Skip to content

Conversation

@wking
Copy link
Member

@wking wking commented Apr 29, 2020

CI and nightly releases are not part of the official Red Hat Cincinnati graphs. This commit removes the channel property, which will result in the NoChannel condition, but will keep the CVO from attempting to find its current version in the official Cincinnati (details). That in turn should keep the CVO from throwing a new, critical alert, which will keep it from running afoul of recent update e2e logic that forbids critical alerts.

@openshift-ci-robot openshift-ci-robot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Apr 29, 2020
@openshift-ci-robot openshift-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Apr 29, 2020
@wking wking changed the title WIP: ci-operator/step-registry/ipi/install: Remove CVO channel ci-operator/step-registry/ipi/install: Remove CVO channel Apr 30, 2020
@wking
Copy link
Member Author

wking commented Apr 30, 2020

Success:

$ curl -s https://storage.googleapis.com/origin-ci-test/pr-logs/pull/openshift_release/8631/rehearse-8631-pull-ci-cri-o-cri-o-release-1.13-e2e-aws/1/artifacts/e2e-aws/gather-extra/clusterversion.json | jq -r '.items[].spec'
{
  "clusterID": "2956a881-465c-478d-9874-bb9c524c1860",
  "upstream": "https://api.openshift.com/api/upgrades_info/v1/graph"
}

I will try and extend this to our other templates as well, but there's no reason we can't land this as it stands and hit the rest in follow-up work.

CI and nightly releases are not part of the official Red Hat
Cincinnati graphs.  This commit removes the channel property [1],
which will result in the NoChannel condition [2], but will keep the
CVO from attempting to find its current version in the official
Cincinnati [3].  That in turn should keep the CVO from throwing a new,
critical alert [4], which will keep it from running afoul of recent
update e2e logic that forbids critical alerts [5].

[1]: https://github.com/openshift/installer/blob/4eca2efd615f8abd65f576721e2410b19f0d40d0/data/data/manifests/bootkube/cvo-overrides.yaml.template#L8
[2]: https://github.com/openshift/cluster-version-operator/blob/fa452c2d270f1f989f3868ef97ae8cf825713583/docs/user/status.md#nochannel
[3]: https://bugzilla.redhat.com/show_bug.cgi?id=1827378#c4
[4]: openshift/cluster-version-operator#357
[5]: openshift/origin#24786
@wking
Copy link
Member Author

wking commented Apr 30, 2020

I've pushed cfe68a5ca7 -> f3c6b90, adding this after all create manifests locations. Will be super happy once everyone's ported to multi-step.

@wking
Copy link
Member Author

wking commented May 1, 2020

Looked over the failures so far; nothing looks like something due to me clearing the channel (or accidentally flubbing the shell).

@openshift-ci-robot
Copy link
Contributor

@wking: The following tests failed, say /retest to rerun all failed tests:

Test name Commit Details Rerun command
ci/rehearse/openshift-cnv/cnv-ci/master/e2e-test-presubmit f3c6b90 link /test pj-rehearse
ci/rehearse/openshift/cluster-image-registry-operator/master/e2e-vsphere-operator f3c6b90 link /test pj-rehearse
ci/rehearse/openshift/installer/master/e2e-azure-upi f3c6b90 link /test pj-rehearse
ci/rehearse/openshift/installer/master/e2e-ovirt f3c6b90 link /test pj-rehearse
ci/rehearse/openshift/aws-ebs-csi-driver-operator/master/e2e-operator f3c6b90 link /test pj-rehearse
ci/rehearse/openshift/cloud-credential-operator/master/e2e-azure f3c6b90 link /test pj-rehearse
ci/rehearse/openshift/cloud-credential-operator/master/e2e-openstack f3c6b90 link /test pj-rehearse
ci/rehearse/openshift/cluster-api-provider-azure/master/e2e-azure-operator f3c6b90 link /test pj-rehearse
ci/rehearse/openshift/cluster-api-actuator-pkg/master/e2e-azure-operator f3c6b90 link /test pj-rehearse
ci/prow/pj-rehearse f3c6b90 link /test pj-rehearse

Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@wking
Copy link
Member Author

wking commented May 1, 2020

Go away WIP label!

/retitle ci-operator/step-registry/ipi/install: Remove ClusterVersion channel

@openshift-ci-robot openshift-ci-robot changed the title ci-operator/step-registry/ipi/install: Remove CVO channel ci-operator/step-registry/ipi/install: Remove ClusterVersion channel May 1, 2020
@openshift-ci-robot openshift-ci-robot removed the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label May 1, 2020
@jottofar
Copy link
Contributor

jottofar commented May 1, 2020

/lgtm

@jottofar
Copy link
Contributor

jottofar commented May 1, 2020

/retest

@openshift-ci-robot openshift-ci-robot added the lgtm Indicates that a PR is ready to be merged. label May 1, 2020
@openshift-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: jottofar, wking

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-merge-robot openshift-merge-robot merged commit 6e97c99 into openshift:master May 1, 2020
@openshift-ci-robot
Copy link
Contributor

@wking: Updated the following 31 configmaps:

  • prow-job-cluster-launch-installer-custom-test-image configmap in namespace ci at cluster build01 using the following files:
    • key cluster-launch-installer-custom-test-image.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-custom-test-image.yaml
  • prow-job-cluster-launch-installer-ovirt-e2e configmap in namespace ci at cluster build01 using the following files:
    • key cluster-launch-installer-ovirt-e2e.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-ovirt-e2e.yaml
  • prow-job-cluster-launch-installer-remote-libvirt-e2e configmap in namespace ci at cluster api.ci using the following files:
    • key cluster-launch-installer-remote-libvirt-e2e.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-remote-libvirt-e2e.yaml
  • prow-job-cluster-launch-installer-remote-libvirt-e2e configmap in namespace ci at cluster app.ci using the following files:
    • key cluster-launch-installer-remote-libvirt-e2e.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-remote-libvirt-e2e.yaml
  • step-registry configmap in namespace ci at cluster app.ci using the following files:
    • key ipi-install-install-commands.sh using file ci-operator/step-registry/ipi/install/install/ipi-install-install-commands.sh
  • prow-job-cluster-launch-installer-e2e configmap in namespace ci at cluster api.ci using the following files:
    • key cluster-launch-installer-e2e.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-e2e.yaml
  • prow-job-cluster-launch-installer-upi-e2e configmap in namespace ci at cluster build01 using the following files:
    • key cluster-launch-installer-upi-e2e.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-upi-e2e.yaml
  • prow-job-cluster-launch-installer-custom-test-image configmap in namespace ci at cluster api.ci using the following files:
    • key cluster-launch-installer-custom-test-image.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-custom-test-image.yaml
  • prow-job-cluster-launch-installer-openstack-e2e configmap in namespace ci at cluster app.ci using the following files:
    • key cluster-launch-installer-openstack-e2e.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-openstack-e2e.yaml
  • prow-job-cluster-launch-installer-upi-src configmap in namespace ci at cluster api.ci using the following files:
    • key cluster-launch-installer-upi-src.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-upi-src.yaml
  • prow-job-cluster-launch-installer-openstack-e2e configmap in namespace ci at cluster build01 using the following files:
    • key cluster-launch-installer-openstack-e2e.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-openstack-e2e.yaml
  • prow-job-cluster-launch-installer-openstack-upi-e2e configmap in namespace ci at cluster api.ci using the following files:
    • key cluster-launch-installer-openstack-upi-e2e.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-openstack-upi-e2e.yaml
  • prow-job-cluster-launch-installer-remote-libvirt-e2e configmap in namespace ci at cluster build01 using the following files:
    • key cluster-launch-installer-remote-libvirt-e2e.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-remote-libvirt-e2e.yaml
