Job:
periodic-ci-openshift-release-master-ci-4.16-e2e-azure-ovn-upgrade (all) - 60 runs, 37% failed, 5% of failures match = 2% impact
#1773583576768450560junit2 hours ago
Mar 29 07:17:38.969 E clusteroperator/authentication condition/Available reason/APIServices_Error status/False APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: endpoints for service/api in "openshift-oauth-apiserver" have no addresses with port name "https"
2 tests failed during this blip (2024-03-29 07:17:38.969036781 +0000 UTC m=+228.767369244 to 2024-03-29 07:17:38.969036781 +0000 UTC m=+228.767369244): [sig-network] Netpol NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] EndpointSlice should support a Service with multiple endpoint IPs specified in multiple EndpointSlices [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.)
Mar 29 07:17:38.969 - 63ms  E clusteroperator/authentication condition/Available reason/APIServices_Error status/False APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: endpoints for service/api in "openshift-oauth-apiserver" have no addresses with port name "https"
2 tests failed during this blip (2024-03-29 07:17:38.969036781 +0000 UTC m=+228.767369244 to 2024-03-29 07:17:38.969036781 +0000 UTC m=+228.767369244): [sig-network] Netpol NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] EndpointSlice should support a Service with multiple endpoint IPs specified in multiple EndpointSlices [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.)
Mar 29 07:17:39.032 W clusteroperator/authentication condition/Available reason/AsExpected status/True All is well
2 tests failed during this blip (2024-03-29 07:17:39.032420141 +0000 UTC m=+228.830752602 to 2024-03-29 07:17:39.032420141 +0000 UTC m=+228.830752602): [sig-network] Netpol NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] EndpointSlice should support a Service with multiple endpoint IPs specified in multiple EndpointSlices [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: Available=True is the happy case)
#1773583576768450560junit2 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:53]: Unable to create netpol e2e-netpol-x-861/deny-all: unable to create network policy e2e-netpol-x-861/deny-all: networkpolicies.networking.k8s.io "deny-all" already exists
periodic-ci-openshift-osde2e-main-nightly-4.15-conformance-osd-aws (all) - 4 runs, 100% failed, 75% of failures match = 75% impact
#1773576107690299392junit3 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should ensure an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1773576107690299392junit3 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic for a target [Feature:NetworkPolicy]  [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1773576107690299392junit3 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should support denying of egress traffic on the client side (even if the server explicitly allows this traffic) [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1773576107690299392junit3 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce ingress policy allowing any port traffic to a server on a specific protocol [Feature:NetworkPolicy] [Feature:UDP] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1773576107690299392junit3 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy based on Ports [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1773576107690299392junit3 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from updated namespace [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1773213636098002944junit28 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should deny egress from all pods in a namespace [Feature:NetworkPolicy]  [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1773213636098002944junit28 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1773213636098002944junit28 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce multiple egress policies with egress allow-all policy taking precedence [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1773213636098002944junit28 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should not allow access by TCP when a policy specifies only UDP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1773213636098002944junit28 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1773213636098002944junit28 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policies to check ingress and egress policies can be controlled independently based on PodSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1772851197506490368junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1772851197506490368junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy based on Multiple PodSelectors and NamespaceSelectors [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1772851197506490368junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should deny ingress access to updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1772851197506490368junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from updated namespace [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1772851197506490368junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1772851197506490368junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should not allow access by TCP when a policy specifies only UDP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
periodic-ci-openshift-osde2e-main-nightly-4.16-conformance-osd-aws (all) - 4 runs, 100% failed, 75% of failures match = 75% impact
#1773576115235852288junit4 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy based on Multiple PodSelectors and NamespaceSelectors [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1773576115235852288junit4 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1773576115235852288junit4 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1773576115235852288junit4 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from updated namespace [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1773576115235852288junit4 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should support a 'default-deny-ingress' policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1773576115235852288junit4 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic for a target [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1772851200006295552junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should support a 'default-deny-ingress' policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1772851200006295552junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce ingress policy allowing any port traffic to a server on a specific protocol [Feature:NetworkPolicy] [Feature:UDP] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1772851200006295552junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce multiple egress policies with egress allow-all policy taking precedence [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1772851200006295552junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should ensure an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1772851200006295552junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy based on Ports [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1772851200006295552junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should support denying of egress traffic on the client side (even if the server explicitly allows this traffic) [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1772488807015256064junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should ensure an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1772488807015256064junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should support denying of egress traffic on the client side (even if the server explicitly allows this traffic) [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1772488807015256064junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should deny egress from all pods in a namespace [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1772488807015256064junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should work with Ingress, Egress specified together [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1772488807015256064junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should support a 'default-deny-ingress' policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1772488807015256064junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic for a target [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
pull-ci-openshift-installer-master-e2e-azurestack (all) - 37 runs, 57% failed, 29% of failures match = 16% impact
#1773542760322699264junit5 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix
#1773542760322699264junit5 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1773542760322699264junit5 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1773536925920006144junit5 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1773536925920006144junit5 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix
#1773536925920006144junit5 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1773509297523658752junit7 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1773509297523658752junit7 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1773509297523658752junit7 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix
#1773097843783897088junit34 hours ago
Mar 27 22:37:03.687 E clusteroperator/console condition/Available reason/RouteHealth_FailedGet status/False RouteHealthAvailable: failed to GET route (https://console-openshift-console.apps.ci-op-q90snv62-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX): Get "https://console-openshift-console.apps.ci-op-q90snv62-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX": dial tcp: lookup console-openshift-console.apps.ci-op-q90snv62-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX on 172.30.0.10:53: no such host
2 tests failed during this blip (2024-03-27 22:37:03.687462487 +0000 UTC m=+263.956494478 to 2024-03-27 22:37:03.687462487 +0000 UTC m=+263.956494478): [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Networking Granular Checks: Services should support basic nodePort: udp functionality [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.)
Mar 27 22:37:03.687 - 926s  E clusteroperator/console condition/Available reason/RouteHealth_FailedGet status/False RouteHealthAvailable: failed to GET route (https://console-openshift-console.apps.ci-op-q90snv62-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX): Get "https://console-openshift-console.apps.ci-op-q90snv62-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX": dial tcp: lookup console-openshift-console.apps.ci-op-q90snv62-195eb.XXXXXXXXXXXXXXXXXXXXXXXXXXX on 172.30.0.10:53: no such host
2 tests failed during this blip (2024-03-27 22:37:03.687462487 +0000 UTC m=+263.956494478 to 2024-03-27 22:37:03.687462487 +0000 UTC m=+263.956494478): [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Networking Granular Checks: Services should support basic nodePort: udp functionality [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.)
#1773097843783897088junit34 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix
#1773097843783897088junit34 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1773097843783897088junit34 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1772751629095800832junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix
#1772751629095800832junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1772751629095800832junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1772277631517986816junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 3 wrong results in reachability matrix
#1772277631517986816junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
#1772277631517986816junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 24 wrong results in reachability matrix
periodic-ci-openshift-multiarch-master-nightly-4.12-ocp-e2e-ovn-remote-libvirt-s390x (all) - 1 runs, 100% failed, 100% of failures match = 100% impact
#1773515732642959360junit8 hours ago
[sig-cli] oc idle [apigroup:apps.openshift.io][apigroup:route.openshift.io][apigroup:project.openshift.io][apigroup:image.openshift.io] by all [Suite:openshift/conformance/parallel]
[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-node] [Feature:Example] Liveness liveness pods should be automatically restarted [Suite:openshift/conformance/parallel] [Suite:k8s]
#1773515732642959360junit8 hours ago
[sig-cli] oc idle [apigroup:apps.openshift.io][apigroup:route.openshift.io][apigroup:project.openshift.io][apigroup:image.openshift.io] by all [Suite:openshift/conformance/parallel]
[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-node] [Feature:Example] Liveness liveness pods should be automatically restarted [Suite:openshift/conformance/parallel] [Suite:k8s]
#1773515732642959360junit8 hours ago
# [sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.25.0/test/e2e/network/netpol/network_legacy.go:1912]: Mar 29 01:42:30.234: Pod client-can-connect-80-xvqwr should be able to connect to service svc-server, but was not able to connect.
#1773515732642959360junit8 hours ago
Mar 29 01:41:56.234 E ns/e2e-job-792 pod/fail-once-local-qmsfv node/libvirt-s390x-4-1-dac-mh8rg-worker-0-flztx uid/4dda210f-88cf-4eeb-a577-e4f54d83fc80 container/c reason/ContainerExit code/1 cause/Error
Mar 29 01:41:57.234 - 34s   E e2e-test/"[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]" e2e test finished As "Failed"
Mar 29 01:41:57.649 E ns/e2e-pods-243 pod/pod-terminate-status-1-4 node/libvirt-s390x-4-1-dac-mh8rg-worker-0-hwn7r uid/77e1671b-453a-4460-9fe2-27e226a147f1 container/fail init container exited with code 1 (Error):
#1773515732642959360junit8 hours ago
Mar 29 01:42:30.546 - 1s    E node/libvirt-s390x-4-1-dac-mh8rg-worker-0-flztx reason/FailedToDeleteCGroupsPath Mar 29 01:42:30.546444 libvirt-s390x-4-1-dac-mh8rg-worker-0-flztx kubenswrapper[2219]: I0329 01:42:30.538415    2219 pod_container_manager_linux.go:191] "Failed to delete cgroup paths" cgroupName=[kubepods burstable pod4aee4010-a1fc-4f57-a31d-9306e824e018] err="unable to destroy cgroup paths for cgroup [kubepods burstable pod4aee4010-a1fc-4f57-a31d-9306e824e018] : Timed out while waiting for systemd to remove kubepods-burstable-pod4aee4010_a1fc_4f57_a31d_9306e824e018.slice"
Mar 29 01:42:31.801 E e2e-test/"[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]" finishedStatus/Failed
Mar 29 01:42:33.665 E ns/e2e-pods-243 pod/pod-terminate-status-0-5 node/libvirt-s390x-4-1-dac-mh8rg-worker-0-flztx uid/747e5e95-7a4f-4ee5-a8a5-baa2cd936194 container/fail reason/ContainerExit code/1 cause/Error
periodic-ci-openshift-release-master-nightly-4.15-e2e-agent-compact-ipv4-conformance (all) - 16 runs, 44% failed, 43% of failures match = 19% impact
#1773500810773139456junit8 hours ago
Mar 29 01:44:48.013 E clusteroperator/kube-storage-version-migrator condition/Available reason/KubeStorageVersionMigrator_Deploying status/False KubeStorageVersionMigratorAvailable: Waiting for Deployment
5 tests failed during this blip (2024-03-29 01:44:48.013277973 +0000 UTC m=+556.013601450 to 2024-03-29 01:44:48.013277973 +0000 UTC m=+556.013601450): [sig-network] Netpol NetworkPolicy between server and client should support allow-all policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should enforce multiple egress policies with egress allow-all policy taking precedence [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow traffic based on NamespaceSelector with MatchLabels using default ns label [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should support a 'default-deny-ingress' policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should allow ingress access from updated namespace [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.)
Mar 29 01:44:48.013 - 17s   E clusteroperator/kube-storage-version-migrator condition/Available reason/KubeStorageVersionMigrator_Deploying status/False KubeStorageVersionMigratorAvailable: Waiting for Deployment
5 tests failed during this blip (2024-03-29 01:44:48.013277973 +0000 UTC m=+556.013601450 to 2024-03-29 01:44:48.013277973 +0000 UTC m=+556.013601450): [sig-network] Netpol NetworkPolicy between server and client should support allow-all policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should enforce multiple egress policies with egress allow-all policy taking precedence [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow traffic based on NamespaceSelector with MatchLabels using default ns label [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should support a 'default-deny-ingress' policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should allow ingress access from updated namespace [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s] (exception: We are not worried about Available=False or Degraded=True blips for stable-system tests yet.)
Mar 29 01:45:05.195 W clusteroperator/kube-storage-version-migrator condition/Available reason/AsExpected status/True All is well
#1773331634813145088junit20 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should ensure an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/test/e2e/network/netpol/network_policy.go:1052]: Interrupted by User
#1773331634813145088junit20 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should support allow-all policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/test/e2e/network/netpol/network_policy.go:499]: Interrupted by User
#1773068969838645248junit36 hours ago
nshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should enforce policy based on Multiple PodSelectors and NamespaceSelectors [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic for a target [Feature:NetworkPolicy]  [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should work with Ingress, Egress specified together [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Networking Granular Checks: Services should function for pod-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s]
#1773068969838645248junit36 hours ago
nshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should enforce policy based on Multiple PodSelectors and NamespaceSelectors [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic for a target [Feature:NetworkPolicy]  [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should work with Ingress, Egress specified together [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Networking Granular Checks: Services should function for pod-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s]
periodic-ci-shiftstack-shiftstack-ci-main-periodic-4.16-e2e-openstack-ovn-password (all) - 4 runs, 25% failed, 100% of failures match = 25% impact
#1773469287676121088junit11 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should support a 'default-deny-ingress' policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/openshift-hack/e2e/namespace.go:114]: rpc error: code = Unavailable desc = error reading from server: read tcp 10.0.2.227:37224->10.0.2.229:2379: read: connection timed out
#1773469287676121088junit11 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should not mistakenly treat 'protocol: SCTP' as 'protocol: TCP', even if the plugin doesn't support SCTP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/openshift-hack/e2e/namespace.go:114]: rpc error: code = Unavailable desc = error reading from server: read tcp 10.0.1.164:59534->10.0.2.229:2379: read: connection timed out
aggregated-azure-ovn-upgrade-4.16-micro-release-openshift-release-analysis-aggregator (all) - 8 runs, 50% failed, 75% of failures match = 38% impact
#1773447661513347072junit12 hours ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should enforce ingress policy allowing any port traffic to a server on a specific protocol [Feature:NetworkPolicy] [Feature:UDP] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should enforce
  ingress policy allowing any port traffic to a server on a specific protocol [Feature:NetworkPolicy]
#1773447661513347072junit12 hours ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should stop enforcing
  policies after they are deleted [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant]
#1773447661513347072junit12 hours ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should ensure an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should ensure
  an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed [Feature:NetworkPolicy]
#1773416725493059584junit14 hours ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should enforce ingress policy allowing any port traffic to a server on a specific protocol [Feature:NetworkPolicy] [Feature:UDP] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should enforce
  ingress policy allowing any port traffic to a server on a specific protocol [Feature:NetworkPolicy]
#1773416725493059584junit14 hours ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should stop enforcing
  policies after they are deleted [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant]
#1773416725493059584junit14 hours ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should ensure an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should ensure
  an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed [Feature:NetworkPolicy]
#1773363545052811264junit16 hours ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should enforce ingress policy allowing any port traffic to a server on a specific protocol [Feature:NetworkPolicy] [Feature:UDP] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should enforce
  ingress policy allowing any port traffic to a server on a specific protocol [Feature:NetworkPolicy]
#1773363545052811264junit16 hours ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should stop enforcing
