Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

kubetest: add "EKS" provider #9814

Closed
9 of 12 tasks
gyuho opened this issue Oct 15, 2018 · 18 comments
Closed
9 of 12 tasks

kubetest: add "EKS" provider #9814

gyuho opened this issue Oct 15, 2018 · 18 comments
Labels
area/kubetest kind/feature Categorizes issue or PR as related to a new feature. lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale.
Milestone

Comments

@gyuho
Copy link
Member

gyuho commented Oct 15, 2018

https://github.com/aws/awstester implements

test-infra/kubetest/main.go

Lines 223 to 230 in 9a88e32

type deployer interface {
Up() error
IsUp() error
DumpClusterLogs(localPath, gcsPath string) error
TestSetup() error
Down() error
GetClusterCreated(gcpProject string) (time.Time, error)
}

We have been running internal Prow cluster to test AWS ALB Ingress Controller. Please see https://github.com/gyuho/aws-alb-ingress-controller/pull/3 for example output.

Action items:

/cc @d-nishi @BenTheElder @krzyzacy

@BenTheElder
Copy link
Member

Add pull-kubernetes-e2e-aws-eks Prow job

What's the intention with this job? NB we've been moving providers out of tree and we've moved away from having GKE in the blocking path generally. We're even looking at not having any providers in k/k presubmit someday ...

cc @spiffxp @fejta

@gyuho
Copy link
Member Author

gyuho commented Oct 16, 2018

we've been moving providers out of tree and we've moved away from having GKE in the blocking path generally.

Good to know. Yes, we are happy to follow the new pattern.

Do we have any issue to track this? Would each provider have its own repository to trigger Prow jobs?

@BenTheElder
Copy link
Member

I'm not sure what the tracking issue is but yeah, each cloud provider has a repo and can have presubmits on that repo. We'll also need non-presubmits though to give more signal for Kubernetes releases. @dims might be a good person to talk to on that.

@d-nishi
Copy link

d-nishi commented Oct 16, 2018

@BenTheElder this is not just for cloud provider code. this tool allows us to post CI signal for all the SIG AWS code that sits in k8s-sigs.

@BenTheElder
Copy link
Member

Right I get that the tool does this, I was specifically asking about pull-kubernetes-e2e-aws-eks which sounds like something we're getting away from. VS say a presubmit on the k8s-sigs repo, or continuous integration testing against k8s (postsubmit / periodic, not presubmit).

@krzyzacy
Copy link
Member

cc @justinsb

@d-nishi
Copy link

d-nishi commented Oct 16, 2018

@BenTheElder pull-kubernetes-e2e-aws-eks is not blocking k/k.
We reused a naming convention that might be causing the confusion. This tool is only providing CI signal for k8s-sigs repos related to sig-aws subprojects until we merge this work into cluster-api framework. @gyuho can you confirm?

@gyuho
Copy link
Member Author

gyuho commented Oct 16, 2018

@BenTheElder I was proposing EKS k/k e2e test suites equivalent to pull-kubernetes-e2e-gke (named pull-kubernetes-e2e-aws-eks), and agree that we should have provider-specific tests as a non-blocking presubmit job. We can start as a post-submit.

This tool will also be used for sub-projects like ALB Ingress Controller, which requires EKS cluster.

This tool is only providing CI signal for k8s-sigs repos related to sig-aws subprojects until we merge this work into cluster-api framework

Correct.

@krzyzacy
Copy link
Member

pull-kubernetes-e2e-gke only runs if cluster/ changes because it's using underlying scripts.

I'll be able to make better suggestions after reading what your deployer is doing :-)

@BenTheElder
Copy link
Member

SGTM, thanks!

On a related note the naming conventions are probably worth reconsidering at some point, would love suggestions :-)

Also +1 to what @krzyzacy said, adding that:

We should definitely have blocking vendor presubmits in k8s-sigs! I'd start by introducing it as non blocking there too until we work out any necessary fixes but quickly transition it to blocking there 😅

We might even want a release blocking job (periodic) eventually for k/k, how that will work with the k-sigs providers is still tbd but eventually when there are no in-tree providers we'll need to make some decision about this.

I'd love to get this in the conformance dashboard once we have something working. (Note: nothing CNCF official, just signal for us to keep those tests and kubernetes core functionality healthy, similar TBD discussing more about how we should continue or not to block releases on some or all of those..)

@BenTheElder
Copy link
Member

BTW: have you see the prowjob pod presets support? It seems like a lot of those AWSTESTER_EKS* env could go in one or more of those to make it easier for people to create prowjobs using it.

@BenTheElder BenTheElder added the kind/feature Categorizes issue or PR as related to a new feature. label Oct 16, 2018
@BenTheElder BenTheElder added this to the v1.13 milestone Oct 16, 2018
@gyuho
Copy link
Member Author

gyuho commented Oct 16, 2018

BTW: have you see the prowjob pod presets support.

Have not. Great idea to package them into a preset. Will look into it. Thanks!

@d-nishi
Copy link

d-nishi commented Oct 16, 2018

Fantastic!

@spiffxp
Copy link
Member

spiffxp commented Jan 3, 2019

/milestone v1.14

@k8s-ci-robot k8s-ci-robot modified the milestones: v1.13, v1.14 Jan 3, 2019
@spiffxp
Copy link
Member

spiffxp commented Jan 15, 2019

/area kubetest

@fejta-bot
Copy link

Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta.
/lifecycle stale

@k8s-ci-robot k8s-ci-robot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Apr 15, 2019
@dims
Copy link
Member

dims commented Apr 17, 2019

/close

we don't need this right @gyuho ?

@k8s-ci-robot
Copy link
Contributor

@dims: Closing this issue.

In response to this:

/close

we don't need this right @gyuho ?

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/kubetest kind/feature Categorizes issue or PR as related to a new feature. lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale.
Projects
None yet
Development

No branches or pull requests

8 participants