  • prow-job-cluster-launch-installer-upi-e2e configmap in namespace ci at cluster app.ci using the following files:
    • key cluster-launch-installer-upi-e2e.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-upi-e2e.yaml
  • step-registry configmap in namespace ci at cluster api.ci using the following files:
    • key ipi-install-install-commands.sh using file ci-operator/step-registry/ipi/install/install/ipi-install-install-commands.sh
  • prow-job-cluster-launch-installer-metal-e2e configmap in namespace ci at cluster build01 using the following files:
    • key cluster-launch-installer-metal-e2e.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-metal-e2e.yaml
  • prow-job-cluster-launch-installer-metal-e2e configmap in namespace ci at cluster app.ci using the following files:
    • key cluster-launch-installer-metal-e2e.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-metal-e2e.yaml
  • prow-job-cluster-launch-installer-openstack-e2e configmap in namespace ci at cluster api.ci using the following files:
    • key cluster-launch-installer-openstack-e2e.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-openstack-e2e.yaml
  • prow-job-cluster-launch-installer-upi-src configmap in namespace ci at cluster app.ci using the following files:
    • key cluster-launch-installer-upi-src.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-upi-src.yaml
  • prow-job-cluster-launch-installer-e2e configmap in namespace ci at cluster build01 using the following files:
    • key cluster-launch-installer-e2e.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-e2e.yaml
  • prow-job-cluster-launch-installer-ovirt-e2e configmap in namespace ci at cluster api.ci using the following files:
    • key cluster-launch-installer-ovirt-e2e.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-ovirt-e2e.yaml
  • prow-job-cluster-launch-installer-upi-e2e configmap in namespace ci at cluster api.ci using the following files:
    • key cluster-launch-installer-upi-e2e.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-upi-e2e.yaml
  • prow-job-cluster-launch-installer-upi-src configmap in namespace ci at cluster build01 using the following files:
    • key cluster-launch-installer-upi-src.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-upi-src.yaml
  • prow-job-cluster-launch-installer-metal-e2e configmap in namespace ci at cluster api.ci using the following files:
    • key cluster-launch-installer-metal-e2e.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-metal-e2e.yaml
  • prow-job-cluster-launch-installer-ovirt-e2e configmap in namespace ci at cluster app.ci using the following files:
    • key cluster-launch-installer-ovirt-e2e.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-ovirt-e2e.yaml
  • prow-job-cluster-launch-installer-src configmap in namespace ci at cluster api.ci using the following files:
    • key cluster-launch-installer-src.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-src.yaml
  • prow-job-cluster-launch-installer-src configmap in namespace ci at cluster build01 using the following files:
    • key cluster-launch-installer-src.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-src.yaml
  • prow-job-cluster-launch-installer-openstack-upi-e2e configmap in namespace ci at cluster app.ci using the following files:
    • key cluster-launch-installer-openstack-upi-e2e.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-openstack-upi-e2e.yaml
  • prow-job-cluster-launch-installer-custom-test-image configmap in namespace ci at cluster app.ci using the following files:
    • key cluster-launch-installer-custom-test-image.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-custom-test-image.yaml
  • prow-job-cluster-launch-installer-e2e configmap in namespace ci at cluster app.ci using the following files:
    • key cluster-launch-installer-e2e.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-e2e.yaml
  • prow-job-cluster-launch-installer-openstack-upi-e2e configmap in namespace ci at cluster ci/api-build01-ci-devcluster-openshift-com:6443 using the following files:
    • key cluster-launch-installer-openstack-upi-e2e.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-openstack-upi-e2e.yaml
Details

In response to this:

CI and nightly releases are not part of the official Red Hat Cincinnati graphs. This commit removes the channel property, which will result in the NoChannel condition, but will keep the CVO from attempting to find its current version in the official Cincinnati (details). That in turn should keep the CVO from throwing a new, critical alert, which will keep it from running afoul of recent update e2e logic that forbids critical alerts.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@wking wking deleted the clear-channel branch May 4, 2020 18:22
spadgett added a commit to spadgett/console that referenced this pull request May 4, 2020
Update Channel will no longer be set in CI. Don't fail the test if it's
`Not available`.

See openshift/release#8631
stbenjam added a commit to stbenjam/dev-scripts that referenced this pull request Jun 3, 2021
CI and nightly releases are not part of the official Red Hat
Cincinnati graphs.  This commit removes the channel property [1],
which will result in the NoChannel condition [2], but will keep the
CVO from attempting to find its current version in the official
Cincinnati [3].  That in turn should keep the CVO from throwing a new,
critical alert [4], which will keep it from running afoul of recent
update e2e logic that forbids critical alerts [5].

See this related PR [6] which does this for other platforms IPI
install step.

[1]: https://github.com/openshift/installer/blob/4eca2efd615f8abd65f576721e2410b19f0d40d0/data/data/manifests/bootkube/cvo-overrides.yaml.template#L8
[2]: https://github.com/openshift/cluster-version-operator/blob/fa452c2d270f1f989f3868ef97ae8cf825713583/docs/user/status.md#nochannel
[3]: https://bugzilla.redhat.com/show_bug.cgi?id=1827378#c4
[4]: openshift/cluster-version-operator#357
[5]: openshift/origin#24786
[6]: openshift/release#8631
stbenjam added a commit to stbenjam/dev-scripts that referenced this pull request Jun 3, 2021
CI and nightly releases are not part of the official Red Hat
Cincinnati graphs.  This commit removes the channel property [1],
which will result in the NoChannel condition [2], but will keep the
CVO from attempting to find its current version in the official
Cincinnati [3].  That in turn should keep the CVO from throwing a new,
critical alert [4], which will keep it from running afoul of recent
update e2e logic that forbids critical alerts [5].

See this related PR [6] which does this for other platforms IPI
install step.

[1]: https://github.com/openshift/installer/blob/4eca2efd615f8abd65f576721e2410b19f0d40d0/data/data/manifests/bootkube/cvo-overrides.yaml.template#L8
[2]: https://github.com/openshift/cluster-version-operator/blob/fa452c2d270f1f989f3868ef97ae8cf825713583/docs/user/status.md#nochannel
[3]: https://bugzilla.redhat.com/show_bug.cgi?id=1827378#c4
[4]: openshift/cluster-version-operator#357
[5]: openshift/origin#24786
[6]: openshift/release#8631

Co-authored-by: W. Trevor King <wking@tremily.us>
openshift-merge-robot pushed a commit to openshift-metal3/dev-scripts that referenced this pull request Sep 23, 2021
CI and nightly releases are not part of the official Red Hat
Cincinnati graphs.  This commit removes the channel property [1],
which will result in the NoChannel condition [2], but will keep the
CVO from attempting to find its current version in the official
Cincinnati [3].  That in turn should keep the CVO from throwing a new,
critical alert [4], which will keep it from running afoul of recent
update e2e logic that forbids critical alerts [5].

See this related PR [6] which does this for other platforms IPI
install step.

[1]: https://github.com/openshift/installer/blob/4eca2efd615f8abd65f576721e2410b19f0d40d0/data/data/manifests/bootkube/cvo-overrides.yaml.template#L8
[2]: https://github.com/openshift/cluster-version-operator/blob/fa452c2d270f1f989f3868ef97ae8cf825713583/docs/user/status.md#nochannel
[3]: https://bugzilla.redhat.com/show_bug.cgi?id=1827378#c4
[4]: openshift/cluster-version-operator#357
[5]: openshift/origin#24786
[6]: openshift/release#8631

Co-authored-by: W. Trevor King <wking@tremily.us>

Co-authored-by: W. Trevor King <wking@tremily.us>
petr-muller added a commit to petr-muller/release that referenced this pull request Jul 21, 2023
…sible

This PR is a part of the same effort as openshift#40703 and implements the same change as openshift#40711. This change is a separate step to avoid mixing up rehearsals.

OTA maintains staging (identical to production) and integration (running on engineering candidate OCP clusters) Cincinnati instances. We are searching for traffic that we could route to especially the integration one, so that we can find possible problems with engineering candidate early.

All the instances are serving identical data (up to some minimal skew coming from when individual instance scrape their source data) so we should be able to easily use the integration instance in CI clusters that are running a released OCP version. Most CI clusters are not running such versions, and these need to not query OSUS, otherwise
they would trip an alert, causing noise in CI jobs. CI clusters are not querying OSUS since openshift#8631

We can enhance the logic to validate whether the version we are going to install is known to OSUS. If it is, we know we are installing a published OCP version and it is safe to let the cluster query OSUS. We still clear the channel to prevent the cluster from querying OSUS if we the version we install is not known to OSUS.
petr-muller added a commit to petr-muller/release that referenced this pull request Aug 10, 2023
This PR is a part of the same effort as openshift#40703

OTA maintains staging (identical to production) and integration (running
on engineering candidate OCP clusters) Cincinnati instances. We are
searching for traffic that we could route to especially the integration
one, so that we can find possible problems with engineering candidate
early.

