Job:
periodic-ci-openshift-multiarch-master-nightly-4.16-ocp-e2e-ovn-remote-libvirt-s390x (all) - 38 runs, 89% failed, 26% of failures match = 24% impact
#1783027230947938304junit5 days ago
# [sig-network] Netpol NetworkPolicy between server and client should deny egress from all pods in a namespace [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
time="2024-04-24T07:40:23Z" level=info msg="Decoding provider" clusterState="<nil>" discover=false dryRun=false func=DecodeProvider providerType="{\"type\":\"skeleton\",\"ProjectID\":\"\",\"Region\":\"\",\"Zone\":\"\",\"NumNodes\":3,\"MultiMaster\":true,\"MultiZone\":false,\"Zones\":[],\"ConfigFile\":\"\",\"Disconnected\":false,\"SingleReplicaTopology\":false,\"NetworkPlugin\":\"OVNKubernetes\",\"HasIPv4\":true,\"HasIPv6\":false,\"IPFamily\":\"ipv4\",\"HasSCTP\":false,\"IsProxied\":false,\"IsIBMROKS\":false,\"HasNoOptionalCapabilities\":false}"
#1783027230947938304junit5 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
time="2024-04-24T07:41:20Z" level=info msg="Decoding provider" clusterState="<nil>" discover=false dryRun=false func=DecodeProvider providerType="{\"type\":\"skeleton\",\"ProjectID\":\"\",\"Region\":\"\",\"Zone\":\"\",\"NumNodes\":3,\"MultiMaster\":true,\"MultiZone\":false,\"Zones\":[],\"ConfigFile\":\"\",\"Disconnected\":false,\"SingleReplicaTopology\":false,\"NetworkPlugin\":\"OVNKubernetes\",\"HasIPv4\":true,\"HasIPv6\":false,\"IPFamily\":\"ipv4\",\"HasSCTP\":false,\"IsProxied\":false,\"IsIBMROKS\":false,\"HasNoOptionalCapabilities\":false}"
#1783027230947938304junit5 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce multiple egress policies with egress allow-all policy taking precedence [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/network_policy.go:939]: Interrupted by User
#1783027230947938304junit5 days ago
# [sig-network] Netpol NetworkPolicy between server and client should ensure an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/network_policy.go:1053]: Interrupted by User
#1783027230947938304junit5 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce multiple ingress policies with ingress allow-all policy taking precedence [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/network_policy.go:914]: Interrupted by User
#1782990964344754176junit5 days ago
uilds][Feature:Builds] Prometheus when installed on the cluster should start and expose a secured proxy and verify build metrics [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]
[sig-network] Netpol NetworkPolicy between server and client should support allow-all policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Networking IPerf2 [Feature:Networking-Performance] should run iperf2 [Suite:openshift/conformance/parallel] [Suite:k8s]
#1782990964344754176junit5 days ago
uilds][Feature:Builds] Prometheus when installed on the cluster should start and expose a secured proxy and verify build metrics [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]
[sig-network] Netpol NetworkPolicy between server and client should support allow-all policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Networking IPerf2 [Feature:Networking-Performance] should run iperf2 [Suite:openshift/conformance/parallel] [Suite:k8s]
#1782990964344754176junit5 days ago
# [sig-network] Netpol NetworkPolicy between server and client should support allow-all policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/network_policy.go:500]: Interrupted by User
#1782905369643716608junit5 days ago
# [sig-network] Netpol NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
time="2024-04-23T23:37:42Z" level=info msg="Decoding provider" clusterState="<nil>" discover=false dryRun=false func=DecodeProvider providerType="{\"type\":\"skeleton\",\"ProjectID\":\"\",\"Region\":\"\",\"Zone\":\"\",\"NumNodes\":3,\"MultiMaster\":true,\"MultiZone\":false,\"Zones\":[],\"ConfigFile\":\"\",\"Disconnected\":false,\"SingleReplicaTopology\":false,\"NetworkPlugin\":\"OVNKubernetes\",\"HasIPv4\":true,\"HasIPv6\":false,\"IPFamily\":\"ipv4\",\"HasSCTP\":false,\"IsProxied\":false,\"IsIBMROKS\":false,\"HasNoOptionalCapabilities\":false}"
#1783961400515760128junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow traffic based on NamespaceSelector with MatchLabels using default ns label [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
time="2024-04-26T21:55:50Z" level=info msg="Decoding provider" clusterState="<nil>" discover=false dryRun=false func=DecodeProvider providerType="{\"type\":\"skeleton\",\"ProjectID\":\"\",\"Region\":\"\",\"Zone\":\"\",\"NumNodes\":3,\"MultiMaster\":true,\"MultiZone\":false,\"Zones\":[],\"ConfigFile\":\"\",\"Disconnected\":false,\"SingleReplicaTopology\":false,\"NetworkPlugin\":\"OVNKubernetes\",\"HasIPv4\":true,\"HasIPv6\":false,\"IPFamily\":\"ipv4\",\"HasSCTP\":false,\"IsProxied\":false,\"IsIBMROKS\":false,\"HasNoOptionalCapabilities\":false}"
#1783961400515760128junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should support denying of egress traffic on the client side (even if the server explicitly allows this traffic) [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
time="2024-04-26T21:56:56Z" level=info msg="Decoding provider" clusterState="<nil>" discover=false dryRun=false func=DecodeProvider providerType="{\"type\":\"skeleton\",\"ProjectID\":\"\",\"Region\":\"\",\"Zone\":\"\",\"NumNodes\":3,\"MultiMaster\":true,\"MultiZone\":false,\"Zones\":[],\"ConfigFile\":\"\",\"Disconnected\":false,\"SingleReplicaTopology\":false,\"NetworkPlugin\":\"OVNKubernetes\",\"HasIPv4\":true,\"HasIPv6\":false,\"IPFamily\":\"ipv4\",\"HasSCTP\":false,\"IsProxied\":false,\"IsIBMROKS\":false,\"HasNoOptionalCapabilities\":false}"
#1783961400515760128junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should not mistakenly treat 'protocol: SCTP' as 'protocol: TCP', even if the plugin doesn't support SCTP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
time="2024-04-26T21:57:53Z" level=info msg="Decoding provider" clusterState="<nil>" discover=false dryRun=false func=DecodeProvider providerType="{\"type\":\"skeleton\",\"ProjectID\":\"\",\"Region\":\"\",\"Zone\":\"\",\"NumNodes\":3,\"MultiMaster\":true,\"MultiZone\":false,\"Zones\":[],\"ConfigFile\":\"\",\"Disconnected\":false,\"SingleReplicaTopology\":false,\"NetworkPlugin\":\"OVNKubernetes\",\"HasIPv4\":true,\"HasIPv6\":false,\"IPFamily\":\"ipv4\",\"HasSCTP\":false,\"IsProxied\":false,\"IsIBMROKS\":false,\"HasNoOptionalCapabilities\":false}"
#1783961400515760128junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should support a 'default-deny-all' policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
time="2024-04-26T21:57:53Z" level=info msg="Decoding provider" clusterState="<nil>" discover=false dryRun=false func=DecodeProvider providerType="{\"type\":\"skeleton\",\"ProjectID\":\"\",\"Region\":\"\",\"Zone\":\"\",\"NumNodes\":3,\"MultiMaster\":true,\"MultiZone\":false,\"Zones\":[],\"ConfigFile\":\"\",\"Disconnected\":false,\"SingleReplicaTopology\":false,\"NetworkPlugin\":\"OVNKubernetes\",\"HasIPv4\":true,\"HasIPv6\":false,\"IPFamily\":\"ipv4\",\"HasSCTP\":false,\"IsProxied\":false,\"IsIBMROKS\":false,\"HasNoOptionalCapabilities\":false}"
#1783961400515760128junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce multiple egress policies with egress allow-all policy taking precedence [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/network_policy.go:939]: Interrupted by User
#1783961400515760128junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce ingress policy allowing any port traffic to a server on a specific protocol [Feature:NetworkPolicy] [Feature:UDP] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/network_policy.go:896]: Interrupted by User
#1783179196126728192junit4 days ago
3 tests failed during this blip (2024-04-24 18:21:08.745449513 +0000 UTC m=+1835.213531611 to 2024-04-24 18:21:08.745449513 +0000 UTC m=+1835.213531611): [sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should perform rolling updates and roll backs of template modifications [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should enforce policies to check ingress and egress policies can be controlled independently based on PodSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-node] Pods Extended Pod Container Status should never report success for a pending container [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.)
#1783179196126728192junit4 days ago
3 tests failed during this blip (2024-04-24 18:21:08.745449513 +0000 UTC m=+1835.213531611 to 2024-04-24 18:21:08.745449513 +0000 UTC m=+1835.213531611): [sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should perform rolling updates and roll backs of template modifications [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should enforce policies to check ingress and egress policies can be controlled independently based on PodSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-node] Pods Extended Pod Container Status should never report success for a pending container [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.)
#1783179196126728192junit4 days ago
3 tests failed during this blip (2024-04-24 18:21:12.180452277 +0000 UTC m=+1838.648534395 to 2024-04-24 18:21:12.180452277 +0000 UTC m=+1838.648534395): [sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should perform rolling updates and roll backs of template modifications [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should enforce policies to check ingress and egress policies can be controlled independently based on PodSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-node] Pods Extended Pod Container Status should never report success for a pending container [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: Available=True is the happy case)
#1783179196126728192junit4 days ago
# [sig-network] Netpol NetworkPolicy between server and client should work with Ingress, Egress specified together [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/network_policy.go:736]: Interrupted by User
#1783179196126728192junit4 days ago
# [sig-network] Netpol NetworkPolicy between server and client should deny egress from all pods in a namespace [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/network_policy.go:722]: Interrupted by User
#1783179196126728192junit4 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/network_policy.go:321]: Interrupted by User
#1783360433692872704junit4 days ago
# [sig-network] Netpol NetworkPolicy between server and client should work with Ingress, Egress specified together [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [:0]: Interrupted by User
#1782136190300852224junit7 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce ingress policy allowing any port traffic to a server on a specific protocol [Feature:NetworkPolicy] [Feature:UDP] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/network_policy.go:896]: Interrupted by User
#1781186176552538112junit10 days ago
# [sig-network] Netpol NetworkPolicy between server and client should support allow-all policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/network_policy.go:500]: Interrupted by User
#1781367301048635392junit9 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce ingress policy allowing any port traffic to a server on a specific protocol [Feature:NetworkPolicy] [Feature:UDP] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/network_policy.go:896]: Interrupted by User

Found in 23.68% of runs (26.47% of failures) across 38 total runs and 1 jobs (89.47% failed) in 3.251s - clear search | chart view - source code located on github