Skip to content

CORENET-6168: Add ovn tests extension#30560

Open
jluhrsen wants to merge 2 commits intoopenshift:mainfrom
jluhrsen:add-ovn-tests-extension
Open

CORENET-6168: Add ovn tests extension#30560
jluhrsen wants to merge 2 commits intoopenshift:mainfrom
jluhrsen:add-ovn-tests-extension

Conversation

@jluhrsen
Copy link
Contributor

@jluhrsen jluhrsen commented Dec 3, 2025

No description provided.

@openshift-ci-robot
Copy link

Pipeline controller notification
This repo is configured to use the pipeline controller. Second-stage tests will be triggered either automatically or after lgtm label is added, depending on the repository configuration. The pipeline controller will automatically detect which contexts are required and will utilize /test Prow commands to trigger the second stage.

For optional jobs, comment /test ? to see a list of all defined jobs. To trigger manually all jobs from second stage use /pipeline required command.

This repository is configured in: automatic mode

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Dec 3, 2025
@openshift-ci-robot
Copy link

openshift-ci-robot commented Dec 3, 2025

@jluhrsen: This pull request references CORENET-4510 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the epic to target the "4.21.0" version, but no target version was set.

Details

In response to this:

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-merge-robot openshift-merge-robot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Dec 3, 2025
@openshift-ci openshift-ci bot requested review from deads2k and sjenning December 3, 2025 02:01
@jluhrsen jluhrsen force-pushed the add-ovn-tests-extension branch from 21838fd to 2530736 Compare December 3, 2025 02:09
@openshift-merge-robot openshift-merge-robot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Dec 3, 2025
@jluhrsen
Copy link
Contributor Author

jluhrsen commented Dec 3, 2025

/payload-job-with-prs periodic-ci-openshift-release-master-ci-4.21-e2e-aws-ovn openshift/ovn-kubernetes#2889

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Dec 3, 2025

@jluhrsen: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command

  • periodic-ci-openshift-release-master-ci-4.21-e2e-aws-ovn

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/2492bac0-cfed-11f0-8358-3266731cfe9a-0

@openshift-merge-robot openshift-merge-robot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Dec 13, 2025
this is a no-op commit just to help visually search for
test extension binaries

Signed-off-by: Jamo Luhrsen <jluhrsen@gmail.com>
Signed-off-by: Jamo Luhrsen <jluhrsen@gmail.com>
@jluhrsen jluhrsen force-pushed the add-ovn-tests-extension branch from 2530736 to fb9c943 Compare January 21, 2026 18:12
@openshift-merge-robot openshift-merge-robot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Jan 21, 2026
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jan 21, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: jluhrsen
Once this PR has been reviewed and has the lgtm label, please assign neisw for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci-robot
Copy link

Scheduling required tests:
/test e2e-aws-csi
/test e2e-aws-ovn-fips
/test e2e-aws-ovn-microshift
/test e2e-aws-ovn-microshift-serial
/test e2e-aws-ovn-serial-1of2
/test e2e-aws-ovn-serial-2of2
/test e2e-gcp-csi
/test e2e-gcp-ovn
/test e2e-gcp-ovn-upgrade
/test e2e-metal-ipi-ovn-ipv6
/test e2e-vsphere-ovn
/test e2e-vsphere-ovn-upi

@jluhrsen
Copy link
Contributor Author

/payload-job periodic-ci-openshift-release-master-ci-4.21-e2e-aws-ovn-techpreview

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jan 21, 2026

@jluhrsen: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command

  • periodic-ci-openshift-release-master-ci-4.21-e2e-aws-ovn-techpreview

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/d0cdddf0-f712-11f0-8a43-5b8e3f27cf5c-0

@jluhrsen
Copy link
Contributor Author

/payload-job periodic-ci-openshift-release-master-ci-4.21-upgrade-from-stable-4.20-e2e-aws-ovn-upgrade

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jan 21, 2026

@jluhrsen: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command

  • periodic-ci-openshift-release-master-ci-4.21-upgrade-from-stable-4.20-e2e-aws-ovn-upgrade

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/246df2b0-f713-11f0-9ef8-c66ab29ab6a4-0

@jluhrsen
Copy link
Contributor Author

/payload-job periodic-ci-openshift-release-master-ci-4.21-upgrade-from-stable-4.20-e2e-azure-ovn-upgrade

@jluhrsen
Copy link
Contributor Author

/payload-job periodic-ci-openshift-release-master-ci-4.21-e2e-gcp-ovn-upgrade

@jluhrsen
Copy link
Contributor Author

/payload-job periodic-ci-openshift-hypershift-release-4.21-periodics-e2e-aks

@jluhrsen
Copy link
Contributor Author

/payload-job periodic-ci-openshift-hypershift-release-4.21-periodics-e2e-aws-ovn

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jan 21, 2026

@jluhrsen: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command

  • periodic-ci-openshift-release-master-ci-4.21-upgrade-from-stable-4.20-e2e-azure-ovn-upgrade

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/39259910-f713-11f0-8001-b3fa6dda7770-0

@jluhrsen
Copy link
Contributor Author

/payload-job periodic-ci-openshift-release-master-ci-4.21-e2e-aws-upgrade-ovn-single-node

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jan 21, 2026

@jluhrsen: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command

  • periodic-ci-openshift-release-master-ci-4.21-e2e-gcp-ovn-upgrade

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/3a746030-f713-11f0-92e0-2b2b6bce50cd-0

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 3, 2026

@jluhrsen: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command

  • periodic-ci-openshift-release-main-ci-4.22-e2e-aws-ovn

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/957eef30-16bd-11f1-8ef6-8f3a336991c0-0

@openshift-trt
Copy link

openshift-trt bot commented Mar 3, 2026

Job Failure Risk Analysis for sha: fb9c943

Job Name Failure Risk
pull-ci-openshift-origin-main-e2e-metal-ipi-ovn-ipv6 IncompleteTests
Tests for this run (28) are below the historical average (2300): IncompleteTests (not enough tests ran to make a reasonable risk analysis; this could be due to infra, installation, or upgrade problems)

Risk analysis has seen new tests most likely introduced by this PR.
Please ensure that new tests meet guidelines for naming and stability.

