OSDe2e aws Weather Report 2020-11-05 12:00:21.058088528 +0000 UTC

Share on:

Summary

Job Name Pass Rate More detail
osde2e-int-aws-e2e-osd-default-nightly 99.62% More Detail
osde2e-int-aws-e2e-osd-default-plus-one-nightly 99.62% More Detail
osde2e-prod-aws-e2e-default 99.54% More Detail
osde2e-prod-aws-e2e-middle-imageset 100.00% More Detail
osde2e-prod-aws-e2e-next 99.54% More Detail
osde2e-prod-aws-e2e-oldest-imageset 100.00% More Detail
osde2e-prod-aws-e2e-upgrade-default-next 95.60% More Detail
osde2e-prod-aws-e2e-upgrade-prod-minus-one-to-next 80.77% More Detail
osde2e-stage-aws-e2e-default 79.69% More Detail
osde2e-stage-aws-e2e-middle-imageset 100.00% More Detail
osde2e-stage-aws-e2e-next-y 99.54% More Detail
osde2e-stage-aws-e2e-next-z 79.54% More Detail
osde2e-stage-aws-e2e-oldest-imageset 100.00% More Detail
osde2e-stage-aws-e2e-upgrade-default-next 0.00% More Detail
osde2e-stage-aws-e2e-upgrade-default-next-z 57.88% More Detail

osde2e-int-aws-e2e-osd-default-nightly

Overall pass rate: 99.62%

Job ID Install Version Upgrade Version Pass Rate Failures
1324018816534974464 4.5.0-0.nightly-2020-11-02-080846 100.00%
1324139583734026240 4.5.0-0.nightly-2020-11-04-173226 99.23%
  • [install] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object

osde2e-int-aws-e2e-osd-default-plus-one-nightly

Overall pass rate: 99.62%

Job ID Install Version Upgrade Version Pass Rate Failures
1324018818208501760 4.6.0-0.nightly-2020-11-03-172112 100.00%
  • [Log Metrics] host-dns-lookup
1324139585344638976 4.6.0-0.nightly-2020-11-03-172112 99.23%
  • [install] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object

osde2e-prod-aws-e2e-default

Overall pass rate: 99.54%

Job ID Install Version Upgrade Version Pass Rate Failures
1324199942608130050 4.5.11 100.00%
1323958412660183040 4.5.11 100.00%
1324018820729278464 4.5.11 97.69%
  • [Log Metrics] host-dns-lookup
  • [install] [Suite: e2e] Cluster state should have no alerts
  • [install] [Suite: e2e] Routes should be functioning for Console
  • [install] [Suite: e2e] Routes should be functioning for oauth
1324079146875228160 4.5.11 100.00%
1324139587886387200 4.5.11 100.00%

osde2e-prod-aws-e2e-middle-imageset

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1323958414254018560 4.5.16 100.00%

osde2e-prod-aws-e2e-next

Overall pass rate: 99.54%

Job ID Install Version Upgrade Version Pass Rate Failures
1324199942671044608 4.6.1 100.00%
1323958415092879360 4.6.1 100.00%
1324018822478303232 4.6.1 97.69%
  • [install] [Suite: operators] [OSD] Splunk Forwarder Operator configmaps should exist
  • [install] [Suite: operators] [OSD] Splunk Forwarder Operator deployment should exist
  • [install] [Suite: operators] [OSD] Splunk Forwarder Operator deployment should have all desired replicas ready
1324079147273687040 4.6.1 100.00%
1324139589538942976 4.6.1 100.00%

osde2e-prod-aws-e2e-oldest-imageset

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1323958415935934464 4.4.11 100.00%

osde2e-prod-aws-e2e-upgrade-default-next

Overall pass rate: 95.60%

Job ID Install Version Upgrade Version Pass Rate Failures
1323897780195823616 4.5.11 4.5.16 99.23%
  • [upgrade] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage publishingstrategies CR
1323958413419352064 4.5.11 4.5.16 99.23%
  • [upgrade] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage publishingstrategies CR
1324018821568139264 4.5.11 4.5.16 99.23%
  • [upgrade] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage publishingstrategies CR
1324079146925559808 4.5.11 4.5.16 99.23%
  • [upgrade] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage publishingstrategies CR
1324139588695887872 4.5.11 4.5.16 99.23%
  • [upgrade] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage publishingstrategies CR
1324199942633295872 4.5.11 4.5.16 99.23%
  • [upgrade] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage publishingstrategies CR
1324260355689418752 4.5.11 4.5.16 73.85%
  • [Log Metrics] cluster-mgmt-500
  • [Log Metrics] host-dns-lookup
  • [upgrade] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster
  • [upgrade] [Suite: e2e] Cluster state should include Prometheus data
  • [upgrade] [Suite: e2e] ImageStreams should exist in the cluster
  • [upgrade] [Suite: e2e] Pods should be Running or Succeeded
  • [upgrade] [Suite: e2e] Pods should not be Failed
  • [upgrade] [Suite: e2e] Routes should be created for Console
  • [upgrade] [Suite: e2e] Routes should be created for oauth
  • [upgrade] [Suite: e2e] Routes should be functioning for Console
  • [upgrade] [Suite: e2e] Routes should be functioning for oauth
  • [upgrade] [Suite: e2e] Workload (guestbook) should get created in the cluster
  • [upgrade] [Suite: e2e] Workload (redmine) should get created in the cluster
  • [upgrade] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret exist under openshift-config namespace
  • [upgrade] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object
  • [upgrade] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage publishingstrategies CR
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator roleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator roles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit BackupStorageLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Backups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DeleteBackupRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DownloadRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeBackups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeRestores
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Restore
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit RestricRepository
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Schedules
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit ServerStatusRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit VolumeSnapshotLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit BackupStorageLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Backups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DeleteBackupRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DownloadRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeBackups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeRestores
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Restore
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit RestricRepository
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Schedules
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit ServerStatusRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit VolumeSnapshotLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero backups should be complete
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and customer group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins can manage customer users with other IdP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated admins cannot manage redhat users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook dedicated-admins cannot delete protected redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can delete protected redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage customer users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage non-protected redhat users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins can manage protected redhat users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook osd-sre-cluster-admins cannot create/update protected redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage customer users with other IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with SRE IDP and no group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and RH group
  • [upgrade] [Suite: service-definition] [OSD] user validating webhook user validating webhook system:admin can manage redhat users with other IDP and no group

