OSDe2e gcp Weather Report 2021-05-15 12:00:32.438947167 +0000 UTC

Share on:

Summary

Job Name Pass Rate More detail
osde2e-prod-gcp-e2e-default 73.12% More Detail
osde2e-prod-gcp-e2e-next 51.88% More Detail
osde2e-prod-gcp-e2e-upgrade-to-latest-z 98.24% More Detail
osde2e-prod-gcp-e2e-upgrade-to-next-y 98.33% More Detail
osde2e-stage-gcp-e2e-default 100.00% More Detail
osde2e-stage-gcp-e2e-next-y 99.37% More Detail

osde2e-prod-gcp-e2e-default

Overall pass rate: 73.12%

Job ID Install Version Upgrade Version Pass Rate Failures
1393355690470281216 4.7.9 73.12%
  • [install] [Suite: e2e] Cluster state should have no alerts
  • [install] [Suite: e2e] Cluster state should include Prometheus data
  • [install] [Suite: e2e] ImageStreams should exist in the cluster
  • [install] [Suite: e2e] MachineHealthChecks infra MHC should exist
  • [install] [Suite: e2e] MachineHealthChecks should replace unhealthy nodes
  • [install] [Suite: e2e] MachineHealthChecks worker MHC should exist
  • [install] [Suite: e2e] Workload (redmine) should get created in the cluster
  • [install] [Suite: e2e] [OSD] HTTP Strict Transport Security Validating HTTP strict transport security should be set for openshift-console OSD managed routes
  • [install] [Suite: e2e] [OSD] HTTP Strict Transport Security Validating HTTP strict transport security should be set for openshift-monitoring OSD managed routes
  • [install] [Suite: e2e] [OSD] OCM Quay Fallback uses a quay mirror when quay is unavailable
  • [install] [Suite: e2e] [OSD] Prometheus Exporters should exist and be running in the cluster
  • [install] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
  • [install] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret exist under openshift-config namespace
  • [install] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion openshift-monitoring/configure-alertmanager-operator should be present and in succeeded state
  • [install] [Suite: operators] [OSD] OSD Metrics Exporter Basic Test Operator Upgrade should upgrade from the replaced version
  • [install] [Suite: operators] [OSD] RBAC Dedicated Admins SubjectPermission SubjectPermission should have the expected ClusterRoles, ClusterRoleBindings and RoleBindinsg
  • [install] [Suite: service-definition] [OSD] NodeLabels Modifying nodeLabels is not allowed node-label cannot be added
  • [install] [Suite: service-definition] [OSD] Privileged Containers Privileged containers are not allowed privileged container should not get created
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and customer group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with SRE IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with other IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with SRE IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with other IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage customer users with other IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage non-protected redhat users with other IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage protected redhat users with SRE IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with SRE IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with other IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and no group

osde2e-prod-gcp-e2e-next

Overall pass rate: 51.88%

Job ID Install Version Upgrade Version Pass Rate Failures
1393355691304947712 4.7.9 51.88%
  • [install] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster
  • [install] [Suite: e2e] Cluster state should have no alerts
  • [install] [Suite: e2e] Cluster state should include Prometheus data
  • [install] [Suite: e2e] ImageStreams should exist in the cluster
  • [install] [Suite: e2e] MachineHealthChecks should replace unhealthy nodes
  • [install] [Suite: e2e] Pods should not be Failed
  • [install] [Suite: e2e] Validation Webhook should exist and be running in the cluster
  • [install] [Suite: e2e] Workload (redmine) should get created in the cluster
  • [install] [Suite: e2e] [OSD] HTTP Strict Transport Security Validating HTTP strict transport security should be set for openshift-console OSD managed routes
  • [install] [Suite: e2e] [OSD] HTTP Strict Transport Security Validating HTTP strict transport security should be set for openshift-monitoring OSD managed routes
  • [install] [Suite: e2e] [OSD] OCM Quay Fallback uses a quay mirror when quay is unavailable
  • [install] [Suite: e2e] [OSD] Prometheus Exporters should exist and be running in the cluster
  • [install] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions can create pods with SCCs
  • [install] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include anyuid
  • [install] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include nonroot
  • [install] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions scc-test new SCC does not break pods
  • [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook dedicated admins can manage customer user identity
  • [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook dedicated admins cannot manage redhat user identity
  • [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook oauth service account can manage customer user identity
  • [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook oauth service account can manage redhat user identity
  • [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-admins cannot manage customer user identity
  • [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-admins cannot manage redhat user identity
  • [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-cluster-admins can manage customer user identity
  • [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-cluster-admins can manage redhat user identity
  • [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook random authenticated user cannot manage customer user identity
  • [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook random authenticated user cannot manage redhat user identity
  • [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook system:admin can manage customer user identity
  • [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook system:admin can manage redhat user identity
  • [install] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
  • [install] [Suite: operators] AlertmanagerInhibitions should exist
  • [install] [Suite: operators] CloudIngressOperator apischeme apischemes CR instance must be present on cluster
  • [install] [Suite: operators] CloudIngressOperator apischeme cluster admin should be allowed to manage apischemes CR
  • [install] [Suite: operators] CloudIngressOperator apischeme dedicated admin should not be allowed to manage apischemes CR
  • [install] [Suite: operators] CloudIngressOperator publishingstrategies cluster admin should be allowed to manage publishingstrategies CR
  • [install] [Suite: operators] CloudIngressOperator publishingstrategies dedicated admin should not be allowed to manage publishingstrategies CR
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion openshift-monitoring/configure-alertmanager-operator should be present and in succeeded state
  • [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
  • [install] [Suite: operators] [OSD] OSD Metrics Exporter Basic Test Operator Upgrade should upgrade from the replaced version
  • [install] [Suite: operators] [OSD] OSD Metrics Exporter Basic Test clusterRoleBindings should exist
  • [install] [Suite: operators] [OSD] OSD Metrics Exporter Basic Test clusterRoles should exist
  • [install] [Suite: operators] [OSD] OSD Metrics Exporter Basic Test clusterServiceVersion openshift-osd-metrics/osd-metrics-exporter should be present and in succeeded state
  • [install] [Suite: operators] [OSD] OSD Metrics Exporter Basic Test deployment should exist
  • [install] [Suite: operators] [OSD] OSD Metrics Exporter Basic Test deployment should have all desired replicas ready
  • [install] [Suite: operators] [OSD] OSD Metrics Exporter Basic Test service should exist
  • [install] [Suite: operators] [OSD] Prune jobs pruner jobs should works builds-pruner should run successfully
  • [install] [Suite: operators] [OSD] Prune jobs pruner jobs should works deployments-pruner should run successfully
  • [install] [Suite: operators] [OSD] RBAC Dedicated Admins SubjectPermission SubjectPermission should have the expected ClusterRoles, ClusterRoleBindings and RoleBindinsg
  • [install] [Suite: operators] [OSD] Splunk Forwarder Operator Operator Upgrade should upgrade from the replaced version
  • [install] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed empty node-label daemonset should get created
  • [install] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed infra node daemonset should get created
  • [install] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed worker node daemonset should get created
  • [install] [Suite: service-definition] [OSD] NodeLabels Modifying nodeLabels is not allowed node-label cannot be added
  • [install] [Suite: service-definition] [OSD] Privileged Containers Privileged containers are not allowed privileged container should not get created
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and customer group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with SRE IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with other IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with SRE IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with other IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage customer users with other IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage non-protected redhat users with other IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage protected redhat users with SRE IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with SRE IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with other IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and no group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and RH group
  • [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and no group

osde2e-prod-gcp-e2e-upgrade-to-latest-z

Overall pass rate: 98.24%

Job ID Install Version Upgrade Version Pass Rate Failures
1393355692156391424 4.7.9-candidate 4.7.11 98.14%
  • [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
  • [upgrade] [Suite: e2e] Cluster state should include Prometheus data
  • [upgrade] [Suite: e2e] Pods should be Running or Succeeded
  • [upgrade] [Suite: e2e] Pods should not be Failed
  • [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include anyuid
  • [upgrade] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
1393114021661511680 4.7.9-candidate 4.7.11 97.83%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
  • [upgrade] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster
  • [upgrade] [Suite: e2e] Cluster state should include Prometheus data
  • [upgrade] [Suite: e2e] Pods should be Running or Succeeded
  • [upgrade] [Suite: e2e] Pods should not be Failed
  • [upgrade] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
1393234816614273024 4.7.9-candidate 4.7.11 98.76%
  • [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
  • [upgrade] [Suite: informing] [OSD] User Workload Monitoring User Workload Monitoring has the required prerequisites for testing
  • [upgrade] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
  • [upgrade] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services

osde2e-prod-gcp-e2e-upgrade-to-next-y

Overall pass rate: 98.33%

Job ID Install Version Upgrade Version Pass Rate Failures
1393114022471012352 4.7.9-candidate 4.8.0-fc.3 98.44%
  • [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
  • [upgrade] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster
  • [upgrade] [Suite: e2e] Storage storage create PVCs
  • [upgrade] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
  • [upgrade] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
1393234817453133824 4.7.9-candidate 4.8.0-fc.3 98.44%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
  • [upgrade] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion openshift-monitoring/configure-alertmanager-operator should be present and in succeeded state
  • [upgrade] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
1393355692991057920 4.7.9-candidate 4.8.0-fc.3 98.12%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
  • [upgrade] [Suite: e2e] Cluster state should have no alerts
  • [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions scc-test new SCC does not break pods
  • [upgrade] [Suite: informing] [OSD] hive ownership validating webhook hiveownership validating webhook dedicated admins cannot delete managed CRQs
  • [upgrade] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services

osde2e-stage-gcp-e2e-default

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1393355703896248320 4.7.9 100.00%

osde2e-stage-gcp-e2e-next-y

Overall pass rate: 99.37%

Job ID Install Version Upgrade Version Pass Rate Failures
1393355704751886336 4.8.0-fc.3-candidate 99.37%
  • [install] [Suite: operators] [OSD] RBAC Operator Operator Upgrade should upgrade from the replaced version