New Test Risks for sha: fb9c943

Job Name New Test Risk
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should accept valid CRs ClusterUserDefinedNetwork, evpn" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should reject invalid CRs ClusterUserDefinedNetwork, evpn" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should accept valid VTEP CRs Valid VTEP configurations" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should reject invalid VTEP CRs Invalid VTEP configurations" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:MultiHoming][ovn-kubernetes-ote][sig-network] Multi Homing A pod with multiple attachments to the same secondary NAD features multiple different IPs and connectivity redundancy L2 secondary NAD" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:MultiHoming][ovn-kubernetes-ote][sig-network] Multi Homing A pod with multiple attachments to the same secondary NAD features multiple different IPs and connectivity redundancy L3 secondary NAD" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkConnect][ovn-kubernetes-ote][sig-network] ClusterNetworkConnect OVN-Kubernetes Controller End-to-end connectivity validation should manage cross-network connectivity through CNC lifecycle" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkConnect][ovn-kubernetes-ote][sig-network] ClusterNetworkConnect OVN-Kubernetes Controller Multiple CNCs with overlapping network selection should maintain non-transitive connectivity when a network is selected by multiple CNCs" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller pod connected to ClusterUserDefinedNetwork CR & managed NADs cannot be deleted when being used [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller should create NAD according to spec in each target namespace and report active namespaces [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller should create NAD in new created namespaces that apply to namespace-selector [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when CR is deleted, should delete all managed NAD in each target namespace [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when namespace-selector is mutated should create NAD in namespaces that apply to mutated namespace-selector [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when namespace-selector is mutated should delete managed NAD in namespaces that no longer apply to namespace-selector [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for L2 secondary network pod connected to UserDefinedNetwork cannot be deleted when being used [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for L2 secondary network should create NetworkAttachmentDefinition according to spec [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for L2 secondary network should delete NetworkAttachmentDefinition when UserDefinedNetwork is deleted [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for primary UDN without required namespace label should be able to create pod and it will attach to the cluster default network [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for primary UDN without required namespace label should not be able to update the namespace and add the UDN label [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
(...showing 20 of 431 rows)

New tests seen in this PR at sha: fb9c943

  • "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should accept valid CRs ClusterUserDefinedNetwork, evpn" [Total: 25, Pass: 20, Fail: 5, Flake: 0]
  • "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should reject invalid CRs ClusterUserDefinedNetwork, evpn" [Total: 25, Pass: 20, Fail: 5, Flake: 0]
  • "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should accept valid VTEP CRs Valid VTEP configurations" [Total: 25, Pass: 20, Fail: 5, Flake: 0]
  • "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should reject invalid VTEP CRs Invalid VTEP configurations" [Total: 25, Pass: 20, Fail: 5, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 25, Pass: 20, Fail: 5, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L2 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 5, Pass: 4, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L3 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 5, Pass: 4, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L2 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 5, Pass: 4, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L3 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 5, Pass: 4, Fail: 1, Flake: 0]
  • "[Feature:MultiHoming][ovn-kubernetes-ote][sig-network] Multi Homing A pod with multiple attachments to the same secondary NAD features multiple different IPs and connectivity redundancy L2 secondary NAD" [Total: 25, Pass: 23, Fail: 2, Flake: 0]
  • "[Feature:MultiHoming][ovn-kubernetes-ote][sig-network] Multi Homing A pod with multiple attachments to the same secondary NAD features multiple different IPs and connectivity redundancy L3 secondary NAD" [Total: 25, Pass: 23, Fail: 2, Flake: 0]
  • "[Feature:NetworkConnect][ovn-kubernetes-ote][sig-network] ClusterNetworkConnect OVN-Kubernetes Controller End-to-end connectivity validation should manage cross-network connectivity through CNC lifecycle" [Total: 25, Pass: 20, Fail: 5, Flake: 0]
  • "[Feature:NetworkConnect][ovn-kubernetes-ote][sig-network] ClusterNetworkConnect OVN-Kubernetes Controller Multiple CNCs with overlapping network selection should maintain non-transitive connectivity when a network is selected by multiple CNCs" [Total: 25, Pass: 20, Fail: 5, Flake: 0]
  • "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller pod connected to ClusterUserDefinedNetwork CR & managed NADs cannot be deleted when being used [Suite:openshift/conformance/parallel]" [Total: 28, Pass: 25, Fail: 3, Flake: 0]
  • "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller should create NAD according to spec in each target namespace and report active namespaces [Suite:openshift/conformance/parallel]" [Total: 28, Pass: 25, Fail: 3, Flake: 0]
  • "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller should create NAD in new created namespaces that apply to namespace-selector [Suite:openshift/conformance/parallel]" [Total: 28, Pass: 25, Fail: 3, Flake: 0]
  • "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when CR is deleted, should delete all managed NAD in each target namespace [Suite:openshift/conformance/parallel]" [Total: 28, Pass: 25, Fail: 3, Flake: 0]
  • "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when namespace-selector is mutated should create NAD in namespaces that apply to mutated namespace-selector [Suite:openshift/conformance/parallel]" [Total: 28, Pass: 25, Fail: 3, Flake: 0]
  • "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when namespace-selector is mutated should delete managed NAD in namespaces that no longer apply to namespace-selector [Suite:openshift/conformance/parallel]" [Total: 28, Pass: 25, Fail: 3, Flake: 0]
  • "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for L2 secondary network pod connected to UserDefinedNetwork cannot be deleted when being used [Suite:openshift/conformance/parallel]" [Total: 28, Pass: 25, Fail: 3, Flake: 0]
  • (...showing 20 of 85 tests)

@jluhrsen
Copy link
Contributor Author

jluhrsen commented Mar 3, 2026

/payload-job-with-prs periodic-ci-openshift-release-main-ci-4.22-e2e-aws-ovn openshift/ovn-kubernetes#3011 openshift/multus-cni#280 #30820

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 3, 2026

@jluhrsen: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command

  • periodic-ci-openshift-release-main-ci-4.22-e2e-aws-ovn

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/03ce5310-174d-11f1-8109-f196366c640e-0

@pperiyasamy
Copy link
Member

  • periodic-ci-openshift-release-main-ci-4.22-e2e-aws-ovn

This run has one informing ote test failing, but that is ok and doesn't block to merge this PR.

@pperiyasamy
Copy link
Member

/test e2e-metal-ipi-ovn-ipv6

@openshift-trt
Copy link

openshift-trt bot commented Mar 4, 2026

Risk analysis has seen new tests most likely introduced by this PR.
Please ensure that new tests meet guidelines for naming and stability.