All the instances are serving identical data (up to some minimal skew
coming from when individual instance scrape their source data) so we
should be able to easily use the integration instance in CI clusters
that are running a released OCP version. Most CI clusters are not
running such versions, and these must *not* query OSUS, otherwise they
would trip an alert, causing noise in CI jobs. CI clusters are not
querying OSUS since openshift#8631

We can enhance the logic to validate whether the version we are going
to install is known to OSUS. If it is, we know we are installing a
published OCP version and it is safe to let the cluster query OSUS. We
still clear the channel to prevent the cluster from querying OSUS if we
the version we install is not known to OSUS, or if this job involves
upgrading the cluster to another version.
openshift-merge-robot pushed a commit that referenced this pull request Aug 10, 2023
#40711)

This PR is a part of the same effort as #40703

OTA maintains staging (identical to production) and integration (running
on engineering candidate OCP clusters) Cincinnati instances. We are
searching for traffic that we could route to especially the integration
one, so that we can find possible problems with engineering candidate
early.

All the instances are serving identical data (up to some minimal skew
coming from when individual instance scrape their source data) so we
should be able to easily use the integration instance in CI clusters
that are running a released OCP version. Most CI clusters are not
running such versions, and these must *not* query OSUS, otherwise they
would trip an alert, causing noise in CI jobs. CI clusters are not
querying OSUS since #8631

We can enhance the logic to validate whether the version we are going
to install is known to OSUS. If it is, we know we are installing a
published OCP version and it is safe to let the cluster query OSUS. We
still clear the channel to prevent the cluster from querying OSUS if we
the version we install is not known to OSUS, or if this job involves
upgrading the cluster to another version.
petr-muller added a commit to petr-muller/release that referenced this pull request Aug 14, 2023
…s, where possible

This PR is a part of the same effort as openshift#40703 and implements the same change as openshift#40711. This change is a separate step to avoid mixing up rehearsals.

OTA maintains staging (identical to production) and integration (running on engineering candidate OCP clusters) Cincinnati instances. We are searching for traffic that we could route to especially the integration one, so that we can find possible problems with engineering candidate early.

All the instances are serving identical data (up to some minimal skew coming from when individual instance scrape their source data) so we should be able to easily use the integration instance in CI clusters that are running a released OCP version. Most CI clusters are not running such versions, and these need to not query OSUS, otherwise they would trip an alert, causing noise in CI jobs. CI clusters are not querying OSUS since openshift#8631

We can enhance the logic to validate whether the version we are going to install is known to OSUS. If it is, we know we are installing a published OCP version and it is safe to let the cluster query OSUS. We still clear the channel to prevent the cluster from querying OSUS if we the version we install is not known to OSUS.
petr-muller added a commit to petr-muller/release that referenced this pull request Aug 17, 2023
…sible

This PR is a part of the same effort as openshift#40703 and implements the same change as openshift#40711. This change is a separate step to avoid mixing up rehearsals.

OTA maintains staging (identical to production) and integration (running on engineering candidate OCP clusters) Cincinnati instances. We are searching for traffic that we could route to especially the integration one, so that we can find possible problems with engineering candidate early.

All the instances are serving identical data (up to some minimal skew coming from when individual instance scrape their source data) so we should be able to easily use the integration instance in CI clusters that are running a released OCP version. Most CI clusters are not running such versions, and these need to not query OSUS, otherwise
they would trip an alert, causing noise in CI jobs. CI clusters are not querying OSUS since openshift#8631

We can enhance the logic to validate whether the version we are going to install is known to OSUS. If it is, we know we are installing a published OCP version and it is safe to let the cluster query OSUS. We still clear the channel to prevent the cluster from querying OSUS if we the version we install is not known to OSUS.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants