Job:
#TRT-1501issue8 weeks agoNetPol tests may not be recording results correctly? In Progress
Issue 15799618: NetPol tests may not be recording results correctly?
Description: On https://prow.ci.openshift.org/view/gs/test-platform-results/logs/aggregated-gcp-ovn-upgrade-4.15-micro-release-openshift-release-analysis-aggregator/1756168710529224704 we failed three netpol tests on just one result, failure, with no successess. However the other 9 jobs seemed to run fine.
 
 [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
 
 [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
 
 [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
 
 Something seems funky with these tests, they're barely running, they don't seem to consistently report results. [4.15 has just 3 runs in the last two weeks|https://sippy.dptools.openshift.org/sippy-ng/tests/4.15/analysis?test=%5Bsig-network%5D%20Netpol%20NetworkPolicy%20between%20server%20and%20client%20should%20allow%20ingress%20access%20from%20namespace%20on%20one%20named%20port%20%5BFeature%3ANetworkPolicy%5D%20%5BSkipped%3ANetwork%2FOVNKubernetes%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%2FMultitenant%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%5D%20%5BSuite%3Aopenshift%2Fconformance%2Fparallel%5D%20%5BSuite%3Ak8s%5D&filters=%7B%22items%22%3A%5B%7B%22columnField%22%3A%22name%22%2C%22operatorValue%22%3A%22equals%22%2C%22value%22%3A%22%5Bsig-network%5D%20Netpol%20NetworkPolicy%20between%20server%20and%20client%20should%20allow%20ingress%20access%20from%20namespace%20on%20one%20named%20port%20%5BFeature%3ANetworkPolicy%5D%20%5BSkipped%3ANetwork%2FOVNKubernetes%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%2FMultitenant%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%5D%20%5BSuite%3Aopenshift%2Fconformance%2Fparallel%5D%20%5BSuite%3Ak8s%5D%22%7D%5D%2C%22linkOperator%22%3A%22and%22%7D], however [4.16 has just 1 but it passed|https://sippy.dptools.openshift.org/sippy-ng/tests/4.16/analysis?test=%5Bsig-network%5D%20Netpol%20NetworkPolicy%20between%20server%20and%20client%20should%20allow%20ingress%20access%20from%20namespace%20on%20one%20named%20port%20%5BFeature%3ANetworkPolicy%5D%20%5BSkipped%3ANetwork%2FOVNKubernetes%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%2FMultitenant%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%5D%20%5BSuite%3Aopenshift%2Fconformance%2Fparallel%5D%20%5BSuite%3Ak8s%5D&filters=%7B%22items%22%3A%5B%7B%22columnField%22%3A%22name%22%2C%22operatorValue%22%3A%22equals%22%2C%22value%22%3A%22%5Bsig-network%5D%20Netpol%20NetworkPolicy%20between%20server%20and%20client%20should%20allow%20ingress%20access%20from%20namespace%20on%20one%20named%20port%20%5BFeature%3ANetworkPolicy%5D%20%5BSkipped%3ANetwork%2FOVNKubernetes%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%2FMultitenant%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%5D%20%5BSuite%3Aopenshift%2Fconformance%2Fparallel%5D%20%5BSuite%3Ak8s%5D%22%7D%5D%2C%22linkOperator%22%3A%22and%22%7D]
 
 Whatever's going on, it's capable of taking out a payload, though it's not happening 100% of the time. https://amd64.ocp.releases.ci.openshift.org/releasestream/4.15.0-0.ci/release/4.15.0-0.ci-2024-02-10-040857
Status: In Progress
release-openshift-origin-installer-e2e-aws-upgrade-4.11-to-4.12-to-4.13-to-4.14-ci (all) - 14 runs, 100% failed, 43% of failures match = 43% impact
#1783541027445936128junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy based on Ports [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:420]: Interrupted by User
#1783541027445936128junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow traffic based on NamespaceSelector with MatchLabels using default ns label [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1188]: Interrupted by User
#1783541027445936128junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic for a target [Feature:NetworkPolicy]  [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1783541027445936128junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should deny ingress access to updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1783541027445936128junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should not allow access by TCP when a policy specifies only UDP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1783541027445936128junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce multiple ingress policies with ingress allow-all policy taking precedence [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1782453710496993280junit6 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy based on Multiple PodSelectors and NamespaceSelectors [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1782453710496993280junit6 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce ingress policy allowing any port traffic to a server on a specific protocol [Feature:NetworkPolicy] [Feature:UDP] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1782453710496993280junit6 days ago
# [sig-network] Netpol NetworkPolicy between server and client should support a 'default-deny-ingress' policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1782453710496993280junit6 days ago
# [sig-network] Netpol NetworkPolicy between server and client should properly isolate pods that are selected by a policy allowing SCTP, even if the plugin doesn't support SCTP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1782453710496993280junit6 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from updated namespace [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1782453710496993280junit6 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic from pods in all namespaces [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1783178627853062144junit4 days ago
# [sig-network] Netpol NetworkPolicy between server and client should not allow access by TCP when a policy specifies only UDP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1783178627853062144junit4 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic for a target [Feature:NetworkPolicy]  [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1783178627853062144junit4 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from updated namespace [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1783178627853062144junit4 days ago
# [sig-network] Netpol NetworkPolicy between server and client should not mistakenly treat 'protocol: SCTP' as 'protocol: TCP', even if the plugin doesn't support SCTP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1783178627853062144junit4 days ago
# [sig-network] Netpol NetworkPolicy between server and client should support a 'default-deny-ingress' policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1783178627853062144junit4 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1782091290087788544junit7 days ago
# [sig-network] Netpol NetworkPolicy between server and client should support a 'default-deny-ingress' policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
- "80"
#1782091290087788544junit7 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1782091290087788544junit7 days ago
# [sig-network] Netpol NetworkPolicy between server and client should not mistakenly treat 'protocol: SCTP' as 'protocol: TCP', even if the plugin doesn't support SCTP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1780641341378662400junit11 days ago
# [sig-network] Netpol NetworkPolicy between server and client should not mistakenly treat 'protocol: SCTP' as 'protocol: TCP', even if the plugin doesn't support SCTP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1780641341378662400junit11 days ago
# [sig-network] Netpol NetworkPolicy between server and client should support allow-all policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1780641341378662400junit11 days ago
# [sig-network] Netpol NetworkPolicy between server and client should deny ingress access to updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1780641341378662400junit11 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce ingress policy allowing any port traffic to a server on a specific protocol [Feature:NetworkPolicy] [Feature:UDP] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1780641341378662400junit11 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic for a target [Feature:NetworkPolicy]  [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1780641341378662400junit11 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1780278697530494976junit12 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1780278697530494976junit12 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy based on Ports [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1780278697530494976junit12 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1780278697530494976junit12 days ago
# [sig-network] Netpol NetworkPolicy between server and client should support allow-all policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1780278697530494976junit12 days ago
# [sig-network] Netpol NetworkPolicy between server and client should not mistakenly treat 'protocol: SCTP' as 'protocol: TCP', even if the plugin doesn't support SCTP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1780278697530494976junit12 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic for a target [Feature:NetworkPolicy]  [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition

Found in 42.86% of runs (42.86% of failures) across 14 total runs and 1 jobs (100.00% failed) in 472ms - clear search | chart view - source code located on github