TRT-2657: Revert "add remaining CNO NetworkPolicies" (#2959)#2999
Conversation
…2959) This reverts commit 5928824. The new NetworkPolicies cause cloud-network-config-controller to CrashLoopBackOff during upgrade (API server i/o timeout). 0% pass rate across all platforms (AWS, Azure, GCP) in payload 5.0.0-0.ci-2026-05-07-142711, blocking all 5.0 CI upgrade jobs. TRT incident: TRT-2657 Payload analysis: https://gcsweb-ci.apps.ci.l2s4.p1.openshiftapps.com/gcs/test-platform-results/logs/periodic-ci-openshift-release-main-claude-payload-agent/2052395627291086848/artifacts/claude-payload-agent/openshift-claude-payload-agent/artifacts/payload-analysis-5.0.0-0.ci-2026-05-07-142711-summary.html
|
@redhat-ship-help: The label(s) DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
@redhat-ship-help: This pull request references Jira Issue OCPBUGS-83800, which is invalid:
Comment The bug has been updated to refer to the pull request using the external bug tracker. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
WalkthroughNetwork policy and namespace security configuration is being restructured across the cluster-network-operator and cloud-network-config-controller namespaces. The openshift-network-operator namespace gains default-deny network policies and additional metadata, while the cloud-network-config-controller namespace has its network policy rules reorganized. ChangesNetwork Policy Restructuring
Estimated code review effort🎯 2 (Simple) | ⏱️ ~12 minutes 🚥 Pre-merge checks | ✅ 12✅ Passed checks (12 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
|
Hi @redhat-ship-help. Thanks for your PR. I'm waiting for a openshift member to verify that this patch is reasonable to test. If it is, they should reply with Tip We noticed you've done this a few times! Consider joining the org to skip this step and gain Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
@redhat-ship-help: No Jira issue is referenced in the title of this pull request. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
@redhat-ship-help: This pull request references TRT-2657 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the bug to target the "5.0.0" version, but no target version was set. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
/ok-to-test |
|
/payload-job periodic-ci-openshift-release-main-ci-5.0-upgrade-from-stable-4.22-e2e-aws-ovn-upgrade periodic-ci-openshift-release-main-ci-5.0-upgrade-from-stable-4.22-e2e-azure-ovn-upgrade |
|
@stbenjam: trigger 2 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command
See details on https://pr-payload-tests.ci.openshift.org/runs/ci/04dbc3e0-4a70-11f1-8f36-f0abf143b526-0 |
|
Let's see what payload jobs say. AWS also had an outage earlier which might've caused the job failures |
|
Fix included in release 5.0.0-0.nightly-2026-05-07-185738 |
|
Stephens's failed with /payload-job periodic-ci-openshift-release-main-ci-5.0-upgrade-from-stable-4.22-e2e-aws-ovn-upgrade periodic-ci-openshift-release-main-ci-5.0-upgrade-from-stable-4.22-e2e-azure-ovn-upgrade |
|
@petr-muller: trigger 2 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command
See details on https://pr-payload-tests.ci.openshift.org/runs/ci/47063b10-4ab6-11f1-9733-f59b456cc67a-0 |
|
@petr-muller: trigger 2 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command
See details on https://pr-payload-tests.ci.openshift.org/runs/ci/74fb5e10-4ab6-11f1-8709-04fccfb2554f-0 |
|
huh pj-rehearse reacts on comment edit 🤔 |
|
/retest |
|
/lgtm
And this is why its bad when your CI has an overall pass rate of negative twelve percent. |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: danwinship, redhat-ship-help The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
The But I guess these can be caused by updating from the version with the bug. /verified by https://pr-payload-tests.ci.openshift.org/runs/ci/47063b10-4ab6-11f1-9733-f59b456cc67a-0 |
|
@petr-muller: This PR has been marked as verified by DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
/override ci/prow/e2e-aws-ovn-upgrade-ipsec |
|
@petr-muller: Overrode contexts on behalf of petr-muller: ci/prow/e2e-aws-ovn-upgrade-ipsec DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
/override ci/prow/e2e-aws-ovn-upgrade |
|
@petr-muller: Overrode contexts on behalf of petr-muller: ci/prow/e2e-aws-ovn-upgrade DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
@redhat-ship-help: The following tests failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
This reverts commit 5928824 (merge commit for #2959).
Why
The new NetworkPolicies cause
cloud-network-config-controllerto CrashLoopBackOff during upgrade (API server i/o timeout). 0% pass rate across all platforms (AWS, Azure, GCP) in payload5.0.0-0.ci-2026-05-07-142711, blocking all 5.0 CI upgrade jobs.The failures were visible in every upgrade job on the original PR: #2959 (comment)
References
/label trt-incident
Summary by CodeRabbit