRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit VolumeSnapshotLocations
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero backups should be complete
- [upgrade] [Suite: service-definition] [OSD] NodeLabels Modifying nodeLabels is not allowed node-label cannot be added
|