Uploaded image for project: 'OpenShift Bugs'
  1. OpenShift Bugs
  2. OCPBUGS-60413

[CI][OpenStack][DualStack][sig-network][sig-node] DNS and Endpoint issues

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Unresolved
    • Icon: Normal Normal
    • None
    • 4.20.0
    • None
    • Quality / Stability / Reliability
    • False
    • Hide

      None

      Show
      None
    • None
    • None
    • None
    • None
    • None
    • None
    • ShiftStack Sprint 277, ShiftStack Sprint 278
    • 2
    • None
    • None
    • None
    • None
    • None
    • None
    • None

      Description of problem:

      The following tests are failing due to DNS and Endpoints issues in OpenStack Clouds

          "Tests": [
              {
                  "Test": {
                      "Name": "[sig-node] [Feature:KubeletFineGrainedAuthz] when calling kubelet API check /healthz enpoint is accessible via nodes/proxy RBAC [Suite:openshift/conformance/parallel] [Suite:k8s]"
                  },
                  "Suite": {
                      "Name": "openshift-tests"
                  },
                  "Status": 12
              },
              {
                  "Test": {
                      "Name": "[sig-node] [Feature:KubeletFineGrainedAuthz] when calling kubelet API check /healthz enpoint is accessible via nodes/healthz RBAC [Suite:openshift/conformance/parallel] [Suite:k8s]"
                  },
                  "Suite": {
                      "Name": "openshift-tests"
                  },
                  "Status": 12
              },
              {
                  "Test": {
                      "Name": "[sig-network] DNS should provide DNS for the cluster [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]"
                  },
                  "Suite": {
                      "Name": "openshift-tests"
                  },
                  "Status": 12
              },
              {
                  "Test": {
                      "Name": "[sig-node] [Feature:KubeletFineGrainedAuthz] when calling kubelet API check /healthz enpoint is not accessible via nodes/configz RBAC [Suite:openshift/conformance/parallel] [Suite:k8s]"
                  },
                  "Suite": {
                      "Name": "openshift-tests"
                  },
                  "Status": 12
              },
              {
                  "Test": {
                      "Name": "[sig-network] DNS should resolve DNS of partial qualified names for services [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]"
                  },
                  "Suite": {
                      "Name": "openshift-tests"
                  },
                  "Status": 12
              },
              {
                  "Test": {
                      "Name": "[sig-network] DNS [Feature:RelaxedDNSSearchValidation] [FeatureGate:RelaxedDNSSearchValidation] [Beta] should work with a search path containing an underscore and a search path with a single dot [Suite:openshift/conformance/parallel] [Suite:k8s]"
                  },
                  "Suite": {
                      "Name": "openshift-tests"
                  },
                  "Status": 12
              }
          ],    

      Are those tests supporting On-Prem/Baremetal Clouds where Name Resolution is limited or a disconnected environment is present? 

      Version-Release number of selected component (if applicable):

      4.20    

      How reproducible:

      https://prow.ci.openshift.org/job-history/gs/test-platform-results/logs/periodic-ci-shiftstack-ci-release-4.20-e2e-openstack-dualstack-v6primary

      Steps to Reproduce:

          1.
          2.
          3.
          

      Actual results:

      Fail    

      Expected results:

      Pass    

      Additional info:

          

              maandre@redhat.com Martin André
              rh-ee-mcarpio Miguel Carpio
              None
              None
              None
              None
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

                Created:
                Updated: