OSDe2e aws Weather Report 2021-01-06 12:00:28.732138124 +0000 UTC

Share on:

Summary

Job Name Pass Rate More detail
osde2e-int-aws-e2e-osd-default-plus-one-nightly 0.00% More Detail
osde2e-int-aws-e2e-upgrade-to-latest-z 0.00% More Detail
osde2e-prod-aws-e2e-default 100.00% More Detail
osde2e-prod-aws-e2e-middle-imageset 100.00% More Detail
osde2e-prod-aws-e2e-next 100.00% More Detail
osde2e-prod-aws-e2e-oldest-imageset 0.00% More Detail
osde2e-prod-aws-e2e-osd-nightly-4.7 0.00% More Detail
osde2e-prod-aws-e2e-upgrade-prod-minus-four-to-next 100.00% More Detail
osde2e-prod-aws-e2e-upgrade-prod-minus-one-to-next 100.00% More Detail
osde2e-prod-aws-e2e-upgrade-prod-minus-three-to-next 100.00% More Detail
osde2e-prod-aws-e2e-upgrade-prod-minus-two-to-next 100.00% More Detail
osde2e-prod-aws-e2e-upgrade-to-latest 90.53% More Detail
osde2e-stage-aws-e2e-default 100.00% More Detail
osde2e-stage-aws-e2e-middle-imageset 100.00% More Detail
osde2e-stage-aws-e2e-next-y 99.90% More Detail
osde2e-stage-aws-e2e-oldest-imageset 100.00% More Detail
osde2e-stage-aws-e2e-upgrade-to-latest 92.39% More Detail
osde2e-stage-aws-e2e-upgrade-to-latest-z 79.13% More Detail

osde2e-int-aws-e2e-osd-default-plus-one-nightly

Overall pass rate: 0.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1346486672295989248 4.7.0-0.nightly-2021-01-05-055003-nightly 0.00%
  • [install] BeforeSuite
1346607688208879616 4.7.0-0.nightly-2021-01-05-232450-nightly 0.00%
  • [install] BeforeSuite
1346728465574924288 4.7.0-0.nightly-2021-01-05-232450-nightly 0.00%
  • [install] BeforeSuite
1346365854786260992 4.7.0-0.nightly-2021-01-05-055003-nightly 0.00%
  • [install] BeforeSuite

osde2e-int-aws-e2e-upgrade-to-latest-z

Overall pass rate: 0.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1346607687390990336 4.6.8 4.6.9 0.00%
  • [install] BeforeSuite
1346728463926562816 4.6.8 4.6.9 0.00%
  • [install] BeforeSuite
1346365853934817280 4.6.8 4.6.9 0.00%
  • [install] BeforeSuite
1346486671461322752 4.6.8 4.6.9 0.00%
  • [install] BeforeSuite

osde2e-prod-aws-e2e-default

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1346607690301837312 4.6.8 100.00%
1346668057363222528 4.6.8 100.00%
  • [Log Metrics] host-dns-lookup
1346728468087312384 4.6.8 100.00%
1346365858041040896 4.6.8 100.00%
1346426260997279744 4.6.8 100.00%
1346486674829348864 4.6.8 100.00%
1346547651058864128 4.6.8 100.00%

osde2e-prod-aws-e2e-middle-imageset

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1346426262687584256 4.6.1 100.00%
  • [Log Metrics] host-dns-lookup

osde2e-prod-aws-e2e-next

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1346547653529309184 4.6.9 100.00%
1346607692818419712 4.6.9 100.00%
1346668057438720000 4.6.9 100.00%
  • [Log Metrics] host-dns-lookup
1346728470620672000 4.6.9 100.00%
1346365860557623296 4.6.9 100.00%
1346426263518056448 4.6.9 100.00%
  • [Log Metrics] host-dns-lookup
1346486677396262912 4.6.9 100.00%

osde2e-prod-aws-e2e-oldest-imageset

Overall pass rate: 0.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1346426264369500160 4.4.11 0.00%
  • [install] BeforeSuite

osde2e-prod-aws-e2e-osd-nightly-4.7

Overall pass rate: 0.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1346511365312876544 4.7.0-0.nightly-2021-01-05-173522-nightly 0.00%
  • [install] BeforeSuite
1346599120135000064 4.7.0-0.nightly-2021-01-05-232450-nightly 0.00%
  • [install] BeforeSuite
1346334580579241984 4.7.0-0.nightly-2021-01-05-055003-nightly 0.00%
  • [install] BeforeSuite
1346408197233053696 4.7.0-0.nightly-2021-01-05-104202-nightly 0.00%
  • [install] BeforeSuite

osde2e-prod-aws-e2e-upgrade-prod-minus-four-to-next

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1346456459319185408 4.6.1 4.6.9 100.00%
  • [Log Metrics] host-dns-lookup
  • [Log Metrics] host-dns-lookup

osde2e-prod-aws-e2e-upgrade-prod-minus-one-to-next

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1346637779966103552 4.6.6 4.6.9 100.00%

