OSDe2e aws Weather Report 2021-01-06 12:00:28.732138124 +0000 UTC
Summary
osde2e-int-aws-e2e-osd-default-plus-one-nightly
Overall pass rate: 0.00%
osde2e-int-aws-e2e-upgrade-to-latest-z
Overall pass rate: 0.00%
osde2e-prod-aws-e2e-default
Overall pass rate: 100.00%
osde2e-prod-aws-e2e-middle-imageset
Overall pass rate: 100.00%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1346426262687584256 |
4.6.1 |
|
100.00% |
- [Log Metrics] host-dns-lookup
|
osde2e-prod-aws-e2e-next
Overall pass rate: 100.00%
osde2e-prod-aws-e2e-oldest-imageset
Overall pass rate: 0.00%
osde2e-prod-aws-e2e-osd-nightly-4.7
Overall pass rate: 0.00%
osde2e-prod-aws-e2e-upgrade-prod-minus-four-to-next
Overall pass rate: 100.00%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1346456459319185408 |
4.6.1 |
4.6.9 |
100.00% |
- [Log Metrics] host-dns-lookup
- [Log Metrics] host-dns-lookup
|
osde2e-prod-aws-e2e-upgrade-prod-minus-one-to-next
Overall pass rate: 100.00%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1346637779966103552 |
4.6.6 |
4.6.9 |
100.00% |
|
osde2e-prod-aws-e2e-upgrade-prod-minus-three-to-next
Overall pass rate: 100.00%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1346396045063491584 |
4.6.3 |
4.6.9 |
100.00% |
- [Log Metrics] host-dns-lookup
- [Log Metrics] host-dns-lookup
|
osde2e-prod-aws-e2e-upgrade-prod-minus-two-to-next
Overall pass rate: 100.00%
osde2e-prod-aws-e2e-upgrade-to-latest
Overall pass rate: 90.53%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1346365859953643520 |
4.6.8 |
4.6.9 |
100.00% |
|
1346426261886472192 |
4.6.8 |
4.6.9 |
49.64% |
- [install] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users can manage all non-privileged namespaces
- [upgrade] BeforeSuite
|
1346486676523847680 |
4.6.8 |
4.6.9 |
100.00% |
|
1346547651784478720 |
4.6.8 |
4.6.9 |
100.00% |
|
1346607692000530432 |
4.6.8 |
4.6.9 |
100.00% |
|
1346668057354833920 |
4.6.8 |
4.6.9 |
100.00% |
|
1346728469811171328 |
4.6.8 |
4.6.9 |
84.06% |
- [Log Metrics] host-dns-lookup
- [Log Metrics] host-dns-lookup
- [upgrade] [Suite: e2e] MachineHealthChecks infra MHC should exist
- [upgrade] [Suite: e2e] MachineHealthChecks should replace unhealthy nodes
- [upgrade] [Suite: e2e] MachineHealthChecks worker MHC should exist
- [upgrade] [Suite: e2e] Validation Webhook should exist and be running in the cluster
- [upgrade] [Suite: e2e] Workload (redmine) should get created in the cluster
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoleBindings should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoles should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator configmaps should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should have all desired replicas ready
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator roleBindings should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator roles should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit BackupStorageLocations
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Backups
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DeleteBackupRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DownloadRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeBackups
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeRestores
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Restore
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit RestricRepository
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Schedules
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit ServerStatusRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit VolumeSnapshotLocations
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit BackupStorageLocations
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Backups
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DeleteBackupRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DownloadRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeBackups
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeRestores
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Restore
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit RestricRepository
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Schedules
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit ServerStatusRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit VolumeSnapshotLocations
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero backups should be complete
- [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works builds-pruner should run successfully
- [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works deployments-pruner should run successfully
- [upgrade] [Suite: operators] [OSD] RBAC Operator Operator Upgrade should upgrade from the replaced version
- [upgrade] [Suite: operators] [OSD] RBAC Operator clusterRoles should exist
- [upgrade] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
- [upgrade] [Suite: operators] [OSD] RBAC Operator configmaps should exist
- [upgrade] [Suite: operators] [OSD] RBAC Operator deployment should exist
- [upgrade] [Suite: operators] [OSD] RBAC Operator deployment should have all desired replicas ready
|
osde2e-stage-aws-e2e-default
Overall pass rate: 100.00%
osde2e-stage-aws-e2e-middle-imageset
Overall pass rate: 100.00%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1346426267821412352 |
4.5.23-candidate |
|
100.00% |
|
osde2e-stage-aws-e2e-next-y
Overall pass rate: 99.90%
osde2e-stage-aws-e2e-oldest-imageset
Overall pass rate: 100.00%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1346426270224748544 |
4.4.11-fast |
|
100.00% |
|
osde2e-stage-aws-e2e-upgrade-to-latest
Overall pass rate: 92.39%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1346668057589714944 |
4.6.8 |
4.6.9 |
100.00% |
- [Log Metrics] host-dns-lookup
- [Log Metrics] host-dns-lookup
|
1346365863963398144 |
4.6.8 |
4.6.9 |
100.00% |
- [Log Metrics] host-dns-lookup
- [Log Metrics] host-dns-lookup
|
1346547656163332096 |
4.6.8 |
4.6.9 |
69.57% |
- [Log Metrics] host-dns-lookup
- [Log Metrics] host-dns-lookup
- [upgrade] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster
- [upgrade] [Suite: e2e] Cluster state should include Prometheus data
- [upgrade] [Suite: e2e] ImageStreams should exist in the cluster
- [upgrade] [Suite: e2e] MachineHealthChecks infra MHC should exist
- [upgrade] [Suite: e2e] MachineHealthChecks should replace unhealthy nodes
- [upgrade] [Suite: e2e] MachineHealthChecks worker MHC should exist
- [upgrade] [Suite: e2e] Pods should be Running or Succeeded
- [upgrade] [Suite: e2e] Pods should not be Failed
- [upgrade] [Suite: e2e] Routes should be created for Console
- [upgrade] [Suite: e2e] Routes should be created for oauth
- [upgrade] [Suite: e2e] Routes should be functioning for Console
- [upgrade] [Suite: e2e] Routes should be functioning for oauth
- [upgrade] [Suite: e2e] Storage should be able to be expanded
- [upgrade] [Suite: e2e] Validation Webhook should exist and be running in the cluster
- [upgrade] [Suite: e2e] Workload (redmine) should get created in the cluster
- [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions can create pods with SCCs
- [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include anyuid
- [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include nonroot
- [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Members of SRE groups can manage all namespaces
- [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users can manage all non-privileged namespaces
- [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users cannot manage privileged namespaces
- [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Privileged users can manage all namespaces
- [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook dedicated admins cannot manage privileged namespaces
- [upgrade] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
- [upgrade] [Suite: operators] AlertmanagerInhibitions should exist
- [upgrade] [Suite: operators] CloudIngressOperator apischeme apischemes CR instance must be present on cluster
- [upgrade] [Suite: operators] CloudIngressOperator apischeme cluster admin should be allowed to manage apischemes CR
- [upgrade] [Suite: operators] CloudIngressOperator apischeme dedicated admin should not be allowed to manage apischemes CR
- [upgrade] [Suite: operators] CloudIngressOperator deployment should exist
- [upgrade] [Suite: operators] CloudIngressOperator deployment should have all desired replicas ready
- [upgrade] [Suite: operators] CloudIngressOperator publishingstrategies cluster admin should be allowed to manage publishingstrategies CR
- [upgrade] [Suite: operators] CloudIngressOperator publishingstrategies dedicated admin should not be allowed to manage publishingstrategies CR
- [upgrade] [Suite: operators] CloudIngressOperator rh-api-test cidr block changes should updated the service
- [upgrade] [Suite: operators] CloudIngressOperator rh-api-test hostname should resolve
- [upgrade] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret exist under openshift-config namespace
- [upgrade] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoleBindings should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoles should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator configmaps should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should have all desired replicas ready
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator roleBindings should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator roles should exist
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit BackupStorageLocations
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Backups
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DeleteBackupRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DownloadRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeBackups
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeRestores
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Restore
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit RestricRepository
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Schedules
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit ServerStatusRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit VolumeSnapshotLocations
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit BackupStorageLocations
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Backups
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DeleteBackupRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DownloadRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeBackups
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeRestores
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Restore
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit RestricRepository
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Schedules
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit ServerStatusRequests
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit VolumeSnapshotLocations
- [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero backups should be complete
- [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works builds-pruner should run successfully
- [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works deployments-pruner should run successfully
- [upgrade] [Suite: operators] [OSD] RBAC Dedicated Admins SubjectPermission SubjectPermission should have the expected ClusterRoles, ClusterRoleBindings and RoleBindinsg
- [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator Operator Upgrade should upgrade from the replaced version
- [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator clusterRoleBindings should exist
- [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator clusterRoles should exist
- [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator clusterServiceVersion should exist
- [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator configmaps should exist
- [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator deployment should exist
- [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator deployment should have all desired replicas ready
- [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator splunkforwarders admin should be able to manage SplunkForwarders CR
- [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed empty node-label daemonset should get created
- [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed infra node daemonset should get created
- [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed worker node daemonset should get created
- [upgrade] [Suite: service-definition] [OSD] NodeLabels Modifying nodeLabels is not allowed node-label cannot be added
- [upgrade] [Suite: service-definition] [OSD] Privileged Containers Privileged containers are not allowed privileged container should not get created
- [upgrade] [Suite: service-definition] [OSD] regularuser validating webhook regularuser validating webhook Privledged users allowed to create autoscalers and delete clusterversion objects
|
1346607695335002112 |
4.6.8 |
4.6.9 |
100.00% |
- [Log Metrics] host-dns-lookup
- [Log Metrics] host-dns-lookup
|
osde2e-stage-aws-e2e-upgrade-to-latest-z
Overall pass rate: 79.13%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1346486679036235776 |
4.6.8 |
4.6.9 |
100.00% |
|
1346547655223808000 |
4.6.8 |
4.6.9 |
0.00% |
|
1346728473137254400 |
4.6.8 |
4.6.9 |
95.65% |
- [Log Metrics] host-dns-lookup
- [Log Metrics] host-dns-lookup
- [upgrade] [Suite: e2e] Storage should be able to be expanded
- [upgrade] [Suite: operators] CloudIngressOperator apischeme apischemes CR instance must be present on cluster
- [upgrade] [Suite: operators] CloudIngressOperator apischeme cluster admin should be allowed to manage apischemes CR
- [upgrade] [Suite: operators] CloudIngressOperator apischeme dedicated admin should not be allowed to manage apischemes CR
- [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works builds-pruner should run successfully
- [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works deployments-pruner should run successfully
- [upgrade] [Suite: operators] [OSD] RBAC Dedicated Admins SubjectPermission SubjectPermission should have the expected ClusterRoles, ClusterRoleBindings and RoleBindinsg
- [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator Operator Upgrade should upgrade from the replaced version
- [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator splunkforwarders admin should be able to manage SplunkForwarders CR
- [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed empty node-label daemonset should get created
- [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed infra node daemonset should get created
- [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed worker node daemonset should get created
|
1346365863078400000 |
4.6.8 |
4.6.9 |
100.00% |
|
1346426266059804672 |
4.6.8 |
4.6.9 |
100.00% |
- [Log Metrics] host-dns-lookup
- [Log Metrics] host-dns-lookup
|