Job:
aggregated-azure-ovn-upgrade-4.16-micro-release-openshift-release-analysis-aggregator (all) - 55 runs, 55% failed, 17% of failures match = 9% impact
#1788067793158017024junit7 days ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow traffic based on NamespaceSelector with MatchLabels using default ns label [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should enforce
  policy to allow traffic based on NamespaceSelector with MatchLabels using default
#1788067793158017024junit7 days ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should enforce policies to check ingress and egress policies can be controlled independently based on PodSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should enforce
  policies to check ingress and egress policies can be controlled independently based
#1788067793158017024junit7 days ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should enforce
  policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant]
#1788064587833151488junit7 days ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow traffic based on NamespaceSelector with MatchLabels using default ns label [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should enforce
  policy to allow traffic based on NamespaceSelector with MatchLabels using default
#1788064587833151488junit7 days ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should enforce policies to check ingress and egress policies can be controlled independently based on PodSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should enforce
  policies to check ingress and egress policies can be controlled independently based
#1788064587833151488junit7 days ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should enforce
  policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant]
#1787996486533910528junit7 days ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow traffic based on NamespaceSelector with MatchLabels using default ns label [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should enforce
  policy to allow traffic based on NamespaceSelector with MatchLabels using default
#1787996486533910528junit7 days ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should enforce policies to check ingress and egress policies can be controlled independently based on PodSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should enforce
  policies to check ingress and egress policies can be controlled independently based
#1787996486533910528junit7 days ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should enforce
  policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant]
#1786176123650969600junit12 days ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should deny ingress access to updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should deny ingress
  access to updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant]
#1786176123650969600junit12 days ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should enforce egress policy allowing traffic to a server in a different namespace based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should enforce
  egress policy allowing traffic to a server in a different namespace based on PodSelector
#1786176123650969600junit12 days ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should not mistakenly treat 'protocol: SCTP' as 'protocol: TCP', even if the plugin doesn't support SCTP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should not mistakenly
  treat ''protocol: SCTP'' as ''protocol: TCP'', even if the plugin doesn''t support
#1786172933832445952junit12 days ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should deny ingress access to updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should deny ingress
  access to updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant]
#1786172933832445952junit12 days ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should enforce egress policy allowing traffic to a server in a different namespace based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should enforce
  egress policy allowing traffic to a server in a different namespace based on PodSelector
#1786172933832445952junit12 days ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should not mistakenly treat 'protocol: SCTP' as 'protocol: TCP', even if the plugin doesn't support SCTP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should not mistakenly
  treat ''protocol: SCTP'' as ''protocol: TCP'', even if the plugin doesn''t support

Found in 9.09% of runs (16.67% of failures) across 55 total runs and 1 jobs (54.55% failed) in 930ms - clear search | chart view - source code located on github