Job:
#TRT-1501issue2 months agoNetPol tests may not be recording results correctly? In Progress
Issue 15799618: NetPol tests may not be recording results correctly?
Description: On https://prow.ci.openshift.org/view/gs/test-platform-results/logs/aggregated-gcp-ovn-upgrade-4.15-micro-release-openshift-release-analysis-aggregator/1756168710529224704 we failed three netpol tests on just one result, failure, with no successess. However the other 9 jobs seemed to run fine.
 
 [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
 
 [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
 
 [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
 
 Something seems funky with these tests, they're barely running, they don't seem to consistently report results. [4.15 has just 3 runs in the last two weeks|https://sippy.dptools.openshift.org/sippy-ng/tests/4.15/analysis?test=%5Bsig-network%5D%20Netpol%20NetworkPolicy%20between%20server%20and%20client%20should%20allow%20ingress%20access%20from%20namespace%20on%20one%20named%20port%20%5BFeature%3ANetworkPolicy%5D%20%5BSkipped%3ANetwork%2FOVNKubernetes%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%2FMultitenant%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%5D%20%5BSuite%3Aopenshift%2Fconformance%2Fparallel%5D%20%5BSuite%3Ak8s%5D&filters=%7B%22items%22%3A%5B%7B%22columnField%22%3A%22name%22%2C%22operatorValue%22%3A%22equals%22%2C%22value%22%3A%22%5Bsig-network%5D%20Netpol%20NetworkPolicy%20between%20server%20and%20client%20should%20allow%20ingress%20access%20from%20namespace%20on%20one%20named%20port%20%5BFeature%3ANetworkPolicy%5D%20%5BSkipped%3ANetwork%2FOVNKubernetes%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%2FMultitenant%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%5D%20%5BSuite%3Aopenshift%2Fconformance%2Fparallel%5D%20%5BSuite%3Ak8s%5D%22%7D%5D%2C%22linkOperator%22%3A%22and%22%7D], however [4.16 has just 1 but it passed|https://sippy.dptools.openshift.org/sippy-ng/tests/4.16/analysis?test=%5Bsig-network%5D%20Netpol%20NetworkPolicy%20between%20server%20and%20client%20should%20allow%20ingress%20access%20from%20namespace%20on%20one%20named%20port%20%5BFeature%3ANetworkPolicy%5D%20%5BSkipped%3ANetwork%2FOVNKubernetes%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%2FMultitenant%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%5D%20%5BSuite%3Aopenshift%2Fconformance%2Fparallel%5D%20%5BSuite%3Ak8s%5D&filters=%7B%22items%22%3A%5B%7B%22columnField%22%3A%22name%22%2C%22operatorValue%22%3A%22equals%22%2C%22value%22%3A%22%5Bsig-network%5D%20Netpol%20NetworkPolicy%20between%20server%20and%20client%20should%20allow%20ingress%20access%20from%20namespace%20on%20one%20named%20port%20%5BFeature%3ANetworkPolicy%5D%20%5BSkipped%3ANetwork%2FOVNKubernetes%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%2FMultitenant%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%5D%20%5BSuite%3Aopenshift%2Fconformance%2Fparallel%5D%20%5BSuite%3Ak8s%5D%22%7D%5D%2C%22linkOperator%22%3A%22and%22%7D]
 
 Whatever's going on, it's capable of taking out a payload, though it's not happening 100% of the time. https://amd64.ocp.releases.ci.openshift.org/releasestream/4.15.0-0.ci/release/4.15.0-0.ci-2024-02-10-040857
Status: In Progress
pull-ci-openshift-installer-master-e2e-azurestack (all) - 34 runs, 88% failed, 60% of failures match = 53% impact
#1790412388864888832junit35 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1790412388864888832junit35 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1790412388864888832junit35 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix
#1790376565272481792junit37 hours ago
[sig-network] Networking Granular Checks: Services should function for node-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.)
May 14 15:28:46.951 - 86s   E clusteroperator/authentication condition/Available reason/OAuthServerRouteEndpointAccessibleController_EndpointUnavailable status/False OAuthServerRouteEndpointAccessibleControllerAvailable: Get "https://oauth-openshift.apps.ci-op-0si6nzp1-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX/healthz": dial tcp: lookup oauth-openshift.apps.ci-op-0si6nzp1-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX on 172.30.0.10:53: no such host (this is likely result of malfunctioning DNS server)
#1790376565272481792junit37 hours ago
[sig-network] Networking Granular Checks: Services should function for node-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.)
May 14 15:30:13.440 W clusteroperator/authentication condition/Available reason/AsExpected status/True All is well
5 tests failed during this blip (2024-05-14 15:30:13.440757535 +0000 UTC m=+425.347276805 to 2024-05-14 15:30:13.440757535 +0000 UTC m=+425.347276805): [sig-network] Networking Granular Checks: Services should function for node-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-node] Pods Extended Pod Container lifecycle evicted pods should be terminal [Suite:openshift/conformance/parallel] [Suite:k8s]
#1790145768804323328junit2 days ago
May 14 00:15:30.017 E clusteroperator/console condition/Available reason/RouteHealth_FailedGet status/False RouteHealthAvailable: failed to GET route (https://console-openshift-console.apps.ci-op-zrft8lx9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX): Get "https://console-openshift-console.apps.ci-op-zrft8lx9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX": dial tcp: lookup console-openshift-console.apps.ci-op-zrft8lx9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX on 172.30.0.10:53: no such host
2 tests failed during this blip (2024-05-14 00:15:30.017056074 +0000 UTC m=+827.324981849 to 2024-05-14 00:15:30.017056074 +0000 UTC m=+827.324981849): [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.)
May 14 00:15:30.017 - 926s  E clusteroperator/console condition/Available reason/RouteHealth_FailedGet status/False RouteHealthAvailable: failed to GET route (https://console-openshift-console.apps.ci-op-zrft8lx9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX): Get "https://console-openshift-console.apps.ci-op-zrft8lx9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX": dial tcp: lookup console-openshift-console.apps.ci-op-zrft8lx9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX on 172.30.0.10:53: no such host
2 tests failed during this blip (2024-05-14 00:15:30.017056074 +0000 UTC m=+827.324981849 to 2024-05-14 00:15:30.017056074 +0000 UTC m=+827.324981849): [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.)
May 14 00:30:56.170 W clusteroperator/console condition/Available reason/AsExpected status/True All is well
#1790145768804323328junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1790145768804323328junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1790797001785348096junit9 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1790797001785348096junit9 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1790797001785348096junit9 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix
#1790795704436789248junit9 hours ago
May 15 19:31:48.291 E clusteroperator/authentication condition/Degraded reason/OAuthServerRouteEndpointAccessibleController_SyncError status/True OAuthServerRouteEndpointAccessibleControllerDegraded: Get "https://oauth-openshift.apps.ci-op-wki0yi9v-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX/healthz": dial tcp: lookup oauth-openshift.apps.ci-op-wki0yi9v-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX on 172.30.0.10:53: no such host (this is likely result of malfunctioning DNS server)
2 tests failed during this blip (2024-05-15 19:31:48.291682721 +0000 UTC m=+379.135326864 to 2024-05-15 19:31:48.291682721 +0000 UTC m=+379.135326864): [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.)
May 15 19:31:48.291 - 799s  E clusteroperator/authentication condition/Degraded reason/OAuthServerRouteEndpointAccessibleController_SyncError status/True OAuthServerRouteEndpointAccessibleControllerDegraded: Get "https://oauth-openshift.apps.ci-op-wki0yi9v-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX/healthz": dial tcp: lookup oauth-openshift.apps.ci-op-wki0yi9v-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX on 172.30.0.10:53: no such host (this is likely result of malfunctioning DNS server)
2 tests failed during this blip (2024-05-15 19:31:48.291682721 +0000 UTC m=+379.135326864 to 2024-05-15 19:31:48.291682721 +0000 UTC m=+379.135326864): [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.)
May 15 19:45:07.932 W clusteroperator/authentication condition/Degraded reason/AsExpected status/False All is well
#1790795704436789248junit9 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1790795704436789248junit9 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1790081261709037568junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1790081261709037568junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix
#1790081261709037568junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1789016223602708480junit5 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1789016223602708480junit5 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1789016223602708480junit5 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix
#1788991325463384064junit5 days ago
May 10 19:45:27.311 W clusteroperator/etcd condition/Available reason/AsExpected status/True StaticPodsAvailable: 3 nodes are active; 3 nodes are at revision 8\nEtcdMembersAvailable: 3 members are available
1 tests failed during this blip (2024-05-10 19:45:27.311403173 +0000 UTC m=+179.002719872 to 2024-05-10 19:45:27.311403173 +0000 UTC m=+179.002719872): [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: Available=True is the happy case)
#1788991325463384064junit5 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1788991325463384064junit5 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1788991325463384064junit5 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix
#1788952717499043840junit5 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1788952717499043840junit5 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix
#1788952717499043840junit5 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1788916464862892032junit5 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1788916464862892032junit5 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1788916464862892032junit5 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix
#1788589013959970816junit6 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1788589013959970816junit6 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1788589013959970816junit6 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix
#1788563523152908288junit6 days ago
May 09 15:53:38.571 W clusteroperator/etcd condition/Available reason/AsExpected status/True StaticPodsAvailable: 3 nodes are active; 3 nodes are at revision 8\nEtcdMembersAvailable: 3 members are available
2 tests failed during this blip (2024-05-09 15:53:38.571951646 +0000 UTC m=+161.346496025 to 2024-05-09 15:53:38.571951646 +0000 UTC m=+161.346496025): [sig-network] Netpol NetworkPolicy between server and client should allow egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] EndpointSliceMirroring should mirror a custom Endpoint with multiple subsets and same IP address [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: Available=True is the happy case)
#1788563523152908288junit6 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/network_policy.go:1465]: unable to initialize resources: unable to create service e2e-netpol-z-8473/s-e2e-netpol-z-8473-b: services "s-e2e-netpol-z-8473-b" already exists
#1788563523152908288junit6 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1788563523152908288junit6 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1788563523152908288junit6 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix
#1788206622292578304junit7 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1788206622292578304junit7 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix
#1788206622292578304junit7 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1787907588784918528junit8 days ago
May 07 19:46:32.398 E clusteroperator/ingress condition/Degraded reason/IngressDegraded status/True The "default" ingress controller reports Degraded=True: DegradedConditions: One or more other status conditions indicate a degraded state: CanaryChecksSucceeding=False (CanaryChecksRepetitiveFailures: Canary route checks for the default ingress controller are failing. Last 1 error messages:\nerror sending canary HTTP request: DNS error: Get "https://canary-openshift-ingress-canary.apps.ci-op-f8w4hfl9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX": dial tcp: lookup canary-openshift-ingress-canary.apps.ci-op-f8w4hfl9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX on 172.30.0.10:53: no such host (x5 over 4m0s))
2 tests failed during this blip (2024-05-07 19:46:32.398482305 +0000 UTC m=+569.880295189 to 2024-05-07 19:46:32.398482305 +0000 UTC m=+569.880295189): [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Networking Granular Checks: Services should function for pod-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.)
May 07 19:46:32.398 - 1s    E clusteroperator/ingress condition/Degraded reason/IngressDegraded status/True The "default" ingress controller reports Degraded=True: DegradedConditions: One or more other status conditions indicate a degraded state: CanaryChecksSucceeding=False (CanaryChecksRepetitiveFailures: Canary route checks for the default ingress controller are failing. Last 1 error messages:\nerror sending canary HTTP request: DNS error: Get "https://canary-openshift-ingress-canary.apps.ci-op-f8w4hfl9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX": dial tcp: lookup canary-openshift-ingress-canary.apps.ci-op-f8w4hfl9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX on 172.30.0.10:53: no such host (x5 over 4m0s))
2 tests failed during this blip (2024-05-07 19:46:32.398482305 +0000 UTC m=+569.880295189 to 2024-05-07 19:46:32.398482305 +0000 UTC m=+569.880295189): [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Networking Granular Checks: Services should function for pod-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.)
May 07 19:46:33.584 W clusteroperator/ingress condition/Degraded reason/IngressNotDegraded status/False The "default" ingress controller reports Degraded=False.
2 tests failed during this blip (2024-05-07 19:46:33.584211257 +0000 UTC m=+571.066024141 to 2024-05-07 19:46:33.584211257 +0000 UTC m=+571.066024141): [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Networking Granular Checks: Services should function for pod-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: Degraded=False is the happy case)
May 07 19:47:32.305 E clusteroperator/ingress condition/Degraded reason/IngressDegraded status/True The "default" ingress controller reports Degraded=True: DegradedConditions: One or more other status conditions indicate a degraded state: CanaryChecksSucceeding=False (CanaryChecksRepetitiveFailures: Canary route checks for the default ingress controller are failing. Last 1 error messages:\nerror sending canary HTTP request: DNS error: Get "https://canary-openshift-ingress-canary.apps.ci-op-f8w4hfl9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX": dial tcp: lookup canary-openshift-ingress-canary.apps.ci-op-f8w4hfl9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX on 172.30.0.10:53: no such host (x6 over 5m0s))
3 tests failed during this blip (2024-05-07 19:47:32.305480535 +0000 UTC m=+629.787293419 to 2024-05-07 19:47:32.305480535 +0000 UTC m=+629.787293419): [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Networking Granular Checks: Services should function for pod-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.)
May 07 19:47:32.305 - 931ms E clusteroperator/ingress condition/Degraded reason/IngressDegraded status/True The "default" ingress controller reports Degraded=True: DegradedConditions: One or more other status conditions indicate a degraded state: CanaryChecksSucceeding=False (CanaryChecksRepetitiveFailures: Canary route checks for the default ingress controller are failing. Last 1 error messages:\nerror sending canary HTTP request: DNS error: Get "https://canary-openshift-ingress-canary.apps.ci-op-f8w4hfl9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX": dial tcp: lookup canary-openshift-ingress-canary.apps.ci-op-f8w4hfl9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX on 172.30.0.10:53: no such host (x6 over 5m0s))
3 tests failed during this blip (2024-05-07 19:47:32.305480535 +0000 UTC m=+629.787293419 to 2024-05-07 19:47:32.305480535 +0000 UTC m=+629.787293419): [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]

... 1 lines not shown

#1787866745839554560junit8 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1787866745839554560junit8 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1787866745839554560junit8 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix
#1787485574832066560junit9 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix
#1787485574832066560junit9 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1787485574832066560junit9 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1787400823068692480junit9 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1787400823068692480junit9 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix
#1787400823068692480junit9 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1786213033194819584junit13 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1786213033194819584junit13 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1786213033194819584junit13 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix

Found in 52.94% of runs (60.00% of failures) across 34 total runs and 1 jobs (88.24% failed) in 146ms - clear search | chart view - source code located on github