  policies after they are deleted [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant]
#1773363545052811264junit16 hours ago
# openshift-tests.[sig-network] Netpol NetworkPolicy between server and client should ensure an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
name: '[sig-network] Netpol NetworkPolicy between server and client should ensure
  an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed [Feature:NetworkPolicy]
periodic-ci-openshift-multiarch-master-nightly-4.16-ocp-e2e-ovn-remote-libvirt-s390x (all) - 18 runs, 83% failed, 7% of failures match = 6% impact
#1773363357076688896junit17 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should support allow-all policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/network_policy.go:500]: Interrupted by User
#1773363357076688896junit17 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce ingress policy allowing any port traffic to a server on a specific protocol [Feature:NetworkPolicy] [Feature:UDP] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/network_policy.go:896]: Interrupted by User
#1773363357076688896junit17 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should work with Ingress, Egress specified together [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/network_policy.go:736]: Interrupted by User
#1773363357076688896junit17 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce multiple egress policies with egress allow-all policy taking precedence [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/network_policy.go:939]: Interrupted by User
#1773363357076688896junit17 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from updated namespace [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/network_policy.go:609]: Interrupted by User
periodic-ci-openshift-multiarch-master-nightly-4.14-ocp-e2e-ovn-remote-libvirt-s390x (all) - 8 runs, 63% failed, 20% of failures match = 13% impact
#1773364683462414336junit18 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce multiple egress policies with egress allow-all policy taking precedence [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
io.copyBuffer({0x8aa5160, 0xc001f67f80}, {0x7f82b85f29f0, 0xc001578000}, {0x0, 0x0, 0x0})
periodic-ci-openshift-release-master-ci-4.14-e2e-azure-cilium (all) - 1 runs, 100% failed, 100% of failures match = 100% impact
#1773309991315312640junit21 hours ago
# step graph.Run multi-stage test e2e-azure-cilium - e2e-azure-cilium-openshift-e2e-test container test
odic-ci-openshift-release-master-ci-4.13-e2e-azure-cilium'] in the last 14 days."]},"OpenBugs":[]},{"Name":"[sig-network-edge][Feature:Idling] Unidling [apigroup:apps.openshift.io][apigroup:route.openshift.io] should work with TCP (when fully idled) [Suite:openshift/conformance/parallel]","Risk":{"Level":{"Name":"Low","Level":1},"Reasons":["This test has passed 0.00% of 2 runs on jobs ['periodic-ci-openshift-release-master-ci-4.14-e2e-azure-cilium' 'periodic-ci-openshift-release-master-ci-4.13-e2e-azure-cilium'] in the last 14 days."]},"OpenBugs":[]},{"Name":"[sig-network] Services should serve endpoints on same port and different protocols [Suite:openshift/conformance/parallel] [Suite:k8s]","Risk":{"Level":{"Name":"Low","Level":1},"Reasons":["This test has passed 0.00% of 1 runs on jobs ['periodic-ci-openshift-release-master-ci-4.14-e2e-azure-cilium' 'periodic-ci-openshift-release-master-ci-4.13-e2e-azure-cilium'] in the last 14 days."]},"OpenBugs":[]},{"Name":"[sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]","Risk":{"Level":{"Name":"Low","Level":1},"Reasons":["This test has passed 0.00% of 1 runs on jobs ['periodic-ci-openshift-release-master-ci-4.14-e2e-azure-cilium' 'periodic-ci-openshift-release-master-ci-4.13-e2e-azure-cilium'] in the last 14 days."]},"OpenBugs":[]}],"OverallRisk":{"Level":{"Name":"Low","Level":1},"Reasons":["Maximum failed test risk: Low"]},"OpenBugs":[]}
#1773309991315312640junit21 hours ago
---
odic-ci-openshift-release-master-ci-4.13-e2e-azure-cilium'] in the last 14 days."]},"OpenBugs":[]},{"Name":"[sig-network-edge][Feature:Idling] Unidling [apigroup:apps.openshift.io][apigroup:route.openshift.io] should work with TCP (when fully idled) [Suite:openshift/conformance/parallel]","Risk":{"Level":{"Name":"Low","Level":1},"Reasons":["This test has passed 0.00% of 2 runs on jobs ['periodic-ci-openshift-release-master-ci-4.14-e2e-azure-cilium' 'periodic-ci-openshift-release-master-ci-4.13-e2e-azure-cilium'] in the last 14 days."]},"OpenBugs":[]},{"Name":"[sig-network] Services should serve endpoints on same port and different protocols [Suite:openshift/conformance/parallel] [Suite:k8s]","Risk":{"Level":{"Name":"Low","Level":1},"Reasons":["This test has passed 0.00% of 1 runs on jobs ['periodic-ci-openshift-release-master-ci-4.14-e2e-azure-cilium' 'periodic-ci-openshift-release-master-ci-4.13-e2e-azure-cilium'] in the last 14 days."]},"OpenBugs":[]},{"Name":"[sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]","Risk":{"Level":{"Name":"Low","Level":1},"Reasons":["This test has passed 0.00% of 1 runs on jobs ['periodic-ci-openshift-release-master-ci-4.14-e2e-azure-cilium' 'periodic-ci-openshift-release-master-ci-4.13-e2e-azure-cilium'] in the last 14 days."]},"OpenBugs":[]}],"OverallRisk":{"Level":{"Name":"Low","Level":1},"Reasons":["Maximum failed test risk: Low"]},"OpenBugs":[]}
#1773309991315312640junit21 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/test_helper.go:129]: Had 7 wrong results in reachability matrix
#1773309991315312640junit21 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/test_helper.go:129]: Had 7 wrong results in reachability matrix
periodic-ci-openshift-release-master-ci-4.14-e2e-aws-cilium (all) - 1 runs, 100% failed, 100% of failures match = 100% impact
#1773309986022100992junit21 hours ago
# step graph.Run multi-stage test e2e-aws-cilium - e2e-aws-cilium-openshift-e2e-test container test
riodic-ci-openshift-release-master-ci-4.14-e2e-aws-cilium' 'periodic-ci-openshift-release-master-ci-4.13-e2e-aws-cilium'] in the last 14 days."]},"OpenBugs":[]},{"Name":"[sig-network] Services should serve endpoints on same port and different protocols [Suite:openshift/conformance/parallel] [Suite:k8s]","Risk":{"Level":{"Name":"Low","Level":1},"Reasons":["This test has passed 0.00% of 1 runs on jobs ['periodic-ci-openshift-release-master-ci-4.14-e2e-aws-cilium' 'periodic-ci-openshift-release-master-ci-4.13-e2e-aws-cilium'] in the last 14 days."]},"OpenBugs":[]},{"Name":"[sig-network] Services should be rejected for evicted pods (no endpoints exist) [Suite:openshift/conformance/parallel] [Suite:k8s]","Risk":{"Level":{"Name":"Low","Level":1},"Reasons":["This test has passed 0.00% of 3 runs on jobs ['periodic-ci-openshift-release-master-ci-4.14-e2e-aws-cilium' 'periodic-ci-openshift-release-master-ci-4.13-e2e-aws-cilium'] in the last 14 days."]},"OpenBugs":[]},{"Name":"[sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]","Risk":{"Level":{"Name":"Low","Level":1},"Reasons":["This test has passed 0.00% of 1 runs on jobs ['periodic-ci-openshift-release-master-ci-4.14-e2e-aws-cilium' 'periodic-ci-openshift-release-master-ci-4.13-e2e-aws-cilium'] in the last 14 days."]},"OpenBugs":[]}],"OverallRisk":{"Level":{"Name":"Low","Level":1},"Reasons":["Maximum failed test risk: Low"]},"OpenBugs":[]}
#1773309986022100992junit21 hours ago
---
riodic-ci-openshift-release-master-ci-4.14-e2e-aws-cilium' 'periodic-ci-openshift-release-master-ci-4.13-e2e-aws-cilium'] in the last 14 days."]},"OpenBugs":[]},{"Name":"[sig-network] Services should serve endpoints on same port and different protocols [Suite:openshift/conformance/parallel] [Suite:k8s]","Risk":{"Level":{"Name":"Low","Level":1},"Reasons":["This test has passed 0.00% of 1 runs on jobs ['periodic-ci-openshift-release-master-ci-4.14-e2e-aws-cilium' 'periodic-ci-openshift-release-master-ci-4.13-e2e-aws-cilium'] in the last 14 days."]},"OpenBugs":[]},{"Name":"[sig-network] Services should be rejected for evicted pods (no endpoints exist) [Suite:openshift/conformance/parallel] [Suite:k8s]","Risk":{"Level":{"Name":"Low","Level":1},"Reasons":["This test has passed 0.00% of 3 runs on jobs ['periodic-ci-openshift-release-master-ci-4.14-e2e-aws-cilium' 'periodic-ci-openshift-release-master-ci-4.13-e2e-aws-cilium'] in the last 14 days."]},"OpenBugs":[]},{"Name":"[sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]","Risk":{"Level":{"Name":"Low","Level":1},"Reasons":["This test has passed 0.00% of 1 runs on jobs ['periodic-ci-openshift-release-master-ci-4.14-e2e-aws-cilium' 'periodic-ci-openshift-release-master-ci-4.13-e2e-aws-cilium'] in the last 14 days."]},"OpenBugs":[]}],"OverallRisk":{"Level":{"Name":"Low","Level":1},"Reasons":["Maximum failed test risk: Low"]},"OpenBugs":[]}
#1773309986022100992junit21 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/test_helper.go:129]: Had 7 wrong results in reachability matrix
#1773309986022100992junit21 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/test_helper.go:129]: Had 7 wrong results in reachability matrix
periodic-ci-openshift-release-master-ci-4.14-e2e-gcp-cilium (all) - 1 runs, 100% failed, 100% of failures match = 100% impact
#1773309994528149504junit21 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/test_helper.go:129]: Had 7 wrong results in reachability matrix
#1773309994528149504junit21 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/test_helper.go:129]: Had 7 wrong results in reachability matrix
periodic-ci-openshift-multiarch-master-nightly-4.15-ocp-e2e-ovn-remote-libvirt-s390x (all) - 19 runs, 84% failed, 13% of failures match = 11% impact
#1773234179195015168junit26 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce ingress policy allowing any port traffic to a server on a specific protocol [Feature:NetworkPolicy] [Feature:UDP] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/test/e2e/network/netpol/network_policy.go:895]: Interrupted by User
#1772934548682706944junit46 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce multiple egress policies with egress allow-all policy taking precedence [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/test/e2e/network/netpol/network_policy.go:938]: Interrupted by User
#1772934548682706944junit46 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/test/e2e/network/netpol/network_policy.go:963]: Interrupted by User
periodic-ci-openshift-multiarch-master-nightly-4.15-ocp-e2e-ovn-remote-libvirt-s390x-heterogeneous (all) - 8 runs, 75% failed, 17% of failures match = 13% impact
#1773198555175981056junit27 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should support allow-all policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
Mar 28 05:32:31.314: INFO: Enabling in-tree volume drivers
release-openshift-origin-installer-e2e-aws-upgrade-4.11-to-4.12-to-4.13-to-4.14-ci (all) - 4 runs, 100% failed, 25% of failures match = 25% impact
#1773030095435337728junit37 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from updated namespace [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/test_helper.go:129]: Had 67 wrong results in reachability matrix
#1773030095435337728junit37 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow traffic based on NamespaceSelector with MatchLabels using default ns label [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1773030095435337728junit37 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should deny ingress access to updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1773030095435337728junit37 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should not allow access by TCP when a policy specifies only UDP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1773030095435337728junit37 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy based on Multiple PodSelectors and NamespaceSelectors [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
#1773030095435337728junit37 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce multiple ingress policies with ingress allow-all policy taking precedence [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/network_policy.go:1452]: unable to initialize resources: timed out waiting for the condition
pull-ci-openshift-cluster-network-operator-master-4.16-upgrade-from-stable-4.15-e2e-gcp-ovn-upgrade (all) - 20 runs, 25% failed, 20% of failures match = 5% impact
#1773045681615802368junit37 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should support a 'default-deny-all' policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/framework/framework.go:396]: Couldn't delete ns: "e2e-netpol-x-4607": Delete "https://api.ci-op-85n494ls-f148d.XXXXXXXXXXXXXXXXXXXXXX:6443/api/v1/namespaces/e2e-netpol-x-4607": read tcp 10.130.80.38:43658->104.198.241.101:6443: read: connection reset by peer (&url.Error{Op:"Delete", URL:"https://api.ci-op-85n494ls-f148d.XXXXXXXXXXXXXXXXXXXXXX:6443/api/v1/namespaces/e2e-netpol-x-4607", Err:(*net.OpError)(0xc001f84f00)})
periodic-ci-openshift-release-master-nightly-4.14-e2e-vsphere-ovn-techpreview (all) - 9 runs, 22% failed, 50% of failures match = 11% impact
#1773058352390082560junit38 hours ago
12 tests failed during this blip (2024-03-27 19:35:45.12284617 +0000 UTC to 2024-03-27 19:35:45.12284617 +0000 UTC): [sig-network] Services should serve endpoints on same port and different protocols [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should ensure an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of same group and version but different kinds [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
#1773058352390082560junit38 hours ago
8 tests failed during this blip (2024-03-27 19:35:50 +0000 UTC to 2024-03-27 19:35:50 +0000 UTC): [sig-network] Services should serve endpoints on same port and different protocols [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should ensure an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of same group and version but different kinds [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
#1773058352390082560junit38 hours ago
8 tests failed during this blip (2024-03-27 19:35:50.394080682 +0000 UTC to 2024-03-27 19:35:50.394080682 +0000 UTC): [sig-network] Services should serve endpoints on same port and different protocols [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-network] Netpol NetworkPolicy between server and client should ensure an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of same group and version but different kinds [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
#1773058352390082560junit38 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should ensure an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.27.1/test/e2e/network/netpol/test_helper.go:65]: Unable to update netpol e2e-netpol-x-969/allow-client-a-via-cidr-egress-rule: unable to update network policy e2e-netpol-x-969/allow-client-a-via-cidr-egress-rule: Put "https://api.ci-op-4r6cphpd-691b3.vmc-ci.devcluster.openshift.com:6443/apis/networking.k8s.io/v1/namespaces/e2e-netpol-x-969/networkpolicies/allow-client-a-via-cidr-egress-rule": read tcp 10.129.7.192:50860->10.177.248.2:6443: read: connection reset by peer
periodic-ci-openshift-multiarch-master-nightly-4.13-ocp-e2e-aws-ovn-heterogeneous (all) - 8 runs, 13% failed, 100% of failures match = 13% impact
#1772986673584410624junit43 hours ago
# [sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on NamespaceSelector with MatchExpressions[Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.26.1/test/e2e/network/netpol/network_legacy.go:1957]: Mar 27 14:41:47.423: Pod client-a-9jvhv should not be able to connect to service svc-server, but was able to connect.
#1772986673584410624junit43 hours ago
# [sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should allow egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.26.1/test/e2e/network/netpol/network_legacy.go:1957]: Mar 27 14:45:34.094: Pod client-a-n76qp should not be able to connect to service svc-pod-b, but was able to connect.
#1772986673584410624junit43 hours ago
Mar 27 14:41:24.449 E ns/e2e-pods-6920 pod/pod-terminate-status-0-1 node/ip-10-0-249-168.ec2.internal uid/9ab08d2c-69dd-4173-a44f-c28033984484 reason/Failed ():
Mar 27 14:41:25.339 - 22s   E e2e-test/"[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on NamespaceSelector with MatchExpressions[Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]" e2e test finished As "Failed"
Mar 27 14:41:27.702 E ns/e2e-pods-6920 pod/pod-terminate-status-1-2 node/ip-10-0-201-253.ec2.internal uid/ce7eb860-f71e-476b-8774-a6d7b9510bd8 container/fail reason/ContainerExit code/1 cause/Error
#1772986673584410624junit43 hours ago
Mar 27 14:41:46.930 E ns/e2e-pods-6920 pod/pod-terminate-status-0-7 node/ip-10-0-236-205.ec2.internal uid/ebe470af-7fd4-493b-b154-6d0007998960 reason/Failed ():
Mar 27 14:41:47.698 E e2e-test/"[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on NamespaceSelector with MatchExpressions[Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]" finishedStatus/Failed
Mar 27 14:41:47.708 E ns/e2e-container-runtime-3158 pod/terminate-cmd-rpac8312c28-83d7-4498-a8d1-a9cd5b4c08d6 node/ip-10-0-191-18.ec2.internal uid/936de9c4-be18-4345-b1f5-6f1765571202 container/terminate-cmd-rpa reason/ContainerExit code/1 cause/Error
#1772986673584410624junit43 hours ago
Mar 27 14:45:02.505 E ns/e2e-network-policy-9852 pod/server-msfpb node/ip-10-0-236-205.ec2.internal uid/9e79e652-483a-4ea7-9ce5-3cb168a7e4c0 reason/Failed ():
Mar 27 14:45:03.991 - 30s   E e2e-test/"[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should allow egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]" e2e test finished As "Failed"
Mar 27 14:45:05.372 E ns/e2e-network-policy-2386 pod/client-b-22s7p node/ip-10-0-191-18.ec2.internal uid/58f51882-f79d-4c9b-963a-dd3b35a548d6 container/client reason/ContainerExit code/1 cause/Error
#1772986673584410624junit43 hours ago
Mar 27 14:45:33.607 E ns/e2e-cronjob-1896 pod/concurrent-28525845-djxn6 node/ip-10-0-249-168.ec2.internal uid/28b8fef2-056b-49c1-a348-4116257ad707 container/c reason/ContainerExit code/137 cause/Error
Mar 27 14:45:34.402 E e2e-test/"[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should allow egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]" finishedStatus/Failed
Mar 27 14:45:34.853 E ns/e2e-privileged-pod-6492 pod/privileged-pod node/ip-10-0-191-18.ec2.internal uid/3addd2ff-e8e4-4ebf-ac8c-cbabd23ff85e container/not-privileged-container reason/ContainerExit code/137 cause/Error
periodic-ci-openshift-release-master-ci-4.15-e2e-azure-cilium (all) - 1 runs, 100% failed, 100% of failures match = 100% impact
#1772960893617836032junit44 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/test/e2e/network/netpol/test_helper.go:129]: Had 7 wrong results in reachability matrix
#1772960893617836032junit44 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/test/e2e/network/netpol/test_helper.go:129]: Had 7 wrong results in reachability matrix
periodic-ci-openshift-release-master-ci-4.15-e2e-gcp-cilium (all) - 1 runs, 100% failed, 100% of failures match = 100% impact
#1772961139966087168junit44 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/test/e2e/network/netpol/test_helper.go:129]: Had 7 wrong results in reachability matrix
#1772961139966087168junit44 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/test/e2e/network/netpol/test_helper.go:129]: Had 7 wrong results in reachability matrix
periodic-ci-openshift-release-master-ci-4.15-e2e-aws-cilium (all) - 1 runs, 100% failed, 100% of failures match = 100% impact
#1772960888295264256junit45 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/test/e2e/network/netpol/test_helper.go:129]: Had 7 wrong results in reachability matrix
#1772960888295264256junit45 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/test/e2e/network/netpol/test_helper.go:129]: Had 7 wrong results in reachability matrix
periodic-ci-openshift-release-master-ci-4.16-e2e-gcp-ovn-upgrade (all) - 150 runs, 27% failed, 3% of failures match = 1% impact
#1772933722992021504junit45 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic from pods in all namespaces [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 8 wrong results in reachability matrix
pull-ci-openshift-cluster-network-operator-master-e2e-ovn-hybrid-step-registry (all) - 19 runs, 21% failed, 25% of failures match = 5% impact
#1772936031411113984junit46 hours ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic from pods in all namespaces [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 8 wrong results in reachability matrix
periodic-ci-openshift-release-master-ci-4.12-e2e-azure-ovn-upgrade (all) - 14 runs, 57% failed, 13% of failures match = 7% impact
#1772709760844435456junit2 days ago
# [sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should not allow access by TCP when a policy specifies only SCTP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.25.0/test/e2e/network/netpol/network_legacy.go:1925]: Mar 26 21:34:50.346: Pod client-a-p9589 should not be able to connect to service svc-server, but was able to connect.
#1772709760844435456junit2 days ago
Mar 26 21:33:52.132 E ns/e2e-container-lifecycle-hook-7572 pod/pod-with-prestop-http-hook node/ci-op-0y0itr8t-e5103-km84v-worker-eastus3-txkcq uid/d756376a-ceb7-4d27-a595-3d0973c16c3b container/pod-with-prestop-http-hook reason/ContainerExit code/137 cause/ContainerStatusUnknown The container could not be located when the pod was deleted.  The container used to be Running
Mar 26 21:33:52.697 - 58s   E e2e-test/"[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should not allow access by TCP when a policy specifies only SCTP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]" e2e test finished As "Failed"
Mar 26 21:33:53.029 E ns/e2e-network-policy-b-3602 pod/client-b-cqvcc node/ci-op-0y0itr8t-e5103-km84v-worker-eastus3-txkcq uid/0c457e5f-0da9-4d42-972d-68c4c0706398 container/client container exited with code 1 (Error):
#1772709760844435456junit2 days ago
Mar 26 21:34:44.105 E ns/e2e-container-lifecycle-hook-2028 pod/pod-with-poststart-exec-hook node/ci-op-0y0itr8t-e5103-km84v-worker-eastus3-txkcq uid/0e875063-f1ff-4ca6-9597-addf22317aac container/pod-with-poststart-exec-hook reason/ContainerExit code/2 cause/Error
Mar 26 21:34:50.961 E e2e-test/"[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should not allow access by TCP when a policy specifies only SCTP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]" finishedStatus/Failed
Mar 26 21:34:55.168 E ns/e2e-network-policy-9105 pod/server-m5l26 node/ci-op-0y0itr8t-e5103-km84v-worker-eastus1-hgt4d uid/359f774f-a36f-414c-84c3-6e2f9a2c956e container/server-container-81 reason/ContainerExit code/2 cause/Error
pull-ci-openshift-origin-master-e2e-aws-ovn-single-node (all) - 42 runs, 60% failed, 4% of failures match = 2% impact
#1772684141972688896junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow traffic based on NamespaceSelector with MatchLabels using default ns label [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/network_policy.go:1465]: unable to initialize resources: unable to wait for pod e2e-netpol-z-78/b: Timed out after 300.001s.
periodic-ci-openshift-multiarch-master-nightly-4.15-ocp-e2e-aws-ovn-arm64-single-node (all) - 16 runs, 19% failed, 33% of failures match = 6% impact
#1772632778534293504junit2 days ago
# [sig-network] Netpol NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/test/e2e/network/netpol/network_policy.go:1464]: unable to initialize resources: unable to wait for pod e2e-netpol-y-8972/b: Timed out after 300.001s.
periodic-ci-openshift-multiarch-master-nightly-4.13-ocp-e2e-aws-ovn-arm64-techpreview (all) - 6 runs, 33% failed, 50% of failures match = 17% impact
#1772632250832130048junit2 days ago
# [sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.26.1/test/e2e/network/netpol/network_legacy.go:1957]: Mar 26 15:15:06.996: Pod client-a-q5k58 should not be able to connect to service svc-server, but was able to connect.
#1772632250832130048junit2 days ago
Mar 26 15:14:51.156 E ns/e2e-pods-4823 pod/pod-terminate-status-2-7 node/ip-10-0-238-204.ec2.internal uid/ac4ab821-0365-4c59-91bb-0acdd1607e0b reason/Failed ():
Mar 26 15:14:51.415 - 15s   E e2e-test/"[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]" e2e test finished As "Failed"
Mar 26 15:14:51.894 E ns/e2e-pods-4823 pod/pod-terminate-status-1-8 node/ip-10-0-166-6.ec2.internal uid/002b50fa-cdec-4847-833f-26bc82c68159 container/fail reason/ContainerExit code/1 cause/Error
#1772632250832130048junit2 days ago
Mar 26 15:15:07.053 E ns/e2e-pods-4823 pod/pod-terminate-status-0-13 node/ip-10-0-167-65.ec2.internal uid/b42ad3e9-1f50-4fca-8247-b894be191bd9 reason/Failed ():
Mar 26 15:15:07.323 E e2e-test/"[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]" finishedStatus/Failed
Mar 26 15:15:08.056 E ns/e2e-network-policy-9587 pod/server-hzrnl node/ip-10-0-166-6.ec2.internal uid/9a09a8b8-b1d3-498e-afb6-e0d929971ed4 container/server-container-81 reason/ContainerExit code/2 cause/Error
periodic-ci-openshift-osde2e-main-nightly-4.15-conformance-rosa-classic-sts (all) - 4 runs, 100% failed, 25% of failures match = 25% impact
#1772488806163812352junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow traffic based on NamespaceSelector with MatchLabels using default ns label [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1772488806163812352junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1772488806163812352junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1772488806163812352junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1772488806163812352junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
#1772488806163812352junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce ingress policy allowing any port traffic to a server on a specific protocol [Feature:NetworkPolicy] [Feature:UDP] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.28.2/openshift-hack/e2e/namespace.go:114]: admission webhook "scc-validation.managed.openshift.io" denied the request: Modifying default SCCs [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2] is not allowed
pull-ci-openshift-cluster-network-operator-master-e2e-metal-ipi-ovn-ipv6-ipsec (all) - 19 runs, 53% failed, 10% of failures match = 5% impact
#1772348790892662784junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/network_policy.go:1019]: Interrupted by User
#1772348790892662784junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should deny ingress access to updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/network_policy.go:686]: Interrupted by User
#1772348790892662784junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy based on Ports [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/network_policy.go:433]: Interrupted by User
#1772348790892662784junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should deny egress from all pods in a namespace [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/network_policy.go:722]: Interrupted by User
#1772348790892662784junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should support a 'default-deny-all' policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/network_policy.go:147]: Interrupted by User
#1772348790892662784junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should allow ingress access from updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/network_policy.go:640]: Interrupted by User
periodic-ci-openshift-release-master-ci-4.16-e2e-azure-cilium (all) - 1 runs, 100% failed, 100% of failures match = 100% impact
#1772354390057816064junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 7 wrong results in reachability matrix
#1772354390057816064junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 7 wrong results in reachability matrix
periodic-ci-openshift-release-master-nightly-4.7-e2e-gcp-rt (all) - 1 runs, 100% failed, 100% of failures match = 100% impact
#1772362438323212288junit3 days ago
# [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce updated policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.20.0/test/e2e/network/network_policy.go:1909]: Mar 25 21:47:03.078: Pod client-b-vpptw should be able to connect to service svc-server, but was not able to connect.
periodic-ci-openshift-release-master-ci-4.16-e2e-gcp-cilium (all) - 1 runs, 100% failed, 100% of failures match = 100% impact
#1772354392268214272junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 7 wrong results in reachability matrix
#1772354392268214272junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 7 wrong results in reachability matrix
pull-ci-openshift-installer-master-e2e-vsphere-upi-zones (all) - 14 runs, 71% failed, 10% of failures match = 7% impact
#1772352285188296704junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic from pods in all namespaces [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 8 wrong results in reachability matrix
periodic-ci-openshift-release-master-ci-4.16-e2e-aws-cilium (all) - 1 runs, 100% failed, 100% of failures match = 100% impact
#1772354385167257600junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 7 wrong results in reachability matrix
#1772354385167257600junit3 days ago
# [sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.29.0/test/e2e/network/netpol/test_helper.go:129]: Had 7 wrong results in reachability matrix
periodic-ci-openshift-release-master-ci-4.10-e2e-network-migration (all) - 1 runs, 0% failed, 100% of runs match
#1772191256990978048junit3 days ago
# [sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should support a 'default-deny-ingress' policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]
fail [k8s.io/kubernetes@v1.23.0/test/e2e/network/netpol/network_legacy.go:1922]: Mar 25 11:14:29.226: Pod client-cannot-connect-hnq6v should not be able to connect to service svc-server, but was able to connect.
#1772191256990978048junit3 days ago
Mar 25 11:14:05.962 E ns/e2e-ephemeral-2180 pod/inline-volume-tester-gsr2t node/ip-10-0-155-158.ec2.internal container/csi-volume-tester reason/ContainerExit code/137 cause/Error
Mar 25 11:14:06.086 - 23s   E e2e-test/"[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should support a 'default-deny-ingress' policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]" e2e test finished As "Failed"
Mar 25 11:14:15.684 E ns/e2e-volume-3634 pod/aws-injector node/ip-10-0-176-242.ec2.internal container/aws-injector reason/ContainerExit code/137 cause/Error
#1772191256990978048junit3 days ago
Mar 25 11:14:29.171 E ns/e2e-privileged-pod-1502 pod/privileged-pod node/ip-10-0-155-158.ec2.internal container/not-privileged-container reason/ContainerExit code/137 cause/Error
Mar 25 11:14:29.497 E e2e-test/"[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should support a 'default-deny-ingress' policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]" finishedStatus/Failed
Mar 25 11:14:30.876 E ns/e2e-network-policy-7223 pod/server-nm84n node/ip-10-0-195-117.ec2.internal container/server-container-81 container exited with code 2 (Error):

Found in 0.06% of runs (0.33% of failures) across 89130 total runs and 6970 jobs (16.80% failed) in 1.503s - clear search | chart view - source code located on github