osde2e-prod-aws-e2e-upgrade-prod-minus-one-to-next

Overall pass rate: 80.77%

Job ID Install Version Upgrade Version Pass Rate Failures
1324169740758814720 4.4.16 4.5.16 80.77%
  • [Log Metrics] host-dns-lookup
  • [upgrade] [Suite: app-builds] OpenShift Application Build E2E should get created in the cluster
  • [upgrade] [Suite: e2e] Workload (guestbook) should get created in the cluster
  • [upgrade] [Suite: operators] AlertmanagerInhibitions inhibits ClusterOperatorDegraded
  • [upgrade] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage publishingstrategies CR
  • [upgrade] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator dedicated admin should not be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator roleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator roles should exist
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit BackupStorageLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Backups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DeleteBackupRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit DownloadRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeBackups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit PodVolumeRestores
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Restore
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit RestricRepository
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit Schedules
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit ServerStatusRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be allowed to edit VolumeSnapshotLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit BackupStorageLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Backups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DeleteBackupRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit DownloadRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeBackups
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit PodVolumeRestores
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Restore
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit RestricRepository
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit Schedules
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit ServerStatusRequests
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero Access should be forbidden to edit VolumeSnapshotLocations
  • [upgrade] [Suite: operators] [OSD] Managed Velero Operator velero backups should be complete
  • [upgrade] [Suite: operators] [OSD] RBAC Dedicated Admins SubjectPermission SubjectPermission should have the expected ClusterRoles, ClusterRoleBindings and RoleBindinsg
  • [upgrade] [Suite: operators] [OSD] RBAC Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] RBAC Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator clusterServiceVersion should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] RBAC Operator deployment should have all desired replicas ready
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator Operator Upgrade should upgrade from the replaced version
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator clusterRoleBindings should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator clusterRoles should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator clusterServiceVersion should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator configmaps should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator deployment should exist
  • [upgrade] [Suite: operators] [OSD] Splunk Forwarder Operator deployment should have all desired replicas ready

osde2e-stage-aws-e2e-default

Overall pass rate: 79.69%

Job ID Install Version Upgrade Version Pass Rate Failures
1324139590377803776 4.5.11 0.00%
  • [install] BeforeSuite
1324199942700404736 4.5.11 99.23%
  • [install] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object
1323958416808349696 4.5.11 100.00%
1324018823245860864 4.5.11 100.00%
1324079148112547840 4.5.11 99.23%
  • [install] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object

osde2e-stage-aws-e2e-middle-imageset

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1323958419295571968 4.5.16-fast 100.00%

osde2e-stage-aws-e2e-next-y

Overall pass rate: 99.54%

Job ID Install Version Upgrade Version Pass Rate Failures
1324139593741635584 4.6.1 99.23%
  • [install] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object
1324199945598668800 4.6.2-candidate 99.23%
  • [install] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object
1323958421740851200 4.6.1 100.00%
  • [Log Metrics] host-dns-lookup
1324018827431776256 4.6.1 100.00%
1324079151455408128 4.6.1 99.23%
  • [install] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object

osde2e-stage-aws-e2e-next-z

Overall pass rate: 79.54%

Job ID Install Version Upgrade Version Pass Rate Failures
1324199944831111168 4.5.18-candidate 99.23%
  • [install] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object
1323958420126044160 4.5.17-candidate 100.00%
1324018826592915456 4.5.17-candidate 0.00%
  • [install] BeforeSuite
1324079150633324544 4.5.17-candidate 99.23%
  • [install] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object
1324139592890191872 4.5.18-candidate 99.23%
  • [install] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object

osde2e-stage-aws-e2e-oldest-imageset

Overall pass rate: 100.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1323958422676180992 4.4.11-fast 100.00%

osde2e-stage-aws-e2e-upgrade-default-next

Overall pass rate: 0.00%

Job ID Install Version Upgrade Version Pass Rate Failures
1324199943979667456 4.5.11 4.6.0-rc.4 0.00%
  • [install] BeforeSuite

osde2e-stage-aws-e2e-upgrade-default-next-z

Overall pass rate: 57.88%

Job ID Install Version Upgrade Version Pass Rate Failures
1324199943220498432 4.5.11 4.5.16 49.62%
  • [install] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object
  • [upgrade] BeforeSuite
1323897783555461120 4.5.11 4.5.16 99.23%
  • [upgrade] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage publishingstrategies CR
1323958417680764928 4.5.11 4.5.16 0.00%
  • [install] BeforeSuite
1324018824088915968 4.5.11 4.5.16 99.23%
  • [upgrade] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage apischemes CR
  • [upgrade] [Suite: operators] [OSD] Cloud Ingress Operator cloud-ingress-operator admin should be allowed to manage publishingstrategies CR
1324079148980768768 4.5.11 4.5.16 49.62%
  • [install] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object
  • [upgrade] BeforeSuite
1324139591216664576 4.5.11 4.5.16 49.62%
  • [install] [Suite: operators] [OSD] Certman Operator certificate secret should be applied when cluster installed certificate secret should be applied to apiserver object
  • [upgrade] BeforeSuite