osde2e-prod-aws-e2e-upgrade-prod-minus-three-to-next

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1346396045063491584 4.6.3 4.6.9 100.00%
  • [Log Metrics] host-dns-lookup
  • [Log Metrics] host-dns-lookup

osde2e-prod-aws-e2e-upgrade-prod-minus-two-to-next

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1346335649774440448 4.6.4 4.6.9 100.00%
1346698272571396096 4.6.4 4.6.9 100.00%

osde2e-prod-aws-e2e-upgrade-to-latest

Overall pass rate: 90.53%

Job ID Install Version Upgrade Version Pass Rate Failures
1346365859953643520 4.6.8 4.6.9 100.00%
1346426261886472192 4.6.8 4.6.9 49.64%
  • [install] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users can manage all non-privileged namespaces
  • [upgrade] BeforeSuite
1346486676523847680 4.6.8 4.6.9 100.00%
1346547651784478720 4.6.8 4.6.9 100.00%
1346607692000530432 4.6.8 4.6.9 100.00%
1346668057354833920 4.6.8 4.6.9 100.00%
1346728469811171328 4.6.8 4.6.9 84.06%
  • [Log Metrics] host-dns-lookup
  • [Log Metrics] host-dns-lookup
  • [upgrade] [Suite: e2e] MachineHealthChecks infra MHC should exist
  • [upgrade] [Suite: e2e] MachineHealthChecks should replace unhealthy nodes
  • [upgrade] [Suite: e2e] MachineHealthChecks worker MHC should exist
  • [upgrade] [Suite: e2e] Validation Webhook should exist and be running in the cluster
  • [upgrade] [Suite: e2e] Workload (redmine) should get created in the cluster
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator roleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator roles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit BackupStorageLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Backups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DeleteBackupRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DownloadRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeBackups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeRestores
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Restore
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit RestricRepository
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Schedules
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit ServerStatusRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit VolumeSnapshotLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit BackupStorageLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Backups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DeleteBackupRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DownloadRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeBackups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeRestores
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Restore
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit RestricRepository
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Schedules
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit ServerStatusRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit VolumeSnapshotLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero backups should be complete
  • [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works builds-pruner should run successfully
  • [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works deployments-pruner should run successfully
  • [upgrade] [Suite: operators] [OSD] RBAC Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] RBAC Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator deployment should have all desired replicas ready

osde2e-stage-aws-e2e-default

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1346668057535188992 4.6.8 100.00%
1346728472285810688 4.6.8 100.00%
1346365862239539200 4.6.8 100.00%
  • [Log Metrics] host-dns-lookup
1346426265199972352 4.6.8 100.00%
1346486678235123712 4.6.8 100.00%
1346547654410113024 4.6.8 100.00%
1346607693657280512 4.6.8 100.00%

osde2e-stage-aws-e2e-middle-imageset

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1346426267821412352 4.5.23-candidate 100.00%

osde2e-stage-aws-e2e-next-y

Overall pass rate: 99.90%

Job ID Install Version Upgrade Version Pass Rate Failures
1346426269415247872 4.7.0-fc.0-candidate 100.00%
1346486680730734592 4.7.0-fc.0-candidate 100.00%
1346547657824276480 4.7.0-fc.1-candidate 99.28%
  • [install] [Suite: e2e] Cluster state should have no alerts
1346607697008529408 4.7.0-fc.1-candidate 100.00%
1346668058285969408 4.7.0-fc.1-candidate 100.00%
  • [Log Metrics] host-dns-lookup
1346728475645448192 4.7.0-fc.1-candidate 100.00%
1346365865599176704 4.7.0-fc.0-candidate 100.00%
  • [Log Metrics] host-dns-lookup

osde2e-stage-aws-e2e-oldest-imageset

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1346426270224748544 4.4.11-fast 100.00%

