OSDe2e aws Weather Report 2020-10-31 12:00:33.556193717 +0000 UTC

Share on:

Summary

Job Name Pass Rate More detail
osde2e-int-aws-e2e-osd-default-nightly 100.00% More Detail
osde2e-int-aws-e2e-osd-default-plus-one-nightly 100.00% More Detail
osde2e-int-aws-e2e-osd-default-plus-two-nightly 99.73% More Detail
osde2e-prod-aws-e2e-default 83.33% More Detail
osde2e-prod-aws-e2e-middle-imageset 100.00% More Detail
osde2e-prod-aws-e2e-next 99.60% More Detail
osde2e-prod-aws-e2e-oldest-imageset 100.00% More Detail
osde2e-prod-aws-e2e-upgrade-default-next 94.42% More Detail
osde2e-prod-aws-e2e-upgrade-prod-minus-one-to-next 100.00% More Detail
osde2e-prod-aws-e2e-upgrade-prod-minus-two-to-next 100.00% More Detail
osde2e-stage-aws-e2e-default 66.67% More Detail
osde2e-stage-aws-e2e-middle-imageset 100.00% More Detail
osde2e-stage-aws-e2e-next-y 83.20% More Detail
osde2e-stage-aws-e2e-next-z 83.33% More Detail
osde2e-stage-aws-e2e-oldest-imageset 100.00% More Detail
osde2e-stage-aws-e2e-upgrade-default-next 0.00% More Detail
osde2e-stage-aws-e2e-upgrade-default-next-z 87.84% More Detail

osde2e-int-aws-e2e-osd-default-nightly

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1322327686864965632 4.5.0-0.nightly-2020-10-29-070117 100.00%
1322085942504198144 4.5.0-0.nightly-2020-10-29-070117 100.00%
1322206851588165632 4.5.0-0.nightly-2020-10-29-070117 100.00%

osde2e-int-aws-e2e-osd-default-plus-one-nightly

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1322206853257498624 4.6.0-0.nightly-2020-10-28-101609 100.00%
1322327688521715712 4.6.0-0.nightly-2020-10-28-101609 100.00%
  • [Log Metrics] host-dns-lookup
1322085944181919744 4.6.0-0.nightly-2020-10-28-101609 100.00%

osde2e-int-aws-e2e-osd-default-plus-two-nightly

Overall pass rate: 99.73%

Job ID Install Version Upgrade Version Pass Rate Failures
1322085946581061632 4.7.0-0.nightly-2020-10-27-051128 100.00%
  • [Log Metrics] host-dns-lookup
1322206854943608832 4.7.0-0.nightly-2020-10-27-051128 100.00%
1322327690220408832 4.7.0-0.nightly-2020-10-27-051128 99.19%
  • [Log Metrics] host-dns-lookup
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version

osde2e-prod-aws-e2e-default

Overall pass rate: 83.33%

Job ID Install Version Upgrade Version Pass Rate Failures
1322146460732493824 4.5.11 100.00%
1322206855778275328 4.5.11 0.00%
  • [install] BeforeSuite
1322267244796841984 4.5.11 100.00%
1322327691038298112 4.5.11 100.00%
1322388045239947264 4.5.11 100.00%
1322085948229423104 4.5.11 100.00%

osde2e-prod-aws-e2e-middle-imageset

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1322146462393438208 4.5.16 100.00%

osde2e-prod-aws-e2e-next

Overall pass rate: 99.60%

Job ID Install Version Upgrade Version Pass Rate Failures
1322085949907144704 4.6.1 100.00%
1322146463228104704 4.6.1 100.00%
1322206857627963392 4.6.1 100.00%
1322267245312741376 4.6.1 100.00%
1322327692732796928 4.6.1 100.00%
1322388045357387776 4.6.1 97.58%
  • [install] [Suite: operators] [OSD] RBAC Operator configmaps should exist
  • [install] [Suite: operators] [OSD] RBAC Operator deployment should exist
  • [install] [Suite: operators] [OSD] RBAC Operator deployment should have all desired replicas ready

osde2e-prod-aws-e2e-oldest-imageset

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1322146464083742720 4.4.11 100.00%

osde2e-prod-aws-e2e-upgrade-default-next

Overall pass rate: 94.42%

Job ID Install Version Upgrade Version Pass Rate Failures
1322388045298667520 4.5.11 4.5.16 66.94%
  • [Log Metrics] host-dns-lookup
  • [upgrade] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster
  • [upgrade] [Suite: e2e] ImageStreams should exist in the cluster
  • [upgrade] [Suite: e2e] MachineHealthChecks should exist
  • [upgrade] [Suite: e2e] MachineHealthChecks should replace unhealthy nodes
  • [upgrade] [Suite: e2e] Storage should be able to be expanded
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Members of SRE groups can manage all namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users can manage all non-privileged namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users cannot manage privileged namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Privileged users can manage all namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook dedicated admins cannot manage privileged namespaces
  • [upgrade] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret exist under openshift-config namespace
  • [upgrade] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator roleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator roles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator roleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator roles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit BackupStorageLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Backups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DeleteBackupRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DownloadRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeBackups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeRestores
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Restore
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit RestricRepository
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Schedules
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit ServerStatusRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit VolumeSnapshotLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit BackupStorageLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Backups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DeleteBackupRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DownloadRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeBackups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeRestores
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Restore
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit RestricRepository
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Schedules
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit ServerStatusRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit VolumeSnapshotLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero backups should be complete
  • [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works builds-pruner should run successfully
  • [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works deployments-pruner should run successfully
  • [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works image-pruner should run successfully
  • [upgrade] [Suite: operators] [OSD] RBAC Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed empty node-label daemonset should get created
  • [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed infra node daemonset should get created
  • [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed worker node daemonset should get created
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and customer group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage customer users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage non-protected redhat users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage protected redhat users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and no group
1322448443410485248 4.5.11 4.5.16 99.60%
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator Operator Upgrade should upgrade from the replaced version
1322025533705293824 4.5.11 4.5.16 100.00%
1322206856763936768 4.5.11 4.5.16 100.00%
1322267244830396416 4.5.11 4.5.16 100.00%
1322327691881353216 4.5.11 4.5.16 100.00%

