Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OCPBUGS-24531: Skip CI for scope change until OCPBUGS-24044 is resolved #1007

Conversation

candita
Copy link
Contributor

@candita candita commented Dec 11, 2023

Skip CI for scope change until OCPBUGS-24044 is resolved.

test/e2e/unmanaged_dns_test.go

  • TestUnmanagedDNSToManagedDNSInternalIngressController
  • TestUnmanagedDNSToManagedDNSInternalIngressController

test/e2e/operator_test.go

  • TestScopeChange

@openshift-ci-robot openshift-ci-robot added jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. labels Dec 11, 2023
@openshift-ci-robot
Copy link
Contributor

@candita: This pull request references Jira Issue OCPBUGS-24531, which is valid.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.16.0) matches configured target version for branch (4.16.0)
  • bug is in the state POST, which is one of the valid states (NEW, ASSIGNED, POST)

Requesting review from QA contact:
/cc @lihongan

The bug has been updated to refer to the pull request using the external bug tracker.

In response to this:

Skip CI for scope change until OCPBUGS-24044 is resolved.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@candita candita force-pushed the OCPBUGS-24531-SkipScopeChangeTest branch from ce69d1e to e99ddfc Compare December 12, 2023 00:12
@candita
Copy link
Contributor Author

candita commented Dec 12, 2023

Discussion in https://redhat-internal.slack.com/archives/CBN38N3MW/p1702377824518579 for:

level=info msg=Cluster operator insights SCAAvailable is False with Forbidden: Failed to pull SCA certs from https://api.openshift.com/api/accounts_mgmt/v1/certificates: OCM API https://api.openshift.com/api/accounts_mgmt/v1/certificates returned HTTP 403: {"code":"ACCT-MGMT-11","href":"/api/accounts_mgmt/v1/errors/11","id":"11","kind":"Error","operation_id":"40c093c9-4373-401a-bfd8-fba13c1e5756","reason":"Account with ID 2DUeKzzTD9ngfsQ6YgkzdJn1jA4 denied access to perform create on Certificate with HTTP call POST /api/accounts_mgmt/v1/certificates"}
level=info msg=Cluster operator kube-apiserver EvaluationConditionsDetected is False with AsExpected: All is well
level=info msg=Cluster operator network ManagementStateDegraded is False with :
level=error msg=Bootstrap failed to complete: timed out waiting for the condition
level=error msg=Failed to wait for bootstrapping to complete. This error usually happens when there is a problem with control plane hosts that prevents the control plane operators from creating the control plane.
level=warning msg=The bootstrap machine is unable to resolve API and/or API-Int Server URLs

@candita
Copy link
Contributor Author

candita commented Dec 12, 2023

Hypershift not perma-failing, try again:
/test e2e-hypershift

@candita
Copy link
Contributor Author

candita commented Dec 12, 2023

/test e2e-aws-ovn-upgrade

<*errors.errorString | 0xc000f7e0a0>{
        s: "promQL query returned unexpected results:\nALERTS{alertname!~\"Watchdog|AlertmanagerReceiversNotConfigured|PrometheusRemoteWriteDesiredShards|KubeJobFailed|TelemeterClientFailures|Watchdog|KubePodNotReady|KubePodNotReady|....

KubePodNotReady|KubePodNotReady|KubePodNotReady|KubePodNotReady|KubePodNotReady|KubePodNotReady|KubePodNotReady|etcdMembersDown|etcdMembersDown|etcdGRPCRequestsSlow|etcdGRPCRequestsSlow|etcdHighNumberOfFailedGRPCRequests|etcdHighNumberOfFailedGRPCRequests|etcdMemberCommunicationSlow|etcdMemberCommunicationSlow|etcdNoLeader|etcdNoLeader|etcdHighFsyncDurations|etcdHighFsyncDurations|etcdHighCommitDurations|etcdHighCommitDurations|etcdInsufficientMembers|etcdInsufficientMembers|TargetDown|etcdHighNumberOfLeaderChanges|etcdHighNumberOfLeaderChanges|KubeAPIErrorBudgetBurn|KubeAPIErrorBudgetBurn|KubeClientErrors|KubeClientErrors|KubePersistentVolumeErrors|KubePersistentVolumeErrors|MCDDrainError|MCDDrainError|KubeMemoryOvercommit|KubeMemoryOvercommit|MCDPivotError|MCDPivotError|PrometheusOperatorWatchErrors|PrometheusOperatorWatchErrors|OVNKubernetesResourceRetryFailure|OVNKubernetesResourceRetryFailure|RedhatOperatorsCatalogError|RedhatOperatorsCatalogError|VSphereOpenshiftNodeHealthFail|VSphereOpenshiftNodeHealthFail|SamplesImagestreamImportFailing|SamplesImagestreamImportFailing|PodSecurityViolation",alertstate="firing",severity!="info"} >= 1\n[\n {\n "metric": {\n "name": "ALERTS",\n "alertname": "KubeAggregatedAPIErrors",\n "alertstate": "firing",\n "name": "v1.apps.openshift.io",\n "namespace": "default",\n "prometheus": "openshift-monitoring/k8s",\n "severity": "warning"\n },\n "value": [\n 1702342433.793,\n "1"\n ]\n },\n {\n "metric": {\n "name": "ALERTS",\n "alertname": "KubeAggregatedAPIErrors",\n "alertstate": "firing",\n "name": "v1.build.openshift.io",\n "namespace": "default",\n "prometheus": "openshift-monitoring/k8s",\n "severity": "warning"\n },\n "value": [\n 1702342433.793,\n "1"\n ]\n },\n {\n "metric": {\n "name": "ALERTS",\n "alertname": "KubeAggregatedAPIErrors",\n "alertstate": "firing",\n "name": "v1.image.openshift.io",\n "namespace": "default",\n "prometheus": "openshift-monitoring/k8s",\n "severity": "warning"\n },\n "value": [\n 1702342433.793,\n "1"\n ]\n },\n {\n "metric": {\n "name": "ALERTS",\n "alertname": "KubeAggregatedAPIErrors",\n "alertstate": "firing",\n "name": "v1.packages.operators.coreos.com",\n "namespace": "default",\n "prometheus": "openshift-monitoring/k8s",\n "severity": "warning"\n },\n "value": [\n 1702342433.793,\n "1"\n ]\n },\n {\n "metric": {\n "name": "ALERTS",\n "alertname": "KubeAggregatedAPIErrors",\n "alertstate": "firing",\n "name": "v1.quota.openshift.io",\n "namespace": "default",\n "prometheus": "openshift-monitoring/k8s",\n "severity": "warning"\n },\n "value": [\n 1702342433.793,\n "1"\n ]\n },\n {\n "metric": {\n "name": "ALERTS",\n "alertname": "KubeAggregatedAPIErrors",\n "alertstate": "firing",\n "name": "v1.route.openshift.io",\n "namespace": "default",\n "prometheus": "openshift-monitoring/k8s",\n "severity": "warning"\n },\n "value": [\n 1702342433.793,\n "1"\n ]\n },\n {\n "metric": {\n "name": "ALERTS",\n "alertname": "KubeAggregatedAPIErrors",\n "alertstate": "firing",\n "name": "v1.security.openshift.io",\n "namespace": "default",\n "prometheus": "openshift-monitoring/k8s",\n "severity": "warning"\n },\n "value": [\n 1702342433.793,\n "1"\n ]\n },\n {\n "metric": {\n "name": "ALERTS",\n "alertname": "KubeAggregatedAPIErrors",\n "alertstate": "firing",\n "name": "v1.template.openshift.io",\n "namespace": "default",\n "prometheus": "openshift-monitoring/k8s",\n "severity": "warning"\n },\n "value": [\n 1702342433.793,\n "1"\n ]\n }\n]",
},

@candita
Copy link
Contributor Author

candita commented Dec 12, 2023

/test e2e-gcp-operator

level=info msg=Cluster operator insights SCAAvailable is False with Forbidden: Failed to pull SCA certs from https://api.openshift.com/api/accounts_mgmt/v1/certificates: OCM API https://api.openshift.com/api/accounts_mgmt/v1/certificates returned HTTP 403: {"code":"ACCT-MGMT-11","href":"/api/accounts_mgmt/v1/errors/11","id":"11","kind":"Error","operation_id":"40c093c9-4373-401a-bfd8-fba13c1e5756","reason":"Account with ID 2DUeKzzTD9ngfsQ6YgkzdJn1jA4 denied access to perform create on Certificate with HTTP call POST /api/accounts_mgmt/v1/certificates"}
level=info msg=Cluster operator kube-apiserver EvaluationConditionsDetected is False with AsExpected: All is well

@candita
Copy link
Contributor Author

candita commented Dec 12, 2023

Hopefully this is not a permafailure:

time="2023-12-12T00:56:30Z" level=info msg="resulting interval locator" locator="{Kind map[hmsg:6f7364b16a namespace:e2e-pod-network-disruption-test-wswvz replicaset:pod-network-to-service-disruption-poller-6946b95794]}"
time="2023-12-12T00:56:30Z" level=info msg="resulting interval message" message="{FailedCreate Error creating: pods "pod-network-to-service-disruption-poller-6946b95794-7ttfx" already exists, the server was not able to generate a unique name for the object map[reason:FailedCreate]}"

/test e2e-aws-ovn-serial

@candita
Copy link
Contributor Author

candita commented Dec 12, 2023

/test e2e-gcp-ovn

level=info msg=Cluster operator insights SCAAvailable is False with Forbidden: Failed to pull SCA certs from https://api.openshift.com/api/accounts_mgmt/v1/certificates: OCM API https://api.openshift.com/api/accounts_mgmt/v1/certificates returned HTTP 403: {"code":"ACCT-MGMT-11","href":"/api/accounts_mgmt/v1/errors/11","id":"11","kind":"Error","operation_id":"f3d572bc-04f2-469d-939b-dd18275ad288","reason":"Account with ID 2DUeKzzTD9ngfsQ6YgkzdJn1jA4 denied access to perform create on Certificate with HTTP call POST /api/accounts_mgmt/v1/certificates"}
level=info msg=Cluster operator kube-apiserver EvaluationConditionsDetected is False with AsExpected: All is well

@alebedev87
Copy link
Contributor

/lgtm
/approve

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Dec 12, 2023
Copy link
Contributor

openshift-ci bot commented Dec 12, 2023

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: alebedev87

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Dec 12, 2023
Copy link
Contributor

openshift-ci bot commented Dec 12, 2023

@candita: all tests passed!

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@openshift-merge-bot openshift-merge-bot bot merged commit 7a44e03 into openshift:master Dec 12, 2023
14 checks passed
@openshift-ci-robot
Copy link
Contributor

@candita: Jira Issue OCPBUGS-24531: Some pull requests linked via external trackers have merged:

The following pull requests linked via external trackers have not merged:

These pull request must merge or be unlinked from the Jira bug in order for it to move to the next state. Once unlinked, request a bug refresh with /jira refresh.

Jira Issue OCPBUGS-24531 has not been moved to the MODIFIED state.

In response to this:

Skip CI for scope change until OCPBUGS-24044 is resolved.

test/e2e/unmanaged_dns_test.go

  • TestUnmanagedDNSToManagedDNSInternalIngressController
  • TestUnmanagedDNSToManagedDNSInternalIngressController

test/e2e/operator_test.go

  • TestScopeChange

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-bot
Copy link
Contributor

[ART PR BUILD NOTIFIER]

This PR has been included in build ose-cluster-ingress-operator-container-v4.16.0-202312130634.p0.g7a44e03.assembly.stream for distgit ose-cluster-ingress-operator.
All builds following this will include this PR.

candita added a commit to candita/cluster-ingress-operator that referenced this pull request Dec 13, 2023
…SkipScopeChangeTest"

This reverts commit 7a44e03, reversing
changes made to 9a87287.
openshift-merge-bot bot added a commit that referenced this pull request Dec 14, 2023
OCPBUGS-24531: Revert "Merge pull request #1007 from candita/OCPBUGS-24531-SkipScopeChangeTest" and add changes to skip test only for Azure and GCP
candita added a commit to candita/cluster-ingress-operator that referenced this pull request Dec 19, 2023
… candita/OCPBUGS-24531-SkipScopeChangeTest" and add changes to skip test only for Azure and GCP"
candita added a commit to candita/cluster-ingress-operator that referenced this pull request Dec 20, 2023
…S-24531-SkipScopeChangeTest""

This reverts commit 1a703af.
candita added a commit to candita/cluster-ingress-operator that referenced this pull request Dec 20, 2023
…SkipScopeChangeTest"

This reverts commit 7a44e03, reversing
changes made to 9a87287.
candita added a commit to candita/cluster-ingress-operator that referenced this pull request Dec 20, 2023
…SkipScopeChangeTest"

This reverts commit 7a44e03, reversing
changes made to e99ddfc.
candita added a commit to candita/cluster-ingress-operator that referenced this pull request Dec 20, 2023
…SkipScopeChangeTest"

This reverts commit 7a44e03, reversing
changes made to e99ddfc.
Miciah added a commit that referenced this pull request Dec 20, 2023
…OCPBUGS-24531-SkipScopeChangeTest" and add changes to skip test only for Azure and GCP"
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants