#TRT-1501 | issue | 2 months ago | NetPol tests may not be recording results correctly? In Progress |
Issue 15799618: NetPol tests may not be recording results correctly? Description: On https://prow.ci.openshift.org/view/gs/test-platform-results/logs/aggregated-gcp-ovn-upgrade-4.15-micro-release-openshift-release-analysis-aggregator/1756168710529224704 we failed three netpol tests on just one result, failure, with no successess. However the other 9 jobs seemed to run fine. [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] Something seems funky with these tests, they're barely running, they don't seem to consistently report results. [4.15 has just 3 runs in the last two weeks|https://sippy.dptools.openshift.org/sippy-ng/tests/4.15/analysis?test=%5Bsig-network%5D%20Netpol%20NetworkPolicy%20between%20server%20and%20client%20should%20allow%20ingress%20access%20from%20namespace%20on%20one%20named%20port%20%5BFeature%3ANetworkPolicy%5D%20%5BSkipped%3ANetwork%2FOVNKubernetes%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%2FMultitenant%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%5D%20%5BSuite%3Aopenshift%2Fconformance%2Fparallel%5D%20%5BSuite%3Ak8s%5D&filters=%7B%22items%22%3A%5B%7B%22columnField%22%3A%22name%22%2C%22operatorValue%22%3A%22equals%22%2C%22value%22%3A%22%5Bsig-network%5D%20Netpol%20NetworkPolicy%20between%20server%20and%20client%20should%20allow%20ingress%20access%20from%20namespace%20on%20one%20named%20port%20%5BFeature%3ANetworkPolicy%5D%20%5BSkipped%3ANetwork%2FOVNKubernetes%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%2FMultitenant%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%5D%20%5BSuite%3Aopenshift%2Fconformance%2Fparallel%5D%20%5BSuite%3Ak8s%5D%22%7D%5D%2C%22linkOperator%22%3A%22and%22%7D], however [4.16 has just 1 but it passed|https://sippy.dptools.openshift.org/sippy-ng/tests/4.16/analysis?test=%5Bsig-network%5D%20Netpol%20NetworkPolicy%20between%20server%20and%20client%20should%20allow%20ingress%20access%20from%20namespace%20on%20one%20named%20port%20%5BFeature%3ANetworkPolicy%5D%20%5BSkipped%3ANetwork%2FOVNKubernetes%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%2FMultitenant%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%5D%20%5BSuite%3Aopenshift%2Fconformance%2Fparallel%5D%20%5BSuite%3Ak8s%5D&filters=%7B%22items%22%3A%5B%7B%22columnField%22%3A%22name%22%2C%22operatorValue%22%3A%22equals%22%2C%22value%22%3A%22%5Bsig-network%5D%20Netpol%20NetworkPolicy%20between%20server%20and%20client%20should%20allow%20ingress%20access%20from%20namespace%20on%20one%20named%20port%20%5BFeature%3ANetworkPolicy%5D%20%5BSkipped%3ANetwork%2FOVNKubernetes%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%2FMultitenant%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%5D%20%5BSuite%3Aopenshift%2Fconformance%2Fparallel%5D%20%5BSuite%3Ak8s%5D%22%7D%5D%2C%22linkOperator%22%3A%22and%22%7D] Whatever's going on, it's capable of taking out a payload, though it's not happening 100% of the time. https://amd64.ocp.releases.ci.openshift.org/releasestream/4.15.0-0.ci/release/4.15.0-0.ci-2024-02-10-040857 Status: In Progress | |||
pull-ci-openshift-installer-master-e2e-azurestack (all) - 34 runs, 88% failed, 60% of failures match = 53% impact | |||
#1790412388864888832 | junit | 35 hours ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1790412388864888832 | junit | 35 hours ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1790412388864888832 | junit | 35 hours ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix | |||
#1790376565272481792 | junit | 37 hours ago | |
[sig-network] Networking Granular Checks: Services should function for node-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s] [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.) May 14 15:28:46.951 - 86s E clusteroperator/authentication condition/Available reason/OAuthServerRouteEndpointAccessibleController_EndpointUnavailable status/False OAuthServerRouteEndpointAccessibleControllerAvailable: Get "https://oauth-openshift.apps.ci-op-0si6nzp1-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX/healthz": dial tcp: lookup oauth-openshift.apps.ci-op-0si6nzp1-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX on 172.30.0.10:53: no such host (this is likely result of malfunctioning DNS server) | |||
#1790376565272481792 | junit | 37 hours ago | |
[sig-network] Networking Granular Checks: Services should function for node-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s] [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.) May 14 15:30:13.440 W clusteroperator/authentication condition/Available reason/AsExpected status/True All is well 5 tests failed during this blip (2024-05-14 15:30:13.440757535 +0000 UTC m=+425.347276805 to 2024-05-14 15:30:13.440757535 +0000 UTC m=+425.347276805): [sig-network] Networking Granular Checks: Services should function for node-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s] [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] [sig-node] Pods Extended Pod Container lifecycle evicted pods should be terminal [Suite:openshift/conformance/parallel] [Suite:k8s] | |||
#1790145768804323328 | junit | 2 days ago | |
May 14 00:15:30.017 E clusteroperator/console condition/Available reason/RouteHealth_FailedGet status/False RouteHealthAvailable: failed to GET route (https://console-openshift-console.apps.ci-op-zrft8lx9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX): Get "https://console-openshift-console.apps.ci-op-zrft8lx9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX": dial tcp: lookup console-openshift-console.apps.ci-op-zrft8lx9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX on 172.30.0.10:53: no such host 2 tests failed during this blip (2024-05-14 00:15:30.017056074 +0000 UTC m=+827.324981849 to 2024-05-14 00:15:30.017056074 +0000 UTC m=+827.324981849): [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.) May 14 00:15:30.017 - 926s E clusteroperator/console condition/Available reason/RouteHealth_FailedGet status/False RouteHealthAvailable: failed to GET route (https://console-openshift-console.apps.ci-op-zrft8lx9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX): Get "https://console-openshift-console.apps.ci-op-zrft8lx9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX": dial tcp: lookup console-openshift-console.apps.ci-op-zrft8lx9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX on 172.30.0.10:53: no such host 2 tests failed during this blip (2024-05-14 00:15:30.017056074 +0000 UTC m=+827.324981849 to 2024-05-14 00:15:30.017056074 +0000 UTC m=+827.324981849): [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.) May 14 00:30:56.170 W clusteroperator/console condition/Available reason/AsExpected status/True All is well | |||
#1790145768804323328 | junit | 2 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1790145768804323328 | junit | 2 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1790797001785348096 | junit | 9 hours ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1790797001785348096 | junit | 9 hours ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1790797001785348096 | junit | 9 hours ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix | |||
#1790795704436789248 | junit | 9 hours ago | |
May 15 19:31:48.291 E clusteroperator/authentication condition/Degraded reason/OAuthServerRouteEndpointAccessibleController_SyncError status/True OAuthServerRouteEndpointAccessibleControllerDegraded: Get "https://oauth-openshift.apps.ci-op-wki0yi9v-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX/healthz": dial tcp: lookup oauth-openshift.apps.ci-op-wki0yi9v-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX on 172.30.0.10:53: no such host (this is likely result of malfunctioning DNS server) 2 tests failed during this blip (2024-05-15 19:31:48.291682721 +0000 UTC m=+379.135326864 to 2024-05-15 19:31:48.291682721 +0000 UTC m=+379.135326864): [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.) May 15 19:31:48.291 - 799s E clusteroperator/authentication condition/Degraded reason/OAuthServerRouteEndpointAccessibleController_SyncError status/True OAuthServerRouteEndpointAccessibleControllerDegraded: Get "https://oauth-openshift.apps.ci-op-wki0yi9v-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX/healthz": dial tcp: lookup oauth-openshift.apps.ci-op-wki0yi9v-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX on 172.30.0.10:53: no such host (this is likely result of malfunctioning DNS server) 2 tests failed during this blip (2024-05-15 19:31:48.291682721 +0000 UTC m=+379.135326864 to 2024-05-15 19:31:48.291682721 +0000 UTC m=+379.135326864): [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.) May 15 19:45:07.932 W clusteroperator/authentication condition/Degraded reason/AsExpected status/False All is well | |||
#1790795704436789248 | junit | 9 hours ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1790795704436789248 | junit | 9 hours ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1790081261709037568 | junit | 2 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1790081261709037568 | junit | 2 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix | |||
#1790081261709037568 | junit | 2 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1789016223602708480 | junit | 5 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1789016223602708480 | junit | 5 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1789016223602708480 | junit | 5 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix | |||
#1788991325463384064 | junit | 5 days ago | |
May 10 19:45:27.311 W clusteroperator/etcd condition/Available reason/AsExpected status/True StaticPodsAvailable: 3 nodes are active; 3 nodes are at revision 8\nEtcdMembersAvailable: 3 members are available 1 tests failed during this blip (2024-05-10 19:45:27.311403173 +0000 UTC m=+179.002719872 to 2024-05-10 19:45:27.311403173 +0000 UTC m=+179.002719872): [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: Available=True is the happy case) | |||
#1788991325463384064 | junit | 5 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1788991325463384064 | junit | 5 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1788991325463384064 | junit | 5 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix | |||
#1788952717499043840 | junit | 5 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1788952717499043840 | junit | 5 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix | |||
#1788952717499043840 | junit | 5 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1788916464862892032 | junit | 5 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1788916464862892032 | junit | 5 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1788916464862892032 | junit | 5 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix | |||
#1788589013959970816 | junit | 6 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1788589013959970816 | junit | 6 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1788589013959970816 | junit | 6 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix | |||
#1788563523152908288 | junit | 6 days ago | |
May 09 15:53:38.571 W clusteroperator/etcd condition/Available reason/AsExpected status/True StaticPodsAvailable: 3 nodes are active; 3 nodes are at revision 8\nEtcdMembersAvailable: 3 members are available 2 tests failed during this blip (2024-05-09 15:53:38.571951646 +0000 UTC m=+161.346496025 to 2024-05-09 15:53:38.571951646 +0000 UTC m=+161.346496025): [sig-network] Netpol NetworkPolicy between server and client should allow egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] [sig-network] EndpointSliceMirroring should mirror a custom Endpoint with multiple subsets and same IP address [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: Available=True is the happy case) | |||
#1788563523152908288 | junit | 6 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/network_policy.go:1465]: unable to initialize resources: unable to create service e2e-netpol-z-8473/s-e2e-netpol-z-8473-b: services "s-e2e-netpol-z-8473-b" already exists | |||
#1788563523152908288 | junit | 6 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1788563523152908288 | junit | 6 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1788563523152908288 | junit | 6 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix | |||
#1788206622292578304 | junit | 7 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1788206622292578304 | junit | 7 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix | |||
#1788206622292578304 | junit | 7 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1787907588784918528 | junit | 8 days ago | |
May 07 19:46:32.398 E clusteroperator/ingress condition/Degraded reason/IngressDegraded status/True The "default" ingress controller reports Degraded=True: DegradedConditions: One or more other status conditions indicate a degraded state: CanaryChecksSucceeding=False (CanaryChecksRepetitiveFailures: Canary route checks for the default ingress controller are failing. Last 1 error messages:\nerror sending canary HTTP request: DNS error: Get "https://canary-openshift-ingress-canary.apps.ci-op-f8w4hfl9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX": dial tcp: lookup canary-openshift-ingress-canary.apps.ci-op-f8w4hfl9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX on 172.30.0.10:53: no such host (x5 over 4m0s)) 2 tests failed during this blip (2024-05-07 19:46:32.398482305 +0000 UTC m=+569.880295189 to 2024-05-07 19:46:32.398482305 +0000 UTC m=+569.880295189): [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] [sig-network] Networking Granular Checks: Services should function for pod-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.) May 07 19:46:32.398 - 1s E clusteroperator/ingress condition/Degraded reason/IngressDegraded status/True The "default" ingress controller reports Degraded=True: DegradedConditions: One or more other status conditions indicate a degraded state: CanaryChecksSucceeding=False (CanaryChecksRepetitiveFailures: Canary route checks for the default ingress controller are failing. Last 1 error messages:\nerror sending canary HTTP request: DNS error: Get "https://canary-openshift-ingress-canary.apps.ci-op-f8w4hfl9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX": dial tcp: lookup canary-openshift-ingress-canary.apps.ci-op-f8w4hfl9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX on 172.30.0.10:53: no such host (x5 over 4m0s)) 2 tests failed during this blip (2024-05-07 19:46:32.398482305 +0000 UTC m=+569.880295189 to 2024-05-07 19:46:32.398482305 +0000 UTC m=+569.880295189): [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] [sig-network] Networking Granular Checks: Services should function for pod-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.) May 07 19:46:33.584 W clusteroperator/ingress condition/Degraded reason/IngressNotDegraded status/False The "default" ingress controller reports Degraded=False. 2 tests failed during this blip (2024-05-07 19:46:33.584211257 +0000 UTC m=+571.066024141 to 2024-05-07 19:46:33.584211257 +0000 UTC m=+571.066024141): [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] [sig-network] Networking Granular Checks: Services should function for pod-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: Degraded=False is the happy case) May 07 19:47:32.305 E clusteroperator/ingress condition/Degraded reason/IngressDegraded status/True The "default" ingress controller reports Degraded=True: DegradedConditions: One or more other status conditions indicate a degraded state: CanaryChecksSucceeding=False (CanaryChecksRepetitiveFailures: Canary route checks for the default ingress controller are failing. Last 1 error messages:\nerror sending canary HTTP request: DNS error: Get "https://canary-openshift-ingress-canary.apps.ci-op-f8w4hfl9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX": dial tcp: lookup canary-openshift-ingress-canary.apps.ci-op-f8w4hfl9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX on 172.30.0.10:53: no such host (x6 over 5m0s)) 3 tests failed during this blip (2024-05-07 19:47:32.305480535 +0000 UTC m=+629.787293419 to 2024-05-07 19:47:32.305480535 +0000 UTC m=+629.787293419): [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] [sig-network] Networking Granular Checks: Services should function for pod-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s] [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.) May 07 19:47:32.305 - 931ms E clusteroperator/ingress condition/Degraded reason/IngressDegraded status/True The "default" ingress controller reports Degraded=True: DegradedConditions: One or more other status conditions indicate a degraded state: CanaryChecksSucceeding=False (CanaryChecksRepetitiveFailures: Canary route checks for the default ingress controller are failing. Last 1 error messages:\nerror sending canary HTTP request: DNS error: Get "https://canary-openshift-ingress-canary.apps.ci-op-f8w4hfl9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX": dial tcp: lookup canary-openshift-ingress-canary.apps.ci-op-f8w4hfl9-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX on 172.30.0.10:53: no such host (x6 over 5m0s)) 3 tests failed during this blip (2024-05-07 19:47:32.305480535 +0000 UTC m=+629.787293419 to 2024-05-07 19:47:32.305480535 +0000 UTC m=+629.787293419): [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] ... 1 lines not shown | |||
#1787866745839554560 | junit | 8 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1787866745839554560 | junit | 8 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1787866745839554560 | junit | 8 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix | |||
#1787485574832066560 | junit | 9 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix | |||
#1787485574832066560 | junit | 9 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1787485574832066560 | junit | 9 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1787400823068692480 | junit | 9 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1787400823068692480 | junit | 9 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix | |||
#1787400823068692480 | junit | 9 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1786213033194819584 | junit | 13 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1786213033194819584 | junit | 13 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix | |||
#1786213033194819584 | junit | 13 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix |
Found in 52.94% of runs (60.00% of failures) across 34 total runs and 1 jobs (88.24% failed) in 146ms - clear search | chart view - source code located on github