osde2e-prod-aws-e2e-upgrade-prod-minus-one-to-next

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1322357839934525440 4.4.16 4.5.16 100.00%

osde2e-prod-aws-e2e-upgrade-prod-minus-two-to-next

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1322055741502132224 4.4.11 4.4.16 100.00%

osde2e-stage-aws-e2e-default

Overall pass rate: 66.67%

Job ID Install Version Upgrade Version Pass Rate Failures
1322388045416108032 4.5.11 0.00%
  • [install] BeforeSuite
1322085951572283392 4.5.11 100.00%
1322146464905826304 4.5.11 0.00%
  • [install] BeforeSuite
1322206858450046976 4.5.11 100.00%
1322267246151602176 4.5.11 100.00%
1322327693609406464 4.5.11 100.00%

osde2e-stage-aws-e2e-middle-imageset

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1322146466583547904 4.5.16-fast 100.00%

osde2e-stage-aws-e2e-next-y

Overall pass rate: 83.20%

Job ID Install Version Upgrade Version Pass Rate Failures
1322206861818073088 4.6.1 0.00%
  • [install] BeforeSuite
1322267249544794112 4.6.1 100.00%
1322327697774350336 4.6.1 100.00%
  • [Log Metrics] host-dns-lookup
1322388047379042304 4.6.1 100.00%
1322085954936115200 4.6.1 99.19%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
1322146468965912576 4.6.1 100.00%

osde2e-stage-aws-e2e-next-z

Overall pass rate: 83.33%

Job ID Install Version Upgrade Version Pass Rate Failures
1322388046586318848 4.5.17-candidate 100.00%
1322085954109837312 4.5.17-candidate 100.00%
1322146467418214400 4.5.17-candidate 100.00%
1322206860962435072 4.5.17-candidate 0.00%
  • [install] BeforeSuite
1322267248693350400 4.5.17-candidate 100.00%
1322327696146960384 4.5.17-candidate 100.00%

osde2e-stage-aws-e2e-oldest-imageset

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1322146469787996160 4.4.11-fast 100.00%

osde2e-stage-aws-e2e-upgrade-default-next

Overall pass rate: 0.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1322206860131962880 4.5.11 4.6.0-rc.4 0.00%
  • [install] BeforeSuite

osde2e-stage-aws-e2e-upgrade-default-next-z

Overall pass rate: 87.84%

Job ID Install Version Upgrade Version Pass Rate Failures
1322206859314073600 4.5.11 4.5.16 49.60%
  • [install] [Suite: operators] [OSD] Managed Velero Operator deployment should have all desired replicas ready
  • [upgrade] BeforeSuite
1322267246994657280 4.5.11 4.5.16 100.00%
1322327694561513472 4.5.11 4.5.16 100.00%
1322388045520965632 4.5.11 4.5.16 100.00%
1322448446765928448 4.5.11 4.5.16 100.00%
1322025535076831232 4.5.11 4.5.16 77.42%
  • [Log Metrics] host-dns-lookup
  • [upgrade] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster
  • [upgrade] [Suite: e2e] Cluster state should include Prometheus data
  • [upgrade] [Suite: e2e] Workload (guestbook) should get created in the cluster
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook dedicated admins can manage customer user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook dedicated admins cannot manage redhat user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook oauth service account can manage customer user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook oauth service account can manage redhat user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-admins cannot manage customer user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-admins cannot manage redhat user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-cluster-admins can manage customer user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-cluster-admins can manage redhat user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook random authenticated user cannot manage customer user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook random authenticated user cannot manage redhat user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook system:admin can manage customer user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook system:admin can manage redhat user identity
  • [upgrade] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator roleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator roles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator roleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator roles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit BackupStorageLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Backups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DeleteBackupRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DownloadRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeBackups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeRestores
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Restore
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit RestricRepository
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Schedules
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit ServerStatusRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit VolumeSnapshotLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit BackupStorageLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Backups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DeleteBackupRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DownloadRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeBackups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeRestores
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Restore
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit RestricRepository
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Schedules
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit ServerStatusRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit VolumeSnapshotLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero backups should be complete
  • [upgrade] [Suite: service-definition] [OSD] NodeLabels Modifying nodeLabels is not allowed node-label cannot be added