#TRT-1501 | issue | 8 weeks ago | NetPol tests may not be recording results correctly? In Progress |
Issue 15799618: NetPol tests may not be recording results correctly? Description: On https://prow.ci.openshift.org/view/gs/test-platform-results/logs/aggregated-gcp-ovn-upgrade-4.15-micro-release-openshift-release-analysis-aggregator/1756168710529224704 we failed three netpol tests on just one result, failure, with no successess. However the other 9 jobs seemed to run fine. [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s] Something seems funky with these tests, they're barely running, they don't seem to consistently report results. [4.15 has just 3 runs in the last two weeks|https://sippy.dptools.openshift.org/sippy-ng/tests/4.15/analysis?test=%5Bsig-network%5D%20Netpol%20NetworkPolicy%20between%20server%20and%20client%20should%20allow%20ingress%20access%20from%20namespace%20on%20one%20named%20port%20%5BFeature%3ANetworkPolicy%5D%20%5BSkipped%3ANetwork%2FOVNKubernetes%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%2FMultitenant%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%5D%20%5BSuite%3Aopenshift%2Fconformance%2Fparallel%5D%20%5BSuite%3Ak8s%5D&filters=%7B%22items%22%3A%5B%7B%22columnField%22%3A%22name%22%2C%22operatorValue%22%3A%22equals%22%2C%22value%22%3A%22%5Bsig-network%5D%20Netpol%20NetworkPolicy%20between%20server%20and%20client%20should%20allow%20ingress%20access%20from%20namespace%20on%20one%20named%20port%20%5BFeature%3ANetworkPolicy%5D%20%5BSkipped%3ANetwork%2FOVNKubernetes%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%2FMultitenant%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%5D%20%5BSuite%3Aopenshift%2Fconformance%2Fparallel%5D%20%5BSuite%3Ak8s%5D%22%7D%5D%2C%22linkOperator%22%3A%22and%22%7D], however [4.16 has just 1 but it passed|https://sippy.dptools.openshift.org/sippy-ng/tests/4.16/analysis?test=%5Bsig-network%5D%20Netpol%20NetworkPolicy%20between%20server%20and%20client%20should%20allow%20ingress%20access%20from%20namespace%20on%20one%20named%20port%20%5BFeature%3ANetworkPolicy%5D%20%5BSkipped%3ANetwork%2FOVNKubernetes%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%2FMultitenant%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%5D%20%5BSuite%3Aopenshift%2Fconformance%2Fparallel%5D%20%5BSuite%3Ak8s%5D&filters=%7B%22items%22%3A%5B%7B%22columnField%22%3A%22name%22%2C%22operatorValue%22%3A%22equals%22%2C%22value%22%3A%22%5Bsig-network%5D%20Netpol%20NetworkPolicy%20between%20server%20and%20client%20should%20allow%20ingress%20access%20from%20namespace%20on%20one%20named%20port%20%5BFeature%3ANetworkPolicy%5D%20%5BSkipped%3ANetwork%2FOVNKubernetes%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%2FMultitenant%5D%20%5BSkipped%3ANetwork%2FOpenShiftSDN%5D%20%5BSuite%3Aopenshift%2Fconformance%2Fparallel%5D%20%5BSuite%3Ak8s%5D%22%7D%5D%2C%22linkOperator%22%3A%22and%22%7D] Whatever's going on, it's capable of taking out a payload, though it's not happening 100% of the time. https://amd64.ocp.releases.ci.openshift.org/releasestream/4.15.0-0.ci/release/4.15.0-0.ci-2024-02-10-040857 Status: In Progress | |||
release-openshift-origin-installer-e2e-aws-upgrade-4.11-to-4.12-to-4.13-to-4.14-ci (all) - 14 runs, 100% failed, 43% of failures match = 43% impact | |||
#1783541027445936128 | junit | 3 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy based on Ports [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:420]: Interrupted by User | |||
#1783541027445936128 | junit | 3 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow traffic based on NamespaceSelector with MatchLabels using default ns label [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1188]: Interrupted by User | |||
#1783541027445936128 | junit | 3 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic for a target [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1783541027445936128 | junit | 3 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should deny ingress access to updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1783541027445936128 | junit | 3 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should not allow access by TCP when a policy specifies only UDP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1783541027445936128 | junit | 3 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should enforce multiple ingress policies with ingress allow-all policy taking precedence [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1782453710496993280 | junit | 6 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy based on Multiple PodSelectors and NamespaceSelectors [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1782453710496993280 | junit | 6 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should enforce ingress policy allowing any port traffic to a server on a specific protocol [Feature:NetworkPolicy] [Feature:UDP] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1782453710496993280 | junit | 6 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should support a 'default-deny-ingress' policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1782453710496993280 | junit | 6 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should properly isolate pods that are selected by a policy allowing SCTP, even if the plugin doesn't support SCTP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1782453710496993280 | junit | 6 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from updated namespace [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1782453710496993280 | junit | 6 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic from pods in all namespaces [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1783178627853062144 | junit | 4 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should not allow access by TCP when a policy specifies only UDP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1783178627853062144 | junit | 4 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic for a target [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1783178627853062144 | junit | 4 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from updated namespace [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1783178627853062144 | junit | 4 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should not mistakenly treat 'protocol: SCTP' as 'protocol: TCP', even if the plugin doesn't support SCTP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1783178627853062144 | junit | 4 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should support a 'default-deny-ingress' policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1783178627853062144 | junit | 4 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1782091290087788544 | junit | 7 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should support a 'default-deny-ingress' policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] - "80" | |||
#1782091290087788544 | junit | 7 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1782091290087788544 | junit | 7 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should not mistakenly treat 'protocol: SCTP' as 'protocol: TCP', even if the plugin doesn't support SCTP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1780641341378662400 | junit | 11 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should not mistakenly treat 'protocol: SCTP' as 'protocol: TCP', even if the plugin doesn't support SCTP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1780641341378662400 | junit | 11 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should support allow-all policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1780641341378662400 | junit | 11 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should deny ingress access to updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1780641341378662400 | junit | 11 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should enforce ingress policy allowing any port traffic to a server on a specific protocol [Feature:NetworkPolicy] [Feature:UDP] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1780641341378662400 | junit | 11 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic for a target [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1780641341378662400 | junit | 11 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1780278697530494976 | junit | 12 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1780278697530494976 | junit | 12 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy based on Ports [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1780278697530494976 | junit | 12 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1780278697530494976 | junit | 12 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should support allow-all policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1780278697530494976 | junit | 12 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should not mistakenly treat 'protocol: SCTP' as 'protocol: TCP', even if the plugin doesn't support SCTP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition | |||
#1780278697530494976 | junit | 12 days ago | |
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic for a target [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition |
Found in 42.86% of runs (42.86% of failures) across 14 total runs and 1 jobs (100.00% failed) in 472ms - clear search | chart view - source code located on github