Skip to content

OCPNODE-4506: Migrate OCP-45351 ContainerRuntimeConfig pidsLimit test#31153

Open
Chandan9112 wants to merge 2 commits into
openshift:mainfrom
Chandan9112:migrate-ctrcfg-pids-limit
Open

OCPNODE-4506: Migrate OCP-45351 ContainerRuntimeConfig pidsLimit test#31153
Chandan9112 wants to merge 2 commits into
openshift:mainfrom
Chandan9112:migrate-ctrcfg-pids-limit

Conversation

@Chandan9112
Copy link
Copy Markdown
Contributor

@Chandan9112 Chandan9112 commented May 11, 2026

Summary

  • Migrate OCP-45351 test case from openshift-tests-private to origin
  • Validates ContainerRuntimeConfig (CTRCFG) pidsLimit is applied correctly via MCO
  • Verifies conmon setting remains empty and manual crio.conf edits are overwritten by MCO

Here is the test case link: Polarian-45351

Test Results

It passed successfully while executing on a live OCP 4.22 cluster:

./openshift-tests run-test "[Suite:openshift/disruptive-longrunning][sig-node][Disruptive] ContainerRuntimeConfig [OTP] Verify ContainerRuntimeConfig pidsLimit and conmon setting [OCP-45351] [Serial]"

  Running Suite:  - /Users/cmaurya/go/src/github.com/openshift/origin
  ===================================================================
  Random Seed: 1778602053 - will randomize all specs

  Will run 1 of 1 specs
  ------------------------------
  [Suite:openshift/disruptive-longrunning][sig-node][Disruptive] ContainerRuntimeConfig [OTP] Verify ContainerRuntimeConfig pidsLimit and conmon setting [OCP-45351]
  github.com/openshift/origin/test/extended/node/node_e2e/node.go:182
    STEP: Creating a kubernetes client @ 05/12/26 21:37:37.362
  I0512 21:37:37.363894   63537 discovery.go:214] Invalidating discovery information
  I0512 21:37:37.364502 63537 framework.go:2330] [precondition-check] checking if cluster is MicroShift
  I0512 21:37:37.662912 63537 framework.go:2353] IsMicroShiftCluster: microshift-version configmap not found, not MicroShift
    STEP: Get a ready worker node @ 05/12/26 21:37:37.663
    STEP: Make a manual change to crio.conf on node ci-ln-wim0r6t-72292-52bjx-worker-b-t5h9f @ 05/12/26 21:37:37.98
    STEP: Label worker MachineConfigPool with custom-crio=high-pid-limit @ 05/12/26 21:37:50.763
  machineconfigpool.machineconfiguration.openshift.io/worker labeled
    STEP: Create ContainerRuntimeConfig with pidsLimit 2048 @ 05/12/26 21:37:52.126
    STEP: Wait for worker MCP rollout to complete @ 05/12/26 21:37:52.433
  I0512 21:37:52.433314 63537 imagepolicy.go:694] Waiting for pool worker to complete
  I0512 21:48:33.845546 63537 node.go:237] All worker nodes rolled out successfully
    STEP: Verify pidsLimit and conmon in crio config on node ci-ln-wim0r6t-72292-52bjx-worker-b-t5h9f @ 05/12/26 21:48:33.849
    STEP: Cleanup: delete ContainerRuntimeConfig and remove MCP label @ 05/12/26 21:48:37.838
  machineconfigpool.machineconfiguration.openshift.io/worker unlabeled
  I0512 21:48:39.659440 63537 imagepolicy.go:694] Waiting for pool worker to complete
  • [1325.561 seconds]
  ------------------------------

  Ran 1 of 1 Specs in 1325.564 seconds
  SUCCESS! -- 1 Passed | 0 Failed | 0 Pending | 0 Skipped

Summary by CodeRabbit

  • Tests
    • Added an end-to-end test suite that validates container runtime configuration via machine configuration pools on worker nodes.
    • Verifies rollout of runtime settings (pids limit, log level) and that system-managed updates override manual edits.
    • Includes cleanup validation to ensure configuration and labels are removed and cluster state is restored.

