-
Notifications
You must be signed in to change notification settings - Fork 2.1k
steps/proxy: Port to Fedora CoreOS #11750
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
steps/proxy: Port to Fedora CoreOS #11750
Conversation
|
(Didn't test this locally, we'll see what rehearse says) |
6b466dd to
71716ad
Compare
|
do we also need to bump here? https://github.com/openshift/release/pull/11750/files#diff-e687af75ecf4bc3dee02258e9703afa7R218 |
That link is taking me to the toplevel of the diff - can you elaborate on "here"? |
|
we are specifying version 2.1.0 here still, does that need to be bumped? |
71716ad to
fffac5e
Compare
It does and done! |
7a85ecc to
33dacdf
Compare
|
/retest |
|
rpm-md issues |
|
it looks like the proxy instance still isn't able to come up... |
|
OK yeah I'm refactoring this script so I can more easily generate the Ignition outside of Prow and test things. |
33dacdf to
f458c78
Compare
|
OK running the generated ignition appears to work when doing some quick tests in qemu but I notice we were still missing the We also have docs for this use case of course: https://docs.fedoraproject.org/en-US/fedora-coreos/running-containers/ |
b824d7e to
f4541a0
Compare
|
OK this time the proxy host definitely came up, and I see access logs in its console. And I think now the problem we're hitting is that machineAPI isn't able to provision workers due to the proxy: So we could probably force merge this and then fix that as a followup? |
|
Hmm. How do we square "proxy console has access logs" with "we still cannot SSH in to gather those logs"? |
ci-operator/step-registry/gather/aws-console/gather-aws-console-commands.sh
Outdated
Show resolved
Hide resolved
ci-operator/step-registry/ipi/conf/aws/proxy/ipi-conf-aws-proxy-commands.sh
Outdated
Show resolved
Hide resolved
The ssh process is being run from the CI cluster - it can't SSH into a private VPC right? |
ci-operator/step-registry/ipi/conf/aws/proxy/ipi-conf-aws-proxy-commands.sh
Outdated
Show resolved
Hide resolved
ci-operator/step-registry/ipi/conf/aws/proxy/ipi-conf-aws-proxy-commands.sh
Outdated
Show resolved
Hide resolved
ci-operator/step-registry/ipi/conf/aws/proxy/ipi-conf-aws-proxy-commands.sh
Outdated
Show resolved
Hide resolved
f4541a0 to
634798f
Compare
|
Re-simplified this and addressed comments. |
|
Logs from that run also show the proxy successfully running. |
Yes.
We should be launching the proxy instance in a public subnet, so it should be reachable from the CI cluster. |
We're currently using RHCOS as a way to run a container image in a single disposable VM. Let's use FCOS because it's more oriented towards this use case and also gets us out of needing to deal with Ignition version dependencies - we can just unconditionally use spec 3 (which RHCOS also uses in 4.6). Switch instance type to `m5.xlarge` to match the current OpenShift standard on general principle; there's no obvious reason we'd need "storage optimized".
634798f to
8b0dbe8
Compare
OK. Then is there a security group set up allowing SSH? |
|
Updated the commit message per #11750 (comment) |
|
/lgtm e2e-aws-proxy failed to build openstack-installer, presumably a flake. Hold until we see the proxy's connections logs again: /hold |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: cgwalters, wking The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
Yup. |
|
I definitely verified that if I booted an instance with this Ignition config outside of Prow (using coreos-assembler tooling) that I was able to ssh in just fine. So I still think this is something related to the VPC. |
|
/retest |
|
/test ci/prow/pj-rehearse |
|
@cgwalters: The specified target(s) for
Use
DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/test pj-rehearse |
1 similar comment
|
/test pj-rehearse |
|
@cgwalters: The following tests failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
|
The most recent rehearsal failed with: So it got past bootstrap-complete, which means the proxy must be working. It's possible that machine-API not supporting proxy plus lack of a functional EC2 VPC endpoint is the only remaining problem blocking install, or that there are more. SSH into the proxy still fails, and we still don't understand why not. AWS flaked out on console log gathering too, or I'd expect to see some logs here. Still progress. Let's just land this and keep poking at SSH access in follow-up work. /hold cancel |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
@cgwalters: Updated the following 2 configmaps:
DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
We're currently using RHCOS as a way to run a container image
in a single disposable VM. Let's use FCOS because it's more
oriented towards this use case and also gets us out of needing
to deal with Ignition version dependencies - we can just
unconditionally use spec 3 (which RHCOS also uses in 4.6).