Job:
#TRT-1501issue7 weeks agoNetPol tests may not be recording results correctly? In Progress
Issue 15799618: NetPol tests may not be recording results correctly?
Description: On https://prow.ci.openshift.org/view/gs/test-platform-results/logs/aggregated-gcp-ovn-upgrade-4.15-micro-release-openshift-release-analysis-aggregator/1756168710529224704 we failed three netpol tests on just one result, failure, with no successess. However the other 9 jobs seemed to run fine.
 
 [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
 
 [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
 
 [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
 
 Something seems funky with these tests, they're barely running, they don't seem to consistently report results. [4.15 has just 3 runs in the last two weeks|https://sippy.dptools.openshift.org/sippy-ng/tests/4.15/analysis?test=%5Bsig-network%5D%20Netpol%20NetworkPolicy%20between%20server%20and%20client%20should%20allow%20ingress%20access%20from%20namespace%20on%20one%20named%20port%20%5BFeature%3ANetworkPolicy%5D%20%5BSkipped%3ANetwork%2FOVNKubernetes%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%2FMultitenant%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%5D%20%5BSuite%3Aopenshift%2Fconformance%2Fparallel%5D%20%5BSuite%3Ak8s%5D&filters=%7B%22items%22%3A%5B%7B%22columnField%22%3A%22name%22%2C%22operatorValue%22%3A%22equals%22%2C%22value%22%3A%22%5Bsig-network%5D%20Netpol%20NetworkPolicy%20between%20server%20and%20client%20should%20allow%20ingress%20access%20from%20namespace%20on%20one%20named%20port%20%5BFeature%3ANetworkPolicy%5D%20%5BSkipped%3ANetwork%2FOVNKubernetes%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%2FMultitenant%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%5D%20%5BSuite%3Aopenshift%2Fconformance%2Fparallel%5D%20%5BSuite%3Ak8s%5D%22%7D%5D%2C%22linkOperator%22%3A%22and%22%7D], however [4.16 has just 1 but it passed|https://sippy.dptools.openshift.org/sippy-ng/tests/4.16/analysis?test=%5Bsig-network%5D%20Netpol%20NetworkPolicy%20between%20server%20and%20client%20should%20allow%20ingress%20access%20from%20namespace%20on%20one%20named%20port%20%5BFeature%3ANetworkPolicy%5D%20%5BSkipped%3ANetwork%2FOVNKubernetes%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%2FMultitenant%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%5D%20%5BSuite%3Aopenshift%2Fconformance%2Fparallel%5D%20%5BSuite%3Ak8s%5D&filters=%7B%22items%22%3A%5B%7B%22columnField%22%3A%22name%22%2C%22operatorValue%22%3A%22equals%22%2C%22value%22%3A%22%5Bsig-network%5D%20Netpol%20NetworkPolicy%20between%20server%20and%20client%20should%20allow%20ingress%20access%20from%20namespace%20on%20one%20named%20port%20%5BFeature%3ANetworkPolicy%5D%20%5BSkipped%3ANetwork%2FOVNKubernetes%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%2FMultitenant%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%5D%20%5BSuite%3Aopenshift%2Fconformance%2Fparallel%5D%20%5BSuite%3Ak8s%5D%22%7D%5D%2C%22linkOperator%22%3A%22and%22%7D]
 
 Whatever's going on, it's capable of taking out a payload, though it's not happening 100% of the time. https://amd64.ocp.releases.ci.openshift.org/releasestream/4.15.0-0.ci/release/4.15.0-0.ci-2024-02-10-040857
Status: In Progress
aggregated-azure-ovn-upgrade-4.16-micro-release-openshift-release-analysis-aggregator (all) - 27 runs, 33% failed, 33% of failures match = 11% impact
#1783649662666805248junit3 days ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should enforce policies to check ingress and egress policies can be controlled independently based on PodSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should enforce
  policies to check ingress and egress policies can be controlled independently based
#1783649662666805248junit3 days ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should deny ingress access to updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should deny ingress
  access to updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant]
#1783649662666805248junit3 days ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should allow egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should allow egress
  access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant]
#1783580550745821184junit3 days ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should enforce policies to check ingress and egress policies can be controlled independently based on PodSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should enforce
  policies to check ingress and egress policies can be controlled independently based
#1783580550745821184junit3 days ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should deny ingress access to updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should deny ingress
  access to updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant]
#1783580550745821184junit3 days ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should allow egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should allow egress
  access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant]
#1783680576344035328junit3 days ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should enforce policies to check ingress and egress policies can be controlled independently based on PodSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should enforce
  policies to check ingress and egress policies can be controlled independently based
#1783680576344035328junit3 days ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should deny ingress access to updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should deny ingress
  access to updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant]
#1783680576344035328junit3 days ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should allow egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should allow egress
  access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant]

Found in 11.11% of runs (33.33% of failures) across 27 total runs and 1 jobs (33.33% failed) in 4.382s - clear search | chart view - source code located on github