osde2e-stage-aws-e2e-upgrade-to-latest

Overall pass rate: 92.39%

Job ID Install Version Upgrade Version Pass Rate Failures
1346668057589714944 4.6.8 4.6.9 100.00%
  • [Log Metrics] host-dns-lookup
  • [Log Metrics] host-dns-lookup
1346365863963398144 4.6.8 4.6.9 100.00%
  • [Log Metrics] host-dns-lookup
  • [Log Metrics] host-dns-lookup
1346547656163332096 4.6.8 4.6.9 69.57%
  • [Log Metrics] host-dns-lookup
  • [Log Metrics] host-dns-lookup
  • [upgrade] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster
  • [upgrade] [Suite: e2e] Cluster state should include Prometheus data
  • [upgrade] [Suite: e2e] ImageStreams should exist in the cluster
  • [upgrade] [Suite: e2e] MachineHealthChecks infra MHC should exist
  • [upgrade] [Suite: e2e] MachineHealthChecks should replace unhealthy nodes
  • [upgrade] [Suite: e2e] MachineHealthChecks worker MHC should exist
  • [upgrade] [Suite: e2e] Pods should be Running or Succeeded
  • [upgrade] [Suite: e2e] Pods should not be Failed
  • [upgrade] [Suite: e2e] Routes should be created for Console
  • [upgrade] [Suite: e2e] Routes should be created for oauth
  • [upgrade] [Suite: e2e] Routes should be functioning for Console
  • [upgrade] [Suite: e2e] Routes should be functioning for oauth
  • [upgrade] [Suite: e2e] Storage should be able to be expanded
  • [upgrade] [Suite: e2e] Validation Webhook should exist and be running in the cluster
  • [upgrade] [Suite: e2e] Workload (redmine) should get created in the cluster
  • [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions can create pods with SCCs
  • [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include anyuid
  • [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include nonroot
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Members of SRE groups can manage all namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users can manage all non-privileged namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users cannot manage privileged namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Privileged users can manage all namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook dedicated admins cannot manage privileged namespaces
  • [upgrade] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
  • [upgrade] [Suite: operators] AlertmanagerInhibitions should exist
  • [upgrade] [Suite: operators] CloudIngressOperator apischeme apischemes CR instance must be present on cluster
  • [upgrade] [Suite: operators] CloudIngressOperator apischeme cluster admin should be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] CloudIngressOperator apischeme dedicated admin should not be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] CloudIngressOperator deployment should exist
  • [upgrade] [Suite: operators] CloudIngressOperator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] CloudIngressOperator publishingstrategies cluster admin should be allowed to manage publishingstrategies CR
  • [upgrade] [Suite: operators] CloudIngressOperator publishingstrategies dedicated admin should not be allowed to manage publishingstrategies CR
  • [upgrade] [Suite: operators] CloudIngressOperator rh-api-test cidr block changes should updated the service
  • [upgrade] [Suite: operators] CloudIngressOperator rh-api-test hostname should resolve
  • [upgrade] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret exist under openshift-config namespace
  • [upgrade] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator roleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator roles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit BackupStorageLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Backups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DeleteBackupRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DownloadRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeBackups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeRestores
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Restore
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit RestricRepository
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Schedules
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit ServerStatusRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit VolumeSnapshotLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit BackupStorageLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Backups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DeleteBackupRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DownloadRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeBackups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeRestores
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Restore
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit RestricRepository
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Schedules
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit ServerStatusRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit VolumeSnapshotLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero backups should be complete
  • [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works builds-pruner should run successfully
  • [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works deployments-pruner should run successfully
  • [upgrade] [Suite: operators] [OSD] RBAC Dedicated Admins SubjectPermission SubjectPermission should have the expected ClusterRoles, ClusterRoleBindings and RoleBindinsg
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator clusterServiceVersion should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator splunkforwarders admin should be able to manage SplunkForwarders CR
  • [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed empty node-label daemonset should get created
  • [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed infra node daemonset should get created
  • [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed worker node daemonset should get created
  • [upgrade] [Suite: service-definition] [OSD] NodeLabels Modifying nodeLabels is not allowed node-label cannot be added
  • [upgrade] [Suite: service-definition] [OSD] Privileged Containers Privileged containers are not allowed privileged container should not get created
  • [upgrade] [Suite: service-definition] [OSD] regularuser validating webhook regularuser validating webhook Privledged users allowed to create autoscalers and delete clusterversion objects
1346607695335002112 4.6.8 4.6.9 100.00%
  • [Log Metrics] host-dns-lookup
  • [Log Metrics] host-dns-lookup

osde2e-stage-aws-e2e-upgrade-to-latest-z

Overall pass rate: 79.13%

Job ID Install Version Upgrade Version Pass Rate Failures
1346486679036235776 4.6.8 4.6.9 100.00%
1346547655223808000 4.6.8 4.6.9 0.00%
  • [install] BeforeSuite
1346728473137254400 4.6.8 4.6.9 95.65%
  • [Log Metrics] host-dns-lookup
  • [Log Metrics] host-dns-lookup
  • [upgrade] [Suite: e2e] Storage should be able to be expanded
  • [upgrade] [Suite: operators] CloudIngressOperator apischeme apischemes CR instance must be present on cluster
  • [upgrade] [Suite: operators] CloudIngressOperator apischeme cluster admin should be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] CloudIngressOperator apischeme dedicated admin should not be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works builds-pruner should run successfully
  • [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works deployments-pruner should run successfully
  • [upgrade] [Suite: operators] [OSD] RBAC Dedicated Admins SubjectPermission SubjectPermission should have the expected ClusterRoles, ClusterRoleBindings and RoleBindinsg
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator splunkforwarders admin should be able to manage SplunkForwarders CR
  • [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed empty node-label daemonset should get created
  • [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed infra node daemonset should get created
  • [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed worker node daemonset should get created
1346365863078400000 4.6.8 4.6.9 100.00%
1346426266059804672 4.6.8 4.6.9 100.00%
  • [Log Metrics] host-dns-lookup
  • [Log Metrics] host-dns-lookup