@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented May 11, 2026

Skipping CI for Draft Pull Request.
If you want CI signal for your change, please convert it to an actual PR.
You can still manually trigger a test run with /test all

@openshift-ci-robot
Copy link
Copy Markdown

openshift-ci-robot commented May 11, 2026

@Chandan9112: This pull request references OCPNODE-4506 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "5.0.0" version, but no target version was set.

Details

In response to this:

Summary

  • Migrate OCP-45351 test case from openshift-tests-private to origin
  • Validates ContainerRuntimeConfig (CTRCFG) pidsLimit is applied correctly via MCO
  • Verifies conmon setting remains empty and manual crio.conf edits are overwritten by MCO

Here is the test case link: Polarian-45351

Test Results

It passed successfully while executing on a live OCP 4.22 cluster:

./openshift-tests run-test "[Suite:openshift/disruptive-longrunning][sig-node][Disruptive] ContainerRuntimeConfig [OTP] Verify ContainerRuntimeConfig pidsLimit and conmon setting [OCP-45351] [Serial]"

 Running Suite:  - /Users/cmaurya/go/src/github.com/openshift/origin
 ===================================================================
 Random Seed: 1778242831 - will randomize all specs

 Will run 1 of 1 specs
 ------------------------------
 [Suite:openshift/disruptive-longrunning][sig-node][Disruptive] ContainerRuntimeConfig [OTP] Verify ContainerRuntimeConfig pidsLimit and conmon setting [OCP-45351]
 github.com/openshift/origin/test/extended/node/node_e2e/node.go:176
   STEP: Creating a kubernetes client @ 05/08/26 17:50:37.359
 I0508 17:50:37.360949   56225 discovery.go:214] Invalidating discovery information
 I0508 17:50:37.362789 56225 framework.go:2330] [precondition-check] checking if cluster is MicroShift
 I0508 17:50:37.675248 56225 framework.go:2353] IsMicroShiftCluster: microshift-version configmap not found, not MicroShift
   STEP: Get a ready worker node @ 05/08/26 17:50:37.675
   STEP: Make a manual change to crio.conf on node ci-ln-rb73hc2-72292-gbs9b-worker-b-plbfx @ 05/08/26 17:50:39.846
   STEP: Label worker MachineConfigPool with custom-crio=high-pid-limit @ 05/08/26 17:50:52.827
 machineconfigpool.machineconfiguration.openshift.io/worker labeled
   STEP: Create ContainerRuntimeConfig with pidsLimit 2048 @ 05/08/26 17:50:54.43
 containerruntimeconfig.machineconfiguration.openshift.io/set-pids-limit created
   STEP: Wait for worker MCP rollout to complete @ 05/08/26 17:50:55.524
 I0508 17:50:55.524205 56225 imagepolicy.go:694] Waiting for pool worker to complete
 I0508 18:14:54.852127 56225 node.go:214] All worker nodes rolled out successfully
   STEP: Verify pidsLimit and conmon in crio config on node ci-ln-rb73hc2-72292-gbs9b-worker-b-plbfx @ 05/08/26 18:14:54.852
   STEP: Cleanup: delete ContainerRuntimeConfig and remove MCP label @ 05/08/26 18:15:29.184
 containerruntimeconfig.machineconfiguration.openshift.io "set-pids-limit" deleted
 machineconfigpool.machineconfiguration.openshift.io/worker unlabeled
 I0508 18:15:31.707114 56225 imagepolicy.go:694] Waiting for pool worker to complete
 • [540.421 seconds]
 ------------------------------

 Ran 1 of 1 Specs in 540.422 seconds
 SUCCESS! -- 1 Passed | 0 Failed | 0 Pending | 0 Skipped


Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci openshift-ci Bot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label May 11, 2026
@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label May 11, 2026
@openshift-merge-bot
Copy link
Copy Markdown
Contributor

Pipeline controller notification
This repo is configured to use the pipeline controller. Second-stage tests will be triggered either automatically or after lgtm label is added, depending on the repository configuration. The pipeline controller will automatically detect which contexts are required and will utilize /test Prow commands to trigger the second stage.

For optional jobs, comment /test ? to see a list of all defined jobs. To trigger manually all jobs from second stage use /pipeline required command.

This repository is configured in: automatic mode

@coderabbitai
Copy link
Copy Markdown

coderabbitai Bot commented May 11, 2026

No actionable comments were generated in the recent review. 🎉

ℹ️ Recent review info
⚙️ Run configuration

Configuration used: Repository YAML (base), Central YAML (inherited)

Review profile: CHILL

Plan: Enterprise

Run ID: 2564e799-1b34-4fb4-a009-47ac252b9a97

📥 Commits

Reviewing files that changed from the base of the PR and between c5e0d58 and e627d3c.

📒 Files selected for processing (1)
  • test/extended/node/node_e2e/node.go
🚧 Files skipped from review as they are similar to previous changes (1)
  • test/extended/node/node_e2e/node.go

Walkthrough

Adds a new disruptive Ginkgo e2e suite that tests ContainerRuntimeConfig by editing a worker node's /etc/crio/crio.conf, labeling its MachineConfigPool, creating a ContainerRuntimeConfig (pidsLimit: 2048), waiting for MCP rollout, and verifying the MCO-applied config overwrites the manual edit. Cleanup removes the CRC and label and waits for MCP convergence.

Changes

ContainerRuntimeConfig End-to-End Test Suite

Layer / File(s) Summary
Imports and helpers
test/extended/node/node_e2e/node.go (lines 4–18)
Adds imports for context, MachineConfig API types (mcfgv1), API error handling (apierrors), metav1 delete/options, pointer helpers, and image policy utilities used by the new suite.
Test setup: skip, node selection, manual config edit
test/extended/node/node_e2e/node.go (lines 167–190)
Ginkgo Describe for the suite; skips MicroShift clusters; finds a ready, schedulable worker node; injects log_level = "debug" into /etc/crio/crio.conf on that node and verifies the edit.
MCP labeling and initial state capture
test/extended/node/node_e2e/node.go (lines 191–210)
Labels the worker's MachineConfigPool with custom-crio=high-pid-limit and captures the MCP's current config spec name (initialSpec) to track the upcoming rollout.
Create ContainerRuntimeConfig and wait for rollout
test/extended/node/node_e2e/node.go (lines 211–235)
Creates a ContainerRuntimeConfig named set-pids-limit targeting the MCP label with pidsLimit: 2048; waits for the MCP config spec to change and for the rollout to complete.
Verification on node
test/extended/node/node_e2e/node.go (lines 236–250)
Runs crio config on the node and asserts the presence of pids_limit = 2048 and conmon = "", and the absence of the previously injected log_level = "debug".
Deferred cleanup: delete CRC, remove label, wait for MCP
test/extended/node/node_e2e/node.go (lines 251–265)
Defers deletion of the ContainerRuntimeConfig, removal of the custom-crio label from the MCP, and waits for the MCP config spec to change using a cleanupSpec captured inside the defer closure.

Estimated code review effort

🎯 3 (Moderate) | ⏱️ ~25 minutes

🚥 Pre-merge checks | ✅ 10 | ❌ 2

❌ Failed checks (2 warnings)

Check name Status Explanation Resolution
Docstring Coverage ⚠️ Warning Docstring coverage is 0.00% which is insufficient. The required threshold is 80.00%. Write docstrings for the functions missing them to satisfy the coverage threshold.
Single Node Openshift (Sno) Test Compatibility ⚠️ Warning Test assumes multi-node clusters. GetReadySchedulableWorkerNodes() excludes nodes with master roles, so returns empty list on SNO, causing test failure. Add [Skipped:SingleReplicaTopology] label to test name, or guard with IsSingleNode() check and Skip call. Verify using SNO CI job for serial tests.
✅ Passed checks (10 passed)
Check name Status Explanation
Description Check ✅ Passed Check skipped - CodeRabbit’s high-level summary is enabled.
Title check ✅ Passed The title clearly identifies the main change: migrating a specific test case (OCP-45351 ContainerRuntimeConfig pidsLimit test) referenced by the ticket OCPNODE-4506.
Linked Issues check ✅ Passed Check skipped because no linked issues were found for this pull request.
Out of Scope Changes check ✅ Passed Check skipped because no linked issues were found for this pull request.
Stable And Deterministic Test Names ✅ Passed Suite and test names are stable with no dynamic content. No pod names, timestamps, UUIDs, node names, or IP addresses in titles. All dynamic values correctly placed in test body.
Test Structure And Quality ✅ Passed Test passes all quality checks: single responsibility, proper setup/cleanup, appropriate timeouts, meaningful assertion messages, and consistent with codebase patterns.
Microshift Test Compatibility ✅ Passed The new ContainerRuntimeConfig test suite is properly protected from MicroShift via BeforeEach hook that calls exutil.IsMicroShiftCluster() with g.Skip().
Topology-Aware Scheduling Compatibility ✅ Passed This PR adds only test code (Ginkgo test suite). The custom check applies to deployment manifests, operator code, or controllers—none are modified here. Check is not applicable.
Ote Binary Stdout Contract ✅ Passed PR contains no fmt.Print, klog, or os.Stdout writes. All code within Ginkgo test blocks, not module initialization. No stdout contract violations.
Ipv6 And Disconnected Network Test Compatibility ✅ Passed No IPv4 assumptions or external connectivity requirements found. Test uses cluster-internal APIs and node operations only.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests

Tip

💬 Introducing Slack Agent: The best way for teams to turn conversations into code.

Slack Agent is built on CodeRabbit's deep understanding of your code, so your team can collaborate across the entire SDLC without losing context.

  • Generate code and open pull requests
  • Plan features and break down work
  • Investigate incidents and troubleshoot customer tickets together
  • Automate recurring tasks and respond to alerts with triggers
  • Summarize progress and report instantly

Built for teams:

  • Shared memory across your entire org—no repeating context
  • Per-thread sandboxes to safely plan and execute work
  • Governance built-in—scoped access, auditability, and budget controls

One agent for your entire SDLC. Right inside Slack.

👉 Get started


Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

@Chandan9112 Chandan9112 marked this pull request as ready for review May 11, 2026 08:37
@openshift-ci openshift-ci Bot removed the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label May 11, 2026
@openshift-ci openshift-ci Bot requested review from BhargaviGudi and deads2k May 11, 2026 08:38
Copy link
Copy Markdown

@coderabbitai coderabbitai Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 2

🤖 Prompt for all review comments with AI agents
Verify each finding against current code. Fix only still-valid issues, skip the
rest with a brief reason, keep changes minimal, and validate.

Inline comments:
In `@test/extended/node/node_e2e/node.go`:
- Around line 186-210: Move the cleanup defer to immediately after you perform
the cluster mutations (right after the ContainerRuntimeConfig apply and the MCP
label) so it always runs even if subsequent steps fail; inside that defer do not
ignore errors — capture the return values from
oc.AsAdmin().WithoutNamespace().Run(...).Execute() for the delete and label
commands and assert they succeeded (use o.Expect(err).NotTo(o.HaveOccurred()) or
fail the test) and call imagepolicy.WaitForMCPConfigSpecChangeAndUpdated(oc,
"worker", cleanupSpec) using a cleanupSpec obtained via
imagepolicy.GetMCPCurrentSpecConfigName(oc, "worker") so the cleanup
consistently waits for the MCP to return to a known spec (reference
nodeutils.ExecOnNodeWithChroot, oc.AsAdmin().WithoutNamespace().Run("label"),
oc.AsAdmin().WithoutNamespace().Run("apply"), ctrcfgPidsLimitYAML, ctrcfgName,
and imagepolicy.WaitForMCPConfigSpecChangeAndUpdated).
- Around line 179-185: The current selection uses
oc.AsAdmin().WithoutNamespace().Run("get").Args(...
"-o=jsonpath={.items[0].metadata.name}") to pick the first worker but doesn't
verify it is Ready; change the logic to fetch the full node list (use
"-o=json"), parse the returned JSON, iterate .items and choose the first item
whose .status.conditions contains a Ready condition with status "True", and
assign that node name to workerNode (preserve the workerNode variable and the
surrounding g.By context). Ensure you still
o.Expect(err).NotTo(o.HaveOccurred()) and
o.Expect(workerNode).NotTo(o.BeEmpty()) after selecting a Ready worker.
🪄 Autofix (Beta)

Fix all unresolved CodeRabbit comments on this PR:

  • Push a commit to this branch (recommended)
  • Create a new PR with the fixes

ℹ️ Review info
⚙️ Run configuration

Configuration used: Repository YAML (base), Central YAML (inherited)

Review profile: CHILL

Plan: Enterprise

Run ID: 4c528ed6-cbf6-45c4-b734-3082da7159f9

📥 Commits

Reviewing files that changed from the base of the PR and between 2687da8 and 0b5ce2e.

📒 Files selected for processing (3)
  • test/extended/node/node_e2e/node.go
  • test/extended/testdata/bindata.go
  • test/extended/testdata/node/node_e2e/ctrcfg-set-pids-limit.yaml

Comment thread test/extended/node/node_e2e/node.go
Comment thread test/extended/node/node_e2e/node.go Outdated
@openshift-merge-bot
Copy link
Copy Markdown
Contributor

Scheduling required tests:
/test e2e-aws-csi
/test e2e-aws-ovn-fips
/test e2e-aws-ovn-microshift
/test e2e-aws-ovn-microshift-serial
/test e2e-aws-ovn-serial-1of2
/test e2e-aws-ovn-serial-2of2
/test e2e-gcp-csi
/test e2e-gcp-ovn
/test e2e-gcp-ovn-upgrade
/test e2e-metal-ipi-ovn-ipv6
/test e2e-vsphere-ovn
/test e2e-vsphere-ovn-upi

@Chandan9112 Chandan9112 force-pushed the migrate-ctrcfg-pids-limit branch from 0b5ce2e to 5c8f44e Compare May 11, 2026 13:42
@Chandan9112
Copy link
Copy Markdown
Contributor Author

/retest

@openshift-merge-bot
Copy link
Copy Markdown
Contributor

Scheduling required tests:
/test e2e-aws-csi
/test e2e-aws-ovn-fips
/test e2e-aws-ovn-microshift
/test e2e-aws-ovn-microshift-serial
/test e2e-aws-ovn-serial-1of2
/test e2e-aws-ovn-serial-2of2
/test e2e-gcp-csi
/test e2e-gcp-ovn
/test e2e-gcp-ovn-upgrade
/test e2e-metal-ipi-ovn-ipv6
/test e2e-vsphere-ovn
/test e2e-vsphere-ovn-upi

@Chandan9112
Copy link
Copy Markdown
Contributor Author

/retest

Comment thread test/extended/node/node_e2e/node.go Outdated

g.By("Get a ready worker node")
workers, err := exutil.GetReadySchedulableWorkerNodes(context.Background(), oc.AdminKubeClient())
o.Expect(err).NotTo(o.HaveOccurred())
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

All the o.Expect(err).NotTo(o.HaveOccurred()) have no context message.
It is harder triage in CI when a failure happens (you only see generic “expected no error”).
It is better if we start adding messages for failure, it will be easy while debugging

Comment thread test/extended/node/node_e2e/node.go
Comment thread test/extended/node/node_e2e/node.go
@Chandan9112 Chandan9112 force-pushed the migrate-ctrcfg-pids-limit branch from 5c8f44e to c5e0d58 Compare May 12, 2026 16:42
@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented May 12, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: Chandan9112
Once this PR has been reviewed and has the lgtm label, please assign cpmeadors for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Copy link
Copy Markdown

@coderabbitai coderabbitai Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🤖 Prompt for all review comments with AI agents
Verify each finding against current code. Fix only still-valid issues, skip the
rest with a brief reason, keep changes minimal, and validate.

Inline comments:
In `@test/extended/node/node_e2e/node.go`:
- Around line 196-200: After running the sed edit via
nodeutils.ExecOnNodeWithChroot on workerNode, add an explicit verification step
that the change took effect before proceeding to MCO reconciliation: run another
nodeutils.ExecOnNodeWithChroot call against workerNode to read
/etc/crio/crio.conf (e.g., grep or awk for the expected log_level = "debug"
line) and use o.Expect on its output/error to fail the test if the pattern is
not present; place this check immediately after the sed invocation (referencing
the same workerNode and ExecOnNodeWithChroot usage) so the test cannot
false-pass if the sed did not modify the file.
🪄 Autofix (Beta)

Fix all unresolved CodeRabbit comments on this PR:

  • Push a commit to this branch (recommended)
  • Create a new PR with the fixes

ℹ️ Review info
⚙️ Run configuration

Configuration used: Repository YAML (base), Central YAML (inherited)

Review profile: CHILL

Plan: Enterprise

Run ID: 7aa20e50-6a01-4a61-b2dd-ee5bd245739c

📥 Commits

Reviewing files that changed from the base of the PR and between 5c8f44e and c5e0d58.

📒 Files selected for processing (1)
  • test/extended/node/node_e2e/node.go

Comment thread test/extended/node/node_e2e/node.go
@openshift-merge-bot
Copy link
Copy Markdown
Contributor

Scheduling required tests:
/test e2e-aws-csi
/test e2e-aws-ovn-fips
/test e2e-aws-ovn-microshift
/test e2e-aws-ovn-microshift-serial
/test e2e-aws-ovn-serial-1of2
/test e2e-aws-ovn-serial-2of2
/test e2e-gcp-csi
/test e2e-gcp-ovn
/test e2e-gcp-ovn-upgrade
/test e2e-metal-ipi-ovn-ipv6
/test e2e-vsphere-ovn
/test e2e-vsphere-ovn-upi

@Chandan9112 Chandan9112 force-pushed the migrate-ctrcfg-pids-limit branch from c5e0d58 to e627d3c Compare May 13, 2026 04:55
@openshift-merge-bot openshift-merge-bot Bot added the ready-for-human-review Indicates a PR has been reviewed by automated tools and is ready for human review label May 13, 2026
@Chandan9112
Copy link
Copy Markdown
Contributor Author

/retest

@openshift-merge-bot
Copy link
Copy Markdown
Contributor

Scheduling required tests:
/test e2e-aws-csi
/test e2e-aws-ovn-fips
/test e2e-aws-ovn-microshift
/test e2e-aws-ovn-microshift-serial
/test e2e-aws-ovn-serial-1of2
/test e2e-aws-ovn-serial-2of2
/test e2e-gcp-csi
/test e2e-gcp-ovn
/test e2e-gcp-ovn-upgrade
/test e2e-metal-ipi-ovn-ipv6
/test e2e-vsphere-ovn
/test e2e-vsphere-ovn-upi

@Chandan9112
Copy link
Copy Markdown
Contributor Author

/retest

1 similar comment
@Chandan9112
Copy link
Copy Markdown
Contributor Author

/retest

@openshift-trt
Copy link
Copy Markdown

openshift-trt Bot commented May 14, 2026

Job Failure Risk Analysis for sha: e627d3c

Job Name Failure Risk
pull-ci-openshift-origin-main-e2e-vsphere-ovn-upi IncompleteTests
Tests for this run (20) are below the historical average (3491): IncompleteTests (not enough tests ran to make a reasonable risk analysis; this could be due to infra, installation, or upgrade problems)

@Chandan9112
Copy link
Copy Markdown
Contributor Author

/test e2e-vsphere-ovn-upi

@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented May 14, 2026

@Chandan9112: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-vsphere-ovn-upi e627d3c link true /test e2e-vsphere-ovn-upi

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@openshift-ci openshift-ci Bot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label May 15, 2026
@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented May 15, 2026

PR needs rebase.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. ready-for-human-review Indicates a PR has been reviewed by automated tools and is ready for human review

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants