OSDe2e gcp Weather Report 2021-05-15 12:00:32.438947167 +0000 UTC
Summary
osde2e-prod-gcp-e2e-default
Overall pass rate: 73.12%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1393355690470281216 |
4.7.9 |
|
73.12% |
- [install] [Suite: e2e] Cluster state should have no alerts
- [install] [Suite: e2e] Cluster state should include Prometheus data
- [install] [Suite: e2e] ImageStreams should exist in the cluster
- [install] [Suite: e2e] MachineHealthChecks infra MHC should exist
- [install] [Suite: e2e] MachineHealthChecks should replace unhealthy nodes
- [install] [Suite: e2e] MachineHealthChecks worker MHC should exist
- [install] [Suite: e2e] Workload (redmine) should get created in the cluster
- [install] [Suite: e2e] [OSD] HTTP Strict Transport Security Validating HTTP strict transport security should be set for openshift-console OSD managed routes
- [install] [Suite: e2e] [OSD] HTTP Strict Transport Security Validating HTTP strict transport security should be set for openshift-monitoring OSD managed routes
- [install] [Suite: e2e] [OSD] OCM Quay Fallback uses a quay mirror when quay is unavailable
- [install] [Suite: e2e] [OSD] Prometheus Exporters should exist and be running in the cluster
- [install] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
- [install] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret exist under openshift-config namespace
- [install] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object
- [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
- [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion openshift-monitoring/configure-alertmanager-operator should be present and in succeeded state
- [install] [Suite: operators] [OSD] OSD Metrics Exporter Basic Test Operator Upgrade should upgrade from the replaced version
- [install] [Suite: operators] [OSD] RBAC Dedicated Admins SubjectPermission SubjectPermission should have the expected ClusterRoles, ClusterRoleBindings and RoleBindinsg
- [install] [Suite: service-definition] [OSD] NodeLabels Modifying nodeLabels is not allowed node-label cannot be added
- [install] [Suite: service-definition] [OSD] Privileged Containers Privileged containers are not allowed privileged container should not get created
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and customer group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and no group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and RH group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and no group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and RH group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and no group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with SRE IDP and no group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with other IDP and RH group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with SRE IDP and no group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with other IDP and RH group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage customer users with other IDP and no group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage non-protected redhat users with other IDP and no group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage protected redhat users with SRE IDP and RH group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with SRE IDP and no group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with other IDP and RH group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and RH group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and no group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and RH group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and no group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and RH group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and no group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and RH group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and no group
|
osde2e-prod-gcp-e2e-next
Overall pass rate: 51.88%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1393355691304947712 |
4.7.9 |
|
51.88% |
- [install] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster
- [install] [Suite: e2e] Cluster state should have no alerts
- [install] [Suite: e2e] Cluster state should include Prometheus data
- [install] [Suite: e2e] ImageStreams should exist in the cluster
- [install] [Suite: e2e] MachineHealthChecks should replace unhealthy nodes
- [install] [Suite: e2e] Pods should not be Failed
- [install] [Suite: e2e] Validation Webhook should exist and be running in the cluster
- [install] [Suite: e2e] Workload (redmine) should get created in the cluster
- [install] [Suite: e2e] [OSD] HTTP Strict Transport Security Validating HTTP strict transport security should be set for openshift-console OSD managed routes
- [install] [Suite: e2e] [OSD] HTTP Strict Transport Security Validating HTTP strict transport security should be set for openshift-monitoring OSD managed routes
- [install] [Suite: e2e] [OSD] OCM Quay Fallback uses a quay mirror when quay is unavailable
- [install] [Suite: e2e] [OSD] Prometheus Exporters should exist and be running in the cluster
- [install] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions can create pods with SCCs
- [install] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include anyuid
- [install] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include nonroot
- [install] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions scc-test new SCC does not break pods
- [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook dedicated admins can manage customer user identity
- [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook dedicated admins cannot manage redhat user identity
- [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook oauth service account can manage customer user identity
- [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook oauth service account can manage redhat user identity
- [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-admins cannot manage customer user identity
- [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-admins cannot manage redhat user identity
- [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-cluster-admins can manage customer user identity
- [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-cluster-admins can manage redhat user identity
- [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook random authenticated user cannot manage customer user identity
- [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook random authenticated user cannot manage redhat user identity
- [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook system:admin can manage customer user identity
- [install] [Suite: e2e] [OSD] identity validating webhook identity validating webhook system:admin can manage redhat user identity
- [install] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
- [install] [Suite: operators] AlertmanagerInhibitions should exist
- [install] [Suite: operators] CloudIngressOperator apischeme apischemes CR instance must be present on cluster
- [install] [Suite: operators] CloudIngressOperator apischeme cluster admin should be allowed to manage apischemes CR
- [install] [Suite: operators] CloudIngressOperator apischeme dedicated admin should not be allowed to manage apischemes CR
- [install] [Suite: operators] CloudIngressOperator publishingstrategies cluster admin should be allowed to manage publishingstrategies CR
- [install] [Suite: operators] CloudIngressOperator publishingstrategies dedicated admin should not be allowed to manage publishingstrategies CR
- [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
- [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion openshift-monitoring/configure-alertmanager-operator should be present and in succeeded state
- [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
- [install] [Suite: operators] [OSD] OSD Metrics Exporter Basic Test Operator Upgrade should upgrade from the replaced version
- [install] [Suite: operators] [OSD] OSD Metrics Exporter Basic Test clusterRoleBindings should exist
- [install] [Suite: operators] [OSD] OSD Metrics Exporter Basic Test clusterRoles should exist
- [install] [Suite: operators] [OSD] OSD Metrics Exporter Basic Test clusterServiceVersion openshift-osd-metrics/osd-metrics-exporter should be present and in succeeded state
- [install] [Suite: operators] [OSD] OSD Metrics Exporter Basic Test deployment should exist
- [install] [Suite: operators] [OSD] OSD Metrics Exporter Basic Test deployment should have all desired replicas ready
- [install] [Suite: operators] [OSD] OSD Metrics Exporter Basic Test service should exist
- [install] [Suite: operators] [OSD] Prune jobs pruner jobs should works builds-pruner should run successfully
- [install] [Suite: operators] [OSD] Prune jobs pruner jobs should works deployments-pruner should run successfully
- [install] [Suite: operators] [OSD] RBAC Dedicated Admins SubjectPermission SubjectPermission should have the expected ClusterRoles, ClusterRoleBindings and RoleBindinsg
- [install] [Suite: operators] [OSD] Splunk Forwarder Operator Operator Upgrade should upgrade from the replaced version
- [install] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed empty node-label daemonset should get created
- [install] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed infra node daemonset should get created
- [install] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed worker node daemonset should get created
- [install] [Suite: service-definition] [OSD] NodeLabels Modifying nodeLabels is not allowed node-label cannot be added
- [install] [Suite: service-definition] [OSD] Privileged Containers Privileged containers are not allowed privileged container should not get created
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and customer group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and no group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and RH group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and no group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and RH group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and no group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with SRE IDP and no group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with other IDP and RH group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with SRE IDP and no group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with other IDP and RH group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage customer users with other IDP and no group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage non-protected redhat users with other IDP and no group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage protected redhat users with SRE IDP and RH group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with SRE IDP and no group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with other IDP and RH group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and RH group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and no group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and RH group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and no group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and RH group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and no group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and RH group
- [install] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and no group
|
osde2e-prod-gcp-e2e-upgrade-to-latest-z
Overall pass rate: 98.24%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1393355692156391424 |
4.7.9-candidate |
4.7.11 |
98.14% |
- [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
- [upgrade] [Suite: e2e] Cluster state should include Prometheus data
- [upgrade] [Suite: e2e] Pods should be Running or Succeeded
- [upgrade] [Suite: e2e] Pods should not be Failed
- [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include anyuid
- [upgrade] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
|
1393114021661511680 |
4.7.9-candidate |
4.7.11 |
97.83% |
- [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
- [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
- [upgrade] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster
- [upgrade] [Suite: e2e] Cluster state should include Prometheus data
- [upgrade] [Suite: e2e] Pods should be Running or Succeeded
- [upgrade] [Suite: e2e] Pods should not be Failed
- [upgrade] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
|
1393234816614273024 |
4.7.9-candidate |
4.7.11 |
98.76% |
- [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
- [upgrade] [Suite: informing] [OSD] User Workload Monitoring User Workload Monitoring has the required prerequisites for testing
- [upgrade] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
- [upgrade] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
|
osde2e-prod-gcp-e2e-upgrade-to-next-y
Overall pass rate: 98.33%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1393114022471012352 |
4.7.9-candidate |
4.8.0-fc.3 |
98.44% |
- [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
- [upgrade] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster
- [upgrade] [Suite: e2e] Storage storage create PVCs
- [upgrade] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
- [upgrade] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
|
1393234817453133824 |
4.7.9-candidate |
4.8.0-fc.3 |
98.44% |
- [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
- [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
- [upgrade] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
- [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion openshift-monitoring/configure-alertmanager-operator should be present and in succeeded state
- [upgrade] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
|
1393355692991057920 |
4.7.9-candidate |
4.8.0-fc.3 |
98.12% |
- [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
- [install] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
- [upgrade] [Suite: e2e] Cluster state should have no alerts
- [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions scc-test new SCC does not break pods
- [upgrade] [Suite: informing] [OSD] hive ownership validating webhook hiveownership validating webhook dedicated admins cannot delete managed CRQs
- [upgrade] [Suite: operators] [OSD] Custom Domains Operator Should allow dedicated-admins to create domains Should be resolvable by external services
|
osde2e-stage-gcp-e2e-default
Overall pass rate: 100.00%
osde2e-stage-gcp-e2e-next-y
Overall pass rate: 99.37%
Job ID |
Install Version |
Upgrade Version |
Pass Rate |
Failures |
1393355704751886336 |
4.8.0-fc.3-candidate |
|
99.37% |
- [install] [Suite: operators] [OSD] RBAC Operator Operator Upgrade should upgrade from the replaced version
|