New Test Risks for sha: fb9c943

Job Name New Test Risk
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should accept valid CRs ClusterUserDefinedNetwork, evpn" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should reject invalid CRs ClusterUserDefinedNetwork, evpn" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should accept valid VTEP CRs Valid VTEP configurations" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should reject invalid VTEP CRs Invalid VTEP configurations" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:MultiHoming][ovn-kubernetes-ote][sig-network] Multi Homing A pod with multiple attachments to the same secondary NAD features multiple different IPs and connectivity redundancy L2 secondary NAD" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:MultiHoming][ovn-kubernetes-ote][sig-network] Multi Homing A pod with multiple attachments to the same secondary NAD features multiple different IPs and connectivity redundancy L3 secondary NAD" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkConnect][ovn-kubernetes-ote][sig-network] ClusterNetworkConnect OVN-Kubernetes Controller End-to-end connectivity validation should manage cross-network connectivity through CNC lifecycle" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkConnect][ovn-kubernetes-ote][sig-network] ClusterNetworkConnect OVN-Kubernetes Controller Multiple CNCs with overlapping network selection should maintain non-transitive connectivity when a network is selected by multiple CNCs" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller pod connected to ClusterUserDefinedNetwork CR & managed NADs cannot be deleted when being used [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller should create NAD according to spec in each target namespace and report active namespaces [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller should create NAD in new created namespaces that apply to namespace-selector [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when CR is deleted, should delete all managed NAD in each target namespace [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when namespace-selector is mutated should create NAD in namespaces that apply to mutated namespace-selector [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when namespace-selector is mutated should delete managed NAD in namespaces that no longer apply to namespace-selector [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for L2 secondary network pod connected to UserDefinedNetwork cannot be deleted when being used [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for L2 secondary network should create NetworkAttachmentDefinition according to spec [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for L2 secondary network should delete NetworkAttachmentDefinition when UserDefinedNetwork is deleted [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for primary UDN without required namespace label should be able to create pod and it will attach to the cluster default network [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for primary UDN without required namespace label should not be able to update the namespace and add the UDN label [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
(...showing 20 of 434 rows)

New tests seen in this PR at sha: fb9c943

  • "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should accept valid CRs ClusterUserDefinedNetwork, evpn" [Total: 26, Pass: 21, Fail: 5, Flake: 0]
  • "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should reject invalid CRs ClusterUserDefinedNetwork, evpn" [Total: 26, Pass: 21, Fail: 5, Flake: 0]
  • "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should accept valid VTEP CRs Valid VTEP configurations" [Total: 26, Pass: 21, Fail: 5, Flake: 0]
  • "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should reject invalid VTEP CRs Invalid VTEP configurations" [Total: 26, Pass: 21, Fail: 5, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should fail if egressip-mark annotation is being added by a regular user" [Total: 8, Pass: 7, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 8, Pass: 7, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 26, Pass: 21, Fail: 5, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L2 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 5, Pass: 4, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L3 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 5, Pass: 4, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L2 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 5, Pass: 4, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L3 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 5, Pass: 4, Fail: 1, Flake: 0]
  • "[Feature:MultiHoming][ovn-kubernetes-ote][sig-network] Multi Homing A pod with multiple attachments to the same secondary NAD features multiple different IPs and connectivity redundancy L2 secondary NAD" [Total: 26, Pass: 24, Fail: 2, Flake: 0]
  • "[Feature:MultiHoming][ovn-kubernetes-ote][sig-network] Multi Homing A pod with multiple attachments to the same secondary NAD features multiple different IPs and connectivity redundancy L3 secondary NAD" [Total: 26, Pass: 24, Fail: 2, Flake: 0]
  • "[Feature:NetworkConnect][ovn-kubernetes-ote][sig-network] ClusterNetworkConnect OVN-Kubernetes Controller End-to-end connectivity validation should manage cross-network connectivity through CNC lifecycle" [Total: 26, Pass: 21, Fail: 5, Flake: 0]
  • "[Feature:NetworkConnect][ovn-kubernetes-ote][sig-network] ClusterNetworkConnect OVN-Kubernetes Controller Multiple CNCs with overlapping network selection should maintain non-transitive connectivity when a network is selected by multiple CNCs" [Total: 26, Pass: 21, Fail: 5, Flake: 0]
  • "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller pod connected to ClusterUserDefinedNetwork CR & managed NADs cannot be deleted when being used [Suite:openshift/conformance/parallel]" [Total: 29, Pass: 26, Fail: 3, Flake: 0]
  • "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller should create NAD according to spec in each target namespace and report active namespaces [Suite:openshift/conformance/parallel]" [Total: 29, Pass: 26, Fail: 3, Flake: 0]
  • "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller should create NAD in new created namespaces that apply to namespace-selector [Suite:openshift/conformance/parallel]" [Total: 29, Pass: 26, Fail: 3, Flake: 0]
  • "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when CR is deleted, should delete all managed NAD in each target namespace [Suite:openshift/conformance/parallel]" [Total: 29, Pass: 26, Fail: 3, Flake: 0]
  • "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when namespace-selector is mutated should create NAD in namespaces that apply to mutated namespace-selector [Suite:openshift/conformance/parallel]" [Total: 29, Pass: 26, Fail: 3, Flake: 0]
  • (...showing 20 of 88 tests)

@jluhrsen
Copy link
Contributor Author

jluhrsen commented Mar 4, 2026

  • periodic-ci-openshift-release-main-ci-4.22-e2e-aws-ovn

This run has one informing ote test failing, but that is ok and doesn't block to merge this PR.

@pperiyasamy , we have to wait for the OVNK d/s merge to land first. that has the informing work in it.

@pperiyasamy
Copy link
Member

pperiyasamy commented Mar 5, 2026

  • periodic-ci-openshift-release-main-ci-4.22-e2e-aws-ovn

This run has one informing ote test failing, but that is ok and doesn't block to merge this PR.

@pperiyasamy , we have to wait for the OVNK d/s merge to land first. that has the informing work in it.

ok @jluhrsen , how is that possible ? i see making u/s tests as informing by default is merged already with PR openshift/ovn-kubernetes#3006, but it isn't effective yet.

sgoveas pushed a commit to sgoveas/origin that referenced this pull request Mar 5, 2026
the following test cases are duplicated with test that will
run with the ovnk OTE work which will be enabled with this
PR [0]. they are failing because upstream OVNK has bumped
it's CNI version to 1.1.0 and these tests are hardcoded
here (or in multus [1]) and don't accept 1.1.0 yet. The
upstream change in ovnk also updated it's tests so when they
run via OTE, they will pass.

[0] openshift#30560
[1] openshift/multus-cni#278

Signed-off-by: Jamo Luhrsen <jluhrsen@gmail.com>
@pperiyasamy
Copy link
Member

/test e2e-metal-ipi-ovn-ipv6

@jluhrsen
Copy link
Contributor Author

jluhrsen commented Mar 5, 2026

/payload 4.22 ci blocking

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 5, 2026

@jluhrsen: trigger 5 job(s) of type blocking for the ci release of OCP 4.22

  • periodic-ci-openshift-release-main-ci-4.22-upgrade-from-stable-4.21-e2e-aws-ovn-upgrade
  • periodic-ci-openshift-release-main-ci-4.22-upgrade-from-stable-4.21-e2e-azure-ovn-upgrade
  • periodic-ci-openshift-release-main-ci-4.22-e2e-gcp-ovn-upgrade
  • periodic-ci-openshift-hypershift-release-4.22-periodics-e2e-aks
  • periodic-ci-openshift-hypershift-release-4.22-periodics-e2e-aws-ovn

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/e18ead40-18b4-11f1-80a8-ea43b9c61780-0

@jluhrsen
Copy link
Contributor Author

jluhrsen commented Mar 5, 2026

/retest all

@jluhrsen
Copy link
Contributor Author

jluhrsen commented Mar 5, 2026

/test e2e-aws-csi

/test e2e-aws-jenkins

/test e2e-aws-ovn-fips

/test e2e-aws-ovn-image-registry

/test e2e-aws-ovn-microshift

/test e2e-aws-ovn-microshift-serial

/test e2e-aws-ovn-serial-1of2

/test e2e-aws-ovn-serial-2of2

/test e2e-gcp-csi

/test e2e-gcp-ovn

/test e2e-gcp-ovn-builds

/test e2e-gcp-ovn-image-ecosystem

/test e2e-gcp-ovn-upgrade

/test e2e-metal-ipi-ovn-ipv6

/test e2e-vsphere-ovn

/test e2e-vsphere-ovn-upi

@openshift-trt
Copy link

openshift-trt bot commented Mar 5, 2026

Risk analysis has seen new tests most likely introduced by this PR.
Please ensure that new tests meet guidelines for naming and stability.

New Test Risks for sha: fb9c943

Job Name New Test Risk
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should accept valid CRs ClusterUserDefinedNetwork, evpn" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should reject invalid CRs ClusterUserDefinedNetwork, evpn" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should accept valid VTEP CRs Valid VTEP configurations" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should reject invalid VTEP CRs Invalid VTEP configurations" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should fail if egressip-mark annotation is being added by a regular user" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should fail if egressip-mark annotation is present during EgressIP creation" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:MultiHoming][ovn-kubernetes-ote][sig-network] Multi Homing A pod with multiple attachments to the same secondary NAD features multiple different IPs and connectivity redundancy L2 secondary NAD" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:MultiHoming][ovn-kubernetes-ote][sig-network] Multi Homing A pod with multiple attachments to the same secondary NAD features multiple different IPs and connectivity redundancy L3 secondary NAD" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkConnect][ovn-kubernetes-ote][sig-network] ClusterNetworkConnect OVN-Kubernetes Controller End-to-end connectivity validation should manage cross-network connectivity through CNC lifecycle" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkConnect][ovn-kubernetes-ote][sig-network] ClusterNetworkConnect OVN-Kubernetes Controller Multiple CNCs with overlapping network selection should maintain non-transitive connectivity when a network is selected by multiple CNCs" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller pod connected to ClusterUserDefinedNetwork CR & managed NADs cannot be deleted when being used [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller should create NAD according to spec in each target namespace and report active namespaces [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller should create NAD in new created namespaces that apply to namespace-selector [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when CR is deleted, should delete all managed NAD in each target namespace [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when namespace-selector is mutated should create NAD in namespaces that apply to mutated namespace-selector [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when namespace-selector is mutated should delete managed NAD in namespaces that no longer apply to namespace-selector [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for L2 secondary network pod connected to UserDefinedNetwork cannot be deleted when being used [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for L2 secondary network should create NetworkAttachmentDefinition according to spec [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for L2 secondary network should delete NetworkAttachmentDefinition when UserDefinedNetwork is deleted [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
(...showing 20 of 447 rows)

New tests seen in this PR at sha: fb9c943

  • "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should accept valid CRs ClusterUserDefinedNetwork, evpn" [Total: 31, Pass: 26, Fail: 5, Flake: 0]
  • "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should reject invalid CRs ClusterUserDefinedNetwork, evpn" [Total: 31, Pass: 26, Fail: 5, Flake: 0]
  • "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should accept valid VTEP CRs Valid VTEP configurations" [Total: 31, Pass: 26, Fail: 5, Flake: 0]
  • "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should reject invalid VTEP CRs Invalid VTEP configurations" [Total: 31, Pass: 26, Fail: 5, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should fail if egressip-mark annotation is being added by a regular user" [Total: 20, Pass: 17, Fail: 3, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 20, Pass: 17, Fail: 3, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 31, Pass: 26, Fail: 5, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L2 role primary Should fail if egressip-mark annotation is being added by a regular user" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L2 role primary Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L2 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L3 role primary Should fail if egressip-mark annotation is being added by a regular user" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L3 role primary Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L3 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L2 role primary Should fail if egressip-mark annotation is being added by a regular user" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L2 role primary Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L2 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L3 role primary Should fail if egressip-mark annotation is being added by a regular user" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L3 role primary Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L3 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:MultiHoming][ovn-kubernetes-ote][sig-network] Multi Homing A pod with multiple attachments to the same secondary NAD features multiple different IPs and connectivity redundancy L2 secondary NAD" [Total: 31, Pass: 29, Fail: 2, Flake: 0]
  • (...showing 20 of 96 tests)

@openshift-trt
Copy link

openshift-trt bot commented Mar 6, 2026

Risk analysis has seen new tests most likely introduced by this PR.
Please ensure that new tests meet guidelines for naming and stability.

New Test Risks for sha: fb9c943

Job Name New Test Risk
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should accept valid CRs ClusterUserDefinedNetwork, evpn" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should reject invalid CRs ClusterUserDefinedNetwork, evpn" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should accept valid VTEP CRs Valid VTEP configurations" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should reject invalid VTEP CRs Invalid VTEP configurations" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should fail if egressip-mark annotation is being added by a regular user" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should fail if egressip-mark annotation is present during EgressIP creation" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:MultiHoming][ovn-kubernetes-ote][sig-network] Multi Homing A pod with multiple attachments to the same secondary NAD features multiple different IPs and connectivity redundancy L2 secondary NAD" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:MultiHoming][ovn-kubernetes-ote][sig-network] Multi Homing A pod with multiple attachments to the same secondary NAD features multiple different IPs and connectivity redundancy L3 secondary NAD" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkConnect][ovn-kubernetes-ote][sig-network] ClusterNetworkConnect OVN-Kubernetes Controller End-to-end connectivity validation should manage cross-network connectivity through CNC lifecycle" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkConnect][ovn-kubernetes-ote][sig-network] ClusterNetworkConnect OVN-Kubernetes Controller Multiple CNCs with overlapping network selection should maintain non-transitive connectivity when a network is selected by multiple CNCs" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller pod connected to ClusterUserDefinedNetwork CR & managed NADs cannot be deleted when being used [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller should create NAD according to spec in each target namespace and report active namespaces [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller should create NAD in new created namespaces that apply to namespace-selector [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when CR is deleted, should delete all managed NAD in each target namespace [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when namespace-selector is mutated should create NAD in namespaces that apply to mutated namespace-selector [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when namespace-selector is mutated should delete managed NAD in namespaces that no longer apply to namespace-selector [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for L2 secondary network pod connected to UserDefinedNetwork cannot be deleted when being used [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for L2 secondary network should create NetworkAttachmentDefinition according to spec [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for L2 secondary network should delete NetworkAttachmentDefinition when UserDefinedNetwork is deleted [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
(...showing 20 of 453 rows)

New tests seen in this PR at sha: fb9c943

  • "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should accept valid CRs ClusterUserDefinedNetwork, evpn" [Total: 31, Pass: 26, Fail: 5, Flake: 0]
  • "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should reject invalid CRs ClusterUserDefinedNetwork, evpn" [Total: 31, Pass: 26, Fail: 5, Flake: 0]
  • "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should accept valid VTEP CRs Valid VTEP configurations" [Total: 31, Pass: 26, Fail: 5, Flake: 0]
  • "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should reject invalid VTEP CRs Invalid VTEP configurations" [Total: 31, Pass: 26, Fail: 5, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should fail if egressip-mark annotation is being added by a regular user" [Total: 30, Pass: 24, Fail: 6, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 30, Pass: 24, Fail: 6, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 31, Pass: 26, Fail: 5, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L2 role primary Should fail if egressip-mark annotation is being added by a regular user" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L2 role primary Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L2 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L3 role primary Should fail if egressip-mark annotation is being added by a regular user" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L3 role primary Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L3 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L2 role primary Should fail if egressip-mark annotation is being added by a regular user" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L2 role primary Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L2 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L3 role primary Should fail if egressip-mark annotation is being added by a regular user" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L3 role primary Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L3 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:MultiHoming][ovn-kubernetes-ote][sig-network] Multi Homing A pod with multiple attachments to the same secondary NAD features multiple different IPs and connectivity redundancy L2 secondary NAD" [Total: 31, Pass: 29, Fail: 2, Flake: 0]
  • (...showing 20 of 96 tests)

@openshift-trt
Copy link

openshift-trt bot commented Mar 6, 2026

Risk analysis has seen new tests most likely introduced by this PR.
Please ensure that new tests meet guidelines for naming and stability.

New Test Risks for sha: fb9c943

Job Name New Test Risk
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should accept valid CRs ClusterUserDefinedNetwork, evpn" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should reject invalid CRs ClusterUserDefinedNetwork, evpn" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should accept valid VTEP CRs Valid VTEP configurations" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should reject invalid VTEP CRs Invalid VTEP configurations" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should fail if egressip-mark annotation is being added by a regular user" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should fail if egressip-mark annotation is present during EgressIP creation" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:MultiHoming][ovn-kubernetes-ote][sig-network] Multi Homing A pod with multiple attachments to the same secondary NAD features multiple different IPs and connectivity redundancy L2 secondary NAD" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:MultiHoming][ovn-kubernetes-ote][sig-network] Multi Homing A pod with multiple attachments to the same secondary NAD features multiple different IPs and connectivity redundancy L3 secondary NAD" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkConnect][ovn-kubernetes-ote][sig-network] ClusterNetworkConnect OVN-Kubernetes Controller End-to-end connectivity validation should manage cross-network connectivity through CNC lifecycle" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkConnect][ovn-kubernetes-ote][sig-network] ClusterNetworkConnect OVN-Kubernetes Controller Multiple CNCs with overlapping network selection should maintain non-transitive connectivity when a network is selected by multiple CNCs" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller pod connected to ClusterUserDefinedNetwork CR & managed NADs cannot be deleted when being used [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller should create NAD according to spec in each target namespace and report active namespaces [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller should create NAD in new created namespaces that apply to namespace-selector [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when CR is deleted, should delete all managed NAD in each target namespace [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when namespace-selector is mutated should create NAD in namespaces that apply to mutated namespace-selector [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when namespace-selector is mutated should delete managed NAD in namespaces that no longer apply to namespace-selector [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for L2 secondary network pod connected to UserDefinedNetwork cannot be deleted when being used [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for L2 secondary network should create NetworkAttachmentDefinition according to spec [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for L2 secondary network should delete NetworkAttachmentDefinition when UserDefinedNetwork is deleted [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
(...showing 20 of 456 rows)

New tests seen in this PR at sha: fb9c943

  • "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should accept valid CRs ClusterUserDefinedNetwork, evpn" [Total: 31, Pass: 26, Fail: 5, Flake: 0]
  • "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should reject invalid CRs ClusterUserDefinedNetwork, evpn" [Total: 31, Pass: 26, Fail: 5, Flake: 0]
  • "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should accept valid VTEP CRs Valid VTEP configurations" [Total: 31, Pass: 26, Fail: 5, Flake: 0]
  • "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should reject invalid VTEP CRs Invalid VTEP configurations" [Total: 31, Pass: 26, Fail: 5, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should fail if egressip-mark annotation is being added by a regular user" [Total: 35, Pass: 28, Fail: 7, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 35, Pass: 28, Fail: 7, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 31, Pass: 26, Fail: 5, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L2 role primary Should fail if egressip-mark annotation is being added by a regular user" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L2 role primary Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L2 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L3 role primary Should fail if egressip-mark annotation is being added by a regular user" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L3 role primary Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L3 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L2 role primary Should fail if egressip-mark annotation is being added by a regular user" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L2 role primary Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L2 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L3 role primary Should fail if egressip-mark annotation is being added by a regular user" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L3 role primary Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L3 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 6, Pass: 5, Fail: 1, Flake: 0]
  • "[Feature:MultiHoming][ovn-kubernetes-ote][sig-network] Multi Homing A pod with multiple attachments to the same secondary NAD features multiple different IPs and connectivity redundancy L2 secondary NAD" [Total: 31, Pass: 29, Fail: 2, Flake: 0]
  • (...showing 20 of 96 tests)

@pperiyasamy
Copy link
Member

There is still two blocking jobs failing on the latest runs.

[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation: Preconfigured Layer2 UDN unmasked reserved / infrastructure subnets are not allowed Layer2 with unmasked IPv4 reserved subnets [Suite:openshift/conformance/parallel]

[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation: Preconfigured Layer2 UDN unmasked reserved / infrastructure subnets are not allowed Layer2 with unmasked IPv4 infrastructure subnets [Suite:openshift/conformance/parallel]

The tests expects stderr something like this:

The UserDefinedNetwork "invalid-l2-net-infra-subnets" is invalid: spec.layer2: Invalid value: "object": infrastructureSubnets must be a masked network address (no host bits set)

but it got below:

The UserDefinedNetwork "invalid-l2-net-infra-subnets" is invalid: spec.layer2: Invalid value: infrastructureSubnets must be a masked network address (no host bits set)

it no longer includes "object":. but it happens with only IPv4 test, triggering it again to confirm if it's a flake or not.

@pperiyasamy
Copy link
Member

/retest

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 6, 2026

@jluhrsen: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-metal-ipi-ovn-ipv6 fb9c943 link true /test e2e-metal-ipi-ovn-ipv6
ci/prow/e2e-vsphere-ovn-upi fb9c943 link true /test e2e-vsphere-ovn-upi
ci/prow/e2e-aws-ovn-microshift fb9c943 link true /test e2e-aws-ovn-microshift
ci/prow/e2e-aws-jenkins fb9c943 link true /test e2e-aws-jenkins
ci/prow/e2e-gcp-ovn fb9c943 link true /test e2e-gcp-ovn
ci/prow/e2e-aws-ovn-fips fb9c943 link true /test e2e-aws-ovn-fips
ci/prow/e2e-vsphere-ovn fb9c943 link true /test e2e-vsphere-ovn

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@openshift-trt
Copy link

openshift-trt bot commented Mar 6, 2026

Risk analysis has seen new tests most likely introduced by this PR.
Please ensure that new tests meet guidelines for naming and stability.

New Test Risks for sha: fb9c943

Job Name New Test Risk
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should accept valid CRs ClusterUserDefinedNetwork, evpn" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should reject invalid CRs ClusterUserDefinedNetwork, evpn" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should accept valid VTEP CRs Valid VTEP configurations" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should reject invalid VTEP CRs Invalid VTEP configurations" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should fail if egressip-mark annotation is being added by a regular user" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should fail if egressip-mark annotation is present during EgressIP creation" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:MultiHoming][ovn-kubernetes-ote][sig-network] Multi Homing A pod with multiple attachments to the same secondary NAD features multiple different IPs and connectivity redundancy L2 secondary NAD" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:MultiHoming][ovn-kubernetes-ote][sig-network] Multi Homing A pod with multiple attachments to the same secondary NAD features multiple different IPs and connectivity redundancy L3 secondary NAD" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkConnect][ovn-kubernetes-ote][sig-network] ClusterNetworkConnect OVN-Kubernetes Controller End-to-end connectivity validation should manage cross-network connectivity through CNC lifecycle" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkConnect][ovn-kubernetes-ote][sig-network] ClusterNetworkConnect OVN-Kubernetes Controller Multiple CNCs with overlapping network selection should maintain non-transitive connectivity when a network is selected by multiple CNCs" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller pod connected to ClusterUserDefinedNetwork CR & managed NADs cannot be deleted when being used [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller should create NAD according to spec in each target namespace and report active namespaces [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller should create NAD in new created namespaces that apply to namespace-selector [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when CR is deleted, should delete all managed NAD in each target namespace [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when namespace-selector is mutated should create NAD in namespaces that apply to mutated namespace-selector [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when namespace-selector is mutated should delete managed NAD in namespaces that no longer apply to namespace-selector [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for L2 secondary network pod connected to UserDefinedNetwork cannot be deleted when being used [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for L2 secondary network should create NetworkAttachmentDefinition according to spec [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for L2 secondary network should delete NetworkAttachmentDefinition when UserDefinedNetwork is deleted [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
(...showing 20 of 456 rows)

New tests seen in this PR at sha: fb9c943

  • "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should accept valid CRs ClusterUserDefinedNetwork, evpn" [Total: 36, Pass: 31, Fail: 5, Flake: 0]
  • "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should reject invalid CRs ClusterUserDefinedNetwork, evpn" [Total: 36, Pass: 31, Fail: 5, Flake: 0]
  • "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should accept valid VTEP CRs Valid VTEP configurations" [Total: 36, Pass: 31, Fail: 5, Flake: 0]
  • "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should reject invalid VTEP CRs Invalid VTEP configurations" [Total: 36, Pass: 31, Fail: 5, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should fail if egressip-mark annotation is being added by a regular user" [Total: 41, Pass: 33, Fail: 8, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 41, Pass: 33, Fail: 8, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 36, Pass: 31, Fail: 5, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L2 role primary Should fail if egressip-mark annotation is being added by a regular user" [Total: 7, Pass: 5, Fail: 2, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L2 role primary Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 7, Pass: 5, Fail: 2, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L2 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 7, Pass: 6, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L3 role primary Should fail if egressip-mark annotation is being added by a regular user" [Total: 7, Pass: 5, Fail: 2, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L3 role primary Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 7, Pass: 5, Fail: 2, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L3 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 7, Pass: 6, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L2 role primary Should fail if egressip-mark annotation is being added by a regular user" [Total: 7, Pass: 5, Fail: 2, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L2 role primary Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 7, Pass: 5, Fail: 2, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L2 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 7, Pass: 6, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L3 role primary Should fail if egressip-mark annotation is being added by a regular user" [Total: 7, Pass: 5, Fail: 2, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L3 role primary Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 7, Pass: 5, Fail: 2, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L3 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 7, Pass: 6, Fail: 1, Flake: 0]
  • "[Feature:MultiHoming][ovn-kubernetes-ote][sig-network] Multi Homing A pod with multiple attachments to the same secondary NAD features multiple different IPs and connectivity redundancy L2 secondary NAD" [Total: 36, Pass: 34, Fail: 2, Flake: 0]
  • (...showing 20 of 96 tests)

@openshift-trt
Copy link

openshift-trt bot commented Mar 6, 2026

Risk analysis has seen new tests most likely introduced by this PR.
Please ensure that new tests meet guidelines for naming and stability.

New Test Risks for sha: fb9c943

Job Name New Test Risk
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should accept valid CRs ClusterUserDefinedNetwork, evpn" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should reject invalid CRs ClusterUserDefinedNetwork, evpn" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should accept valid VTEP CRs Valid VTEP configurations" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should reject invalid VTEP CRs Invalid VTEP configurations" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should fail if egressip-mark annotation is being added by a regular user" is a new test that was not present in all runs against the current commit, and also failed 2 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should fail if egressip-mark annotation is present during EgressIP creation" is a new test that was not present in all runs against the current commit, and also failed 2 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:MultiHoming][ovn-kubernetes-ote][sig-network] Multi Homing A pod with multiple attachments to the same secondary NAD features multiple different IPs and connectivity redundancy L2 secondary NAD" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:MultiHoming][ovn-kubernetes-ote][sig-network] Multi Homing A pod with multiple attachments to the same secondary NAD features multiple different IPs and connectivity redundancy L3 secondary NAD" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkConnect][ovn-kubernetes-ote][sig-network] ClusterNetworkConnect OVN-Kubernetes Controller End-to-end connectivity validation should manage cross-network connectivity through CNC lifecycle" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkConnect][ovn-kubernetes-ote][sig-network] ClusterNetworkConnect OVN-Kubernetes Controller Multiple CNCs with overlapping network selection should maintain non-transitive connectivity when a network is selected by multiple CNCs" is a new test that was not present in all runs against the current commit, and also failed 1 time(s).
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller pod connected to ClusterUserDefinedNetwork CR & managed NADs cannot be deleted when being used [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller should create NAD according to spec in each target namespace and report active namespaces [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller should create NAD in new created namespaces that apply to namespace-selector [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when CR is deleted, should delete all managed NAD in each target namespace [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when namespace-selector is mutated should create NAD in namespaces that apply to mutated namespace-selector [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation ClusterUserDefinedNetwork CRD Controller when namespace-selector is mutated should delete managed NAD in namespaces that no longer apply to namespace-selector [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for L2 secondary network pod connected to UserDefinedNetwork cannot be deleted when being used [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for L2 secondary network should create NetworkAttachmentDefinition according to spec [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
pull-ci-openshift-origin-main-e2e-aws-ovn-fips High - "[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation UserDefinedNetwork CRD Controller for L2 secondary network should delete NetworkAttachmentDefinition when UserDefinedNetwork is deleted [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.
(...showing 20 of 456 rows)

New tests seen in this PR at sha: fb9c943

  • "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should accept valid CRs ClusterUserDefinedNetwork, evpn" [Total: 36, Pass: 31, Fail: 5, Flake: 0]
  • "[Feature:EVPN][Feature:NetworkSegmentation][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] Network Segmentation: API validations api-server should reject invalid CRs ClusterUserDefinedNetwork, evpn" [Total: 36, Pass: 31, Fail: 5, Flake: 0]
  • "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should accept valid VTEP CRs Valid VTEP configurations" [Total: 36, Pass: 31, Fail: 5, Flake: 0]
  • "[Feature:EVPN][Feature:RouteAdvertisements][ovn-kubernetes-ote][sig-network] EVPN: VTEP API validations api-server should reject invalid VTEP CRs Invalid VTEP configurations" [Total: 36, Pass: 31, Fail: 5, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should fail if egressip-mark annotation is being added by a regular user" [Total: 41, Pass: 28, Fail: 13, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 41, Pass: 28, Fail: 13, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Cluster Default Network Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 36, Pass: 31, Fail: 5, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L2 role primary Should fail if egressip-mark annotation is being added by a regular user" [Total: 7, Pass: 5, Fail: 2, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L2 role primary Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 7, Pass: 5, Fail: 2, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L2 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 7, Pass: 6, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L3 role primary Should fail if egressip-mark annotation is being added by a regular user" [Total: 7, Pass: 5, Fail: 2, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L3 role primary Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 7, Pass: 5, Fail: 2, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv4 L3 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 7, Pass: 6, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L2 role primary Should fail if egressip-mark annotation is being added by a regular user" [Total: 7, Pass: 5, Fail: 2, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L2 role primary Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 7, Pass: 5, Fail: 2, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L2 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 7, Pass: 6, Fail: 1, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L3 role primary Should fail if egressip-mark annotation is being added by a regular user" [Total: 7, Pass: 5, Fail: 2, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L3 role primary Should fail if egressip-mark annotation is present during EgressIP creation" [Total: 7, Pass: 5, Fail: 2, Flake: 0]
  • "[Feature:EgressIP][ovn-kubernetes-ote][sig-network] e2e egress IP validation Network Segmentation: IPv6 L3 role primary Should handle EIP reassignment correctly on namespace and pod label updates, and EIP object updates" [Total: 7, Pass: 6, Fail: 1, Flake: 0]
  • "[Feature:MultiHoming][ovn-kubernetes-ote][sig-network] Multi Homing A pod with multiple attachments to the same secondary NAD features multiple different IPs and connectivity redundancy L2 secondary NAD" [Total: 36, Pass: 34, Fail: 2, Flake: 0]
  • (...showing 20 of 96 tests)

@pperiyasamy
Copy link
Member

There is still two blocking jobs failing on the latest runs.

[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation: Preconfigured Layer2 UDN unmasked reserved / infrastructure subnets are not allowed Layer2 with unmasked IPv4 reserved subnets [Suite:openshift/conformance/parallel]

[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation: Preconfigured Layer2 UDN unmasked reserved / infrastructure subnets are not allowed Layer2 with unmasked IPv4 infrastructure subnets [Suite:openshift/conformance/parallel]

The tests expects stderr something like this:

The UserDefinedNetwork "invalid-l2-net-infra-subnets" is invalid: spec.layer2: Invalid value: "object": infrastructureSubnets must be a masked network address (no host bits set)

but it got below:

The UserDefinedNetwork "invalid-l2-net-infra-subnets" is invalid: spec.layer2: Invalid value: infrastructureSubnets must be a masked network address (no host bits set)

it no longer includes "object":. but it happens with only IPv4 test, triggering it again to confirm if it's a flake or not.

@jluhrsen it failed again with same error, can you take a look ?

@jluhrsen
Copy link
Contributor Author

jluhrsen commented Mar 7, 2026

There is still two blocking jobs failing on the latest runs.
[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation: Preconfigured Layer2 UDN unmasked reserved / infrastructure subnets are not allowed Layer2 with unmasked IPv4 reserved subnets [Suite:openshift/conformance/parallel]
[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation: Preconfigured Layer2 UDN unmasked reserved / infrastructure subnets are not allowed Layer2 with unmasked IPv4 infrastructure subnets [Suite:openshift/conformance/parallel]
The tests expects stderr something like this:
The UserDefinedNetwork "invalid-l2-net-infra-subnets" is invalid: spec.layer2: Invalid value: "object": infrastructureSubnets must be a masked network address (no host bits set)
but it got below:
The UserDefinedNetwork "invalid-l2-net-infra-subnets" is invalid: spec.layer2: Invalid value: infrastructureSubnets must be a masked network address (no host bits set)
it no longer includes "object":. but it happens with only IPv4 test, triggering it again to confirm if it's a flake or not.

@jluhrsen it failed again with same error, can you take a look ?

@pperiyasamy, did some digging and I think we are now getting burned by the kube bump to 1.35. remember these tests were passing in that run from 3/3 but that was w/ k8s 1.34 and the new jobs are running with 1.35. looks like the way the
error is being reported is now different. I think this is the upstream k8s commit that did it.

So, two ways forward for now:

  1. This PR removes these two test cases from blocking they will still run and fail as informing but not fail the job
  2. This PR is upstream (we'll need it there eventually) and refactors the test string expectation. once that makes it downstream we can revert number 1

And, now all of this means that we have to get the current d/s merge in, then get #1 in, then see if we don't get burned YET AGAIN, by something else external.

CC @rpattath , @tssurya , @jcaamano

@tssurya
Copy link
Contributor

tssurya commented Mar 7, 2026

There is still two blocking jobs failing on the latest runs.
[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation: Preconfigured Layer2 UDN unmasked reserved / infrastructure subnets are not allowed Layer2 with unmasked IPv4 reserved subnets [Suite:openshift/conformance/parallel]
[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation: Preconfigured Layer2 UDN unmasked reserved / infrastructure subnets are not allowed Layer2 with unmasked IPv4 infrastructure subnets [Suite:openshift/conformance/parallel]
The tests expects stderr something like this:
The UserDefinedNetwork "invalid-l2-net-infra-subnets" is invalid: spec.layer2: Invalid value: "object": infrastructureSubnets must be a masked network address (no host bits set)
but it got below:
The UserDefinedNetwork "invalid-l2-net-infra-subnets" is invalid: spec.layer2: Invalid value: infrastructureSubnets must be a masked network address (no host bits set)
it no longer includes "object":. but it happens with only IPv4 test, triggering it again to confirm if it's a flake or not.

@jluhrsen it failed again with same error, can you take a look ?

@pperiyasamy, did some digging and I think we are now getting burned by the kube bump to 1.35. remember these tests were passing in that run from 3/3 but that was w/ k8s 1.34 and the new jobs are running with 1.35. looks like the way the error is being reported is now different. I think this is the upstream k8s commit that did it.

So, two ways forward for now:

  1. This PR removes these two test cases from blocking they will still run and fail as informing but not fail the job
  2. This PR is upstream (we'll need it there eventually) and refactors the test string expectation. once that makes it downstream we can revert number 1

And, now all of this means that we have to get the current d/s merge in, then get #1 in, then see if we don't get burned YET AGAIN, by something else external.

CC @rpattath , @tssurya , @jcaamano

fail as informing is the way to go for now...
@barbora137 is doing the ovnk rebase and fixing this as part of that: ovn-kubernetes/ovn-kubernetes@a8e2acf since we are going to hit the same issue upstream as we bump to 1.35

@jluhrsen
Copy link
Contributor Author

jluhrsen commented Mar 7, 2026

There is still two blocking jobs failing on the latest runs.
[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation: Preconfigured Layer2 UDN unmasked reserved / infrastructure subnets are not allowed Layer2 with unmasked IPv4 reserved subnets [Suite:openshift/conformance/parallel]
[Feature:NetworkSegmentation][ovn-kubernetes-ote][sig-network] Network Segmentation: Preconfigured Layer2 UDN unmasked reserved / infrastructure subnets are not allowed Layer2 with unmasked IPv4 infrastructure subnets [Suite:openshift/conformance/parallel]
The tests expects stderr something like this:
The UserDefinedNetwork "invalid-l2-net-infra-subnets" is invalid: spec.layer2: Invalid value: "object": infrastructureSubnets must be a masked network address (no host bits set)
but it got below:
The UserDefinedNetwork "invalid-l2-net-infra-subnets" is invalid: spec.layer2: Invalid value: infrastructureSubnets must be a masked network address (no host bits set)
it no longer includes "object":. but it happens with only IPv4 test, triggering it again to confirm if it's a flake or not.

@jluhrsen it failed again with same error, can you take a look ?

@pperiyasamy, did some digging and I think we are now getting burned by the kube bump to 1.35. remember these tests were passing in that run from 3/3 but that was w/ k8s 1.34 and the new jobs are running with 1.35. looks like the way the error is being reported is now different. I think this is the upstream k8s commit that did it.
So, two ways forward for now:

  1. This PR removes these two test cases from blocking they will still run and fail as informing but not fail the job
  2. This PR is upstream (we'll need it there eventually) and refactors the test string expectation. once that makes it downstream we can revert number 1

And, now all of this means that we have to get the current d/s merge in, then get #1 in, then see if we don't get burned YET AGAIN, by something else external.
CC @rpattath , @tssurya , @jcaamano

fail as informing is the way to go for now... @barbora137 is doing the ovnk rebase and fixing this as part of that: ovn-kubernetes/ovn-kubernetes@a8e2acf since we are going to hit the same issue upstream as we bump to 1.35

@tssurya , please get the d/s merge in, then we need to get the informing pr in immediately after and then I will fight to get this origin PR merged. @barbora137 , if my change in upstream is not needed, please close it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants