-
Notifications
You must be signed in to change notification settings - Fork 1.5k
Azure Stack IPI Support #5084
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Azure Stack IPI Support #5084
Conversation
|
cc @rna-afk |
8e8250f to
ad465c2
Compare
|
I have removed WIP from this. I would like to merge this soon to enable parallel work and we'll bring the multistages into a separate PR. |
ad465c2 to
7110199
Compare
|
I need to run another test to make sure bootstrap destroy works (which it did before switching to stages). This is ready for review but I'm going to put a /hold until we get #5032 in or at least for today. |
5297dcd to
81b466b
Compare
rna-afk
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think Matthew had 3 resources in his IPI work which had to be added to the terraform provider. The azurestack_image is added but the 2 others are missing. I can add those to the IPI work later or we could add them here if you like.
| name = "ignition" | ||
| resource_group_name = var.resource_group_name | ||
| storage_account_name = var.storage_account.name | ||
| container_access_type = "blob" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Matthew had a comment that suggested setting container_access_type to "private" if the azurestack_storage_account_sas resource was available in terraform provider. I added this to the provider.
| resource_group_name = data.azurestack_resource_group.main.name | ||
| network_security_group_name = azurestack_network_security_group.cluster.name | ||
| description = local.description | ||
| } |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Matthew's work also included the azurestack_subnet_network_security_group_association which I added to the terraform provider.
|
/test e2e-azure |
|
/lgtm |
|
/hold cancel |
81b466b to
919eada
Compare
|
/hold still waiting on #5032 |
|
Still in the same state. I'm probably just being impatient. |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: jhixson74, patrickdillon The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Include the azurestack provider in the plugins that terraform knows.
Add the terraform files for provisioning a cluster in Azure Stack. Update Azure Stack TF to stages
Utilize the 2018-03-01 profile, which according to https://github.com/Azure/azure-sdk-for-go/blob/master/README.md is the latest hybrid profile. See https://docs.microsoft.com/en-us/azure-stack/user/azure-stack-version-profiles?view=azs-2102#azure-api-profiles-and-azure-stack-hub-compatibility for more information on hybrid profiles.
Uses Azure Stack as the Terraform Provider for the Azure Stack platform. Follows the same stages as Azure, but uses the Azure Stack provider.
Uses SAS resource introduced in our provider fork to make bootstrap ignition private.
These tags mark DNS records as owned by the cluster, allowing them to be deleted.
Vendors the OpenShift fork of the Azure Stack Terraform provider and azure sdk.
13390fd to
6fbadd4
Compare
|
/lgtm |
|
/lgtm |
|
@patrickdillon: you cannot LGTM your own PR. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/skip |
|
/retest-required Please review the full test history for this PR and help us cut down flakes. |
7 similar comments
|
/retest-required Please review the full test history for this PR and help us cut down flakes. |
|
/retest-required Please review the full test history for this PR and help us cut down flakes. |
|
/retest-required Please review the full test history for this PR and help us cut down flakes. |
|
/retest-required Please review the full test history for this PR and help us cut down flakes. |
|
/retest-required Please review the full test history for this PR and help us cut down flakes. |
|
/retest-required Please review the full test history for this PR and help us cut down flakes. |
|
/retest-required Please review the full test history for this PR and help us cut down flakes. |
|
@patrickdillon: The following tests failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
|
/retest-required Please review the full test history for this PR and help us cut down flakes. |
1 similar comment
|
/retest-required Please review the full test history for this PR and help us cut down flakes. |
Adds Terraform configuration to build Azure Stack clusters. Successfully creates all infrastructure, but cluster bootstrapping depends on further upstream changes.
Currently marked as WIP because:
This should unblock CI work in openshift/release#18796