OSDe2e aws Weather Report 2021-01-29 12:00:22.667914716 +0000 UTC

Share on:

Summary

Job Name Pass Rate More detail
osde2e-int-aws-e2e-upgrade-to-latest-z 0.00% More Detail
osde2e-prod-aws-e2e-default 99.90% More Detail
osde2e-prod-aws-e2e-middle-imageset 99.64% More Detail
osde2e-prod-aws-e2e-next 100.00% More Detail
osde2e-prod-aws-e2e-oldest-imageset 99.64% More Detail
osde2e-prod-aws-e2e-upgrade-prod-minus-four-to-next 0.00% More Detail
osde2e-prod-aws-e2e-upgrade-prod-minus-one-to-next 100.00% More Detail
osde2e-prod-aws-e2e-upgrade-prod-minus-three-to-next 100.00% More Detail
osde2e-prod-aws-e2e-upgrade-prod-minus-two-to-next 100.00% More Detail
osde2e-prod-aws-e2e-upgrade-prod-plus-one-to-latest 100.00% More Detail
osde2e-prod-aws-e2e-upgrade-to-latest 87.90% More Detail
osde2e-stage-aws-e2e-default 98.76% More Detail
osde2e-stage-aws-e2e-middle-imageset 48.91% More Detail
osde2e-stage-aws-e2e-next-y 0.00% More Detail
osde2e-stage-aws-e2e-next-z 98.76% More Detail
osde2e-stage-aws-e2e-oldest-imageset 48.91% More Detail
osde2e-stage-aws-e2e-upgrade-to-latest 53.26% More Detail

osde2e-int-aws-e2e-upgrade-to-latest-z

Overall pass rate: 0.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1354821772184129536 4.6.8 4.6.13 0.00%
  • [install] BeforeSuite
1354942596354412544 4.6.8 4.6.13 0.00%
  • [install] BeforeSuite
1355063266237222912 4.6.8 4.6.13 0.00%
  • [install] BeforeSuite
1354700972001071104 4.6.8 4.6.12 0.00%
  • [install] BeforeSuite

osde2e-prod-aws-e2e-default

Overall pass rate: 99.90%

Job ID Install Version Upgrade Version Pass Rate Failures
1354761377687801856 4.6.8 100.00%
1354821775539572736 4.6.8 100.00%
1354882157062918144 4.6.8 99.28%
  • [Log Metrics] host-dns-lookup
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
1354942599722438656 4.6.8 100.00%
1355002862400180224 4.6.8 100.00%
  • [Log Metrics] host-dns-lookup
1355063269848518656 4.6.8 100.00%
1354700975360708608 4.6.8 100.00%

osde2e-prod-aws-e2e-middle-imageset

Overall pass rate: 99.64%

Job ID Install Version Upgrade Version Pass Rate Failures
1354761379352940544 4.6.3 100.00%
1354399010936328192 4.6.3 99.28%
  • [install] [Suite: operators] AlertmanagerInhibitions should exist

osde2e-prod-aws-e2e-next

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1354882157171970048 4.6.13 100.00%
  • [Log Metrics] host-dns-lookup
1354942602226438144 4.6.13 100.00%
1355002862458900480 4.6.13 100.00%
1355063272360906752 4.6.13 100.00%
1354700977889873920 4.6.12 100.00%
  • [Log Metrics] host-dns-lookup
1354761380187607040 4.6.12 100.00%
  • [Log Metrics] host-dns-lookup
1354821777221488640 4.6.13 100.00%
  • [Log Metrics] host-dns-lookup

osde2e-prod-aws-e2e-oldest-imageset

Overall pass rate: 99.64%

Job ID Install Version Upgrade Version Pass Rate Failures
1354399012614049792 4.5.11 99.28%
  • [install] [Suite: operators] AlertmanagerInhibitions should exist
1354761381030662144 4.5.11 100.00%

osde2e-prod-aws-e2e-upgrade-prod-minus-four-to-next

Overall pass rate: 0.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1354791567268777984 4.6.1 4.6.13 0.00%
  • [install] BeforeSuite

osde2e-prod-aws-e2e-upgrade-prod-minus-one-to-next

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1354972667479855104 4.6.6 4.6.13 100.00%
  • [Log Metrics] host-dns-lookup
  • [Log Metrics] host-dns-lookup

osde2e-prod-aws-e2e-upgrade-prod-minus-three-to-next

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1354731162550931456 4.6.3 4.6.12 100.00%
  • [Log Metrics] host-dns-lookup
  • [Log Metrics] host-dns-lookup

osde2e-prod-aws-e2e-upgrade-prod-minus-two-to-next

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1354670767261880320 4.6.4 4.6.12 100.00%
  • [Log Metrics] host-dns-lookup
  • [Log Metrics] host-dns-lookup
1355033073258860544 4.6.4 4.6.13 100.00%

osde2e-prod-aws-e2e-upgrade-prod-plus-one-to-latest

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1354882157113249792 4.6.12 4.6.13 100.00%

osde2e-prod-aws-e2e-upgrade-to-latest

Overall pass rate: 87.90%

Job ID Install Version Upgrade Version Pass Rate Failures
1354700977034235904 4.6.8 4.6.12 100.00%
1354882157083889664 4.6.8 4.6.13 100.00%
  • [Log Metrics] host-dns-lookup
  • [Log Metrics] host-dns-lookup
1354942601400160256 4.6.8 4.6.13 100.00%
1355002862429540352 4.6.8 4.6.13 89.86%
  • [Log Metrics] host-dns-lookup
  • [upgrade] [Suite: e2e] Cluster state should have no alerts
  • [upgrade] [Suite: e2e] ImageStreams should exist in the cluster
  • [upgrade] [Suite: e2e] Pods should be Running or Succeeded
  • [upgrade] [Suite: e2e] Pods should not be Failed
  • [upgrade] [Suite: e2e] Routes should be created for Console
  • [upgrade] [Suite: e2e] Routes should be created for oauth
  • [upgrade] [Suite: e2e] Routes should be functioning for Console
  • [upgrade] [Suite: e2e] Routes should be functioning for oauth
  • [upgrade] [Suite: e2e] Storage should be able to be expanded
  • [upgrade] [Suite: e2e] Workload (guestbook) should get created in the cluster
  • [upgrade] [Suite: e2e] [OSD] Prometheus Exporters should exist and be running in the cluster
  • [upgrade] [Suite: operators] CloudIngressOperator apischeme apischemes CR instance must be present on cluster
  • [upgrade] [Suite: operators] CloudIngressOperator apischeme cluster admin should be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] CloudIngressOperator apischeme dedicated admin should not be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] CloudIngressOperator deployment should exist
  • [upgrade] [Suite: operators] CloudIngressOperator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] CloudIngressOperator publishingstrategies cluster admin should be allowed to manage publishingstrategies CR
  • [upgrade] [Suite: operators] CloudIngressOperator publishingstrategies dedicated admin should not be allowed to manage publishingstrategies CR
  • [upgrade] [Suite: operators] CloudIngressOperator rh-api-test cidr block changes should updated the service
  • [upgrade] [Suite: operators] CloudIngressOperator rh-api-test hostname should resolve
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works builds-pruner should run successfully
  • [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works deployments-pruner should run successfully
  • [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed empty node-label daemonset should get created
  • [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed infra node daemonset should get created
  • [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed worker node daemonset should get created
  • [upgrade] [Suite: service-definition] [OSD] NodeLabels Modifying nodeLabels is not allowed node-label cannot be added
  • [upgrade] [Suite: service-definition] [OSD] Privileged Containers Privileged containers are not allowed privileged container should not get created
1355063271522045952 4.6.8 4.6.13 49.64%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] BeforeSuite

osde2e-stage-aws-e2e-default

Overall pass rate: 98.76%

Job ID Install Version Upgrade Version Pass Rate Failures
1354882157184552960 4.6.8 98.55%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
1354942603069493248 4.6.8 98.55%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
1355002862517620736 4.6.8 98.55%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
1355063274030239744 4.6.8 98.55%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
1354700979550818304 4.6.8 98.55%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
1354761381886300160 4.6.8 100.00%
  • [Log Metrics] host-dns-lookup
1354821778056155136 4.6.8 98.55%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist

osde2e-stage-aws-e2e-middle-imageset

Overall pass rate: 48.91%

Job ID Install Version Upgrade Version Pass Rate Failures
1354399015969492992 4.5.23 97.83%
  • [install] [Suite: operators] AlertmanagerInhibitions should exist
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
1354761383538855936 4.5.24-candidate 0.00%
  • [install] BeforeSuite

osde2e-stage-aws-e2e-next-y

Overall pass rate: 0.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1354882158509953024 4.7.0-fc.4-candidate 0.00%
  • [Log Metrics] cluster-mgmt-500
  • [install] BeforeSuite
1354942608123629568 4.7.0-fc.4-candidate 0.00%
  • [install] BeforeSuite
1355002863838826496 4.7.0-fc.4-candidate 0.00%
  • [install] BeforeSuite
1355063277394071552 4.7.0-fc.4-candidate 0.00%
  • [install] BeforeSuite
1354700982084177920 4.7.0-fc.4-candidate 0.00%
  • [install] BeforeSuite
1354761385254326272 4.7.0-fc.4-candidate 0.00%
  • [install] BeforeSuite
1354821781415792640 4.7.0-fc.4-candidate 0.00%
  • [install] BeforeSuite

osde2e-stage-aws-e2e-next-z

Overall pass rate: 98.76%

Job ID Install Version Upgrade Version Pass Rate Failures
1354700981228539904 4.6.15-candidate 98.55%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
1354761384428048384 4.6.15-candidate 100.00%
1354821780576931840 4.6.15-candidate 98.55%
  • [Log Metrics] host-dns-lookup
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
1354882157700452352 4.6.15-candidate 98.55%
  • [Log Metrics] host-dns-lookup
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
1354942607272185856 4.6.15-candidate 97.83%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
1355002863025131520 4.6.15-candidate 98.55%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
1355063276546822144 4.6.15-candidate 99.28%
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist

osde2e-stage-aws-e2e-oldest-imageset

Overall pass rate: 48.91%

Job ID Install Version Upgrade Version Pass Rate Failures
1354399018486075392 4.4.16 97.83%
  • [install] [Suite: operators] AlertmanagerInhibitions should exist
  • [install] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [install] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
1354761386097381376 4.4.16 0.00%
  • [install] BeforeSuite

osde2e-stage-aws-e2e-upgrade-to-latest

Overall pass rate: 53.26%

Job ID Install Version Upgrade Version Pass Rate Failures
1354761382720966656 4.6.8 4.6.12 53.26%
  • [Log Metrics] host-dns-lookup
  • [Log Metrics] host-dns-lookup
  • [upgrade] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster
  • [upgrade] [Suite: e2e] Cluster state should have no alerts
  • [upgrade] [Suite: e2e] Cluster state should include Prometheus data
  • [upgrade] [Suite: e2e] ImageStreams should exist in the cluster
  • [upgrade] [Suite: e2e] MachineHealthChecks infra MHC should exist
  • [upgrade] [Suite: e2e] MachineHealthChecks should replace unhealthy nodes
  • [upgrade] [Suite: e2e] MachineHealthChecks worker MHC should exist
  • [upgrade] [Suite: e2e] Pods should be Running or Succeeded
  • [upgrade] [Suite: e2e] Pods should not be Failed
  • [upgrade] [Suite: e2e] Routes should be created for Console
  • [upgrade] [Suite: e2e] Routes should be created for oauth
  • [upgrade] [Suite: e2e] Routes should be functioning for Console
  • [upgrade] [Suite: e2e] Routes should be functioning for oauth
  • [upgrade] [Suite: e2e] Storage should be able to be expanded
  • [upgrade] [Suite: e2e] [OSD] Prometheus Exporters should exist and be running in the cluster
  • [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions can create pods with SCCs
  • [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include anyuid
  • [upgrade] [Suite: e2e] [OSD] RBAC Dedicated Admins SCC permissions Dedicated Admin permissions should include nonroot
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook dedicated admins can manage customer user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook dedicated admins cannot manage redhat user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook oauth service account can manage customer user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook oauth service account can manage redhat user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-admins cannot manage customer user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-admins cannot manage redhat user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-cluster-admins can manage customer user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook osd-sre-cluster-admins can manage redhat user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook random authenticated user cannot manage customer user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook random authenticated user cannot manage redhat user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook system:admin can manage customer user identity
  • [upgrade] [Suite: e2e] [OSD] identity validating webhook identity validating webhook system:admin can manage redhat user identity
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Members of SRE groups can manage all namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users can manage all non-privileged namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Non-privileged users cannot manage privileged namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook Privileged users can manage all namespaces
  • [upgrade] [Suite: e2e] [OSD] namespace validating webhook namespace validating webhook dedicated admins cannot manage privileged namespaces
  • [upgrade] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
  • [upgrade] [Suite: operators] CloudIngressOperator apischeme apischemes CR instance must be present on cluster
  • [upgrade] [Suite: operators] CloudIngressOperator apischeme cluster admin should be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] CloudIngressOperator apischeme dedicated admin should not be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] CloudIngressOperator deployment should exist
  • [upgrade] [Suite: operators] CloudIngressOperator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] CloudIngressOperator publishingstrategies cluster admin should be allowed to manage publishingstrategies CR
  • [upgrade] [Suite: operators] CloudIngressOperator publishingstrategies dedicated admin should not be allowed to manage publishingstrategies CR
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator clusterServiceVersion should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator roleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator roles should exist
  • [upgrade] [Suite: operators] [OSD] Configure AlertManager Operator serviceAccounts should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator roleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator roles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit BackupStorageLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Backups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DeleteBackupRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DownloadRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeBackups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeRestores
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Restore
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit RestricRepository
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Schedules
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit ServerStatusRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit VolumeSnapshotLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit BackupStorageLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Backups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DeleteBackupRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DownloadRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeBackups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeRestores
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Restore
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit RestricRepository
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Schedules
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit ServerStatusRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit VolumeSnapshotLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero backups should be complete
  • [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works builds-pruner should run successfully
  • [upgrade] [Suite: operators] [OSD] Prune jobs pruner jobs should works deployments-pruner should run successfully
  • [upgrade] [Suite: operators] [OSD] RBAC Dedicated Admins SubjectPermission SubjectPermission should have the expected ClusterRoles, ClusterRoleBindings and RoleBindinsg
  • [upgrade] [Suite: operators] [OSD] RBAC Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] RBAC Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator clusterServiceVersion should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator splunkforwarders admin should be able to manage SplunkForwarders CR
  • [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed empty node-label daemonset should get created
  • [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed infra node daemonset should get created
  • [upgrade] [Suite: service-definition] [OSD] DaemonSets DaemonSets are not allowed worker node daemonset should get created
  • [upgrade] [Suite: service-definition] [OSD] NodeLabels Modifying nodeLabels is not allowed node-label cannot be added
  • [upgrade] [Suite: service-definition] [OSD] Privileged Containers Privileged containers are not allowed privileged container should not get created
  • [upgrade] [Suite: service-definition] [OSD] regularuser validating webhook regularuser validating webhook Privledged users allowed to create autoscalers and delete clusterversion objects
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and customer group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage customer users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage non-protected redhat users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage protected redhat users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and no group