Skip to content

Use OCP 4.11 instead of 4.10 for knative serving release-next#31756

Merged
openshift-merge-robot merged 4 commits into
openshift:masterfrom
nak3:bump410-411
Sep 5, 2022
Merged

Use OCP 4.11 instead of 4.10 for knative serving release-next#31756
openshift-merge-robot merged 4 commits into
openshift:masterfrom
nak3:bump410-411

Conversation

@nak3
Copy link
Copy Markdown
Contributor

@nak3 nak3 commented Aug 28, 2022

As per title, this patch changes to use OCP 4.11 instead of 4.10 for knative serving release-next.

@openshift-ci openshift-ci Bot requested review from alanfx and mgencur August 28, 2022 10:55
@openshift-ci openshift-ci Bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Aug 28, 2022
@nak3
Copy link
Copy Markdown
Contributor Author

nak3 commented Aug 29, 2022

/test pj-rehearse

@nak3
Copy link
Copy Markdown
Contributor Author

nak3 commented Aug 29, 2022

/retest

1 similar comment
@nak3
Copy link
Copy Markdown
Contributor Author

nak3 commented Aug 29, 2022

/retest

@nak3
Copy link
Copy Markdown
Contributor Author

nak3 commented Aug 29, 2022

/cc @skonto @mgencur

@openshift-ci openshift-ci Bot requested a review from skonto August 29, 2022 06:02
@mgencur
Copy link
Copy Markdown
Contributor

mgencur commented Aug 30, 2022

@nak3 Overall, it looks good to me. There are a lot of failures in the run "411-tls-e2e-aws-ocp-411 but it's probably not related to the changes in this PR.
Also, I don't see any difference between the config files for 411-e2e-aws-ocp-411 and 411-tls-e2e-aws-ocp-411:
https://github.com/openshift/release/blob/9621c34f5ccdb7db738835f703b169d2129d0abc/ci-operator/config/openshift/knative-serving/openshift-knative-serving-release-next__411-tls.yaml
https://github.com/openshift/release/blob/9621c34f5ccdb7db738835f703b169d2129d0abc/ci-operator/config/openshift/knative-serving/openshift-knative-serving-release-next__411.yaml
Am I missing something?

@nak3
Copy link
Copy Markdown
Contributor Author

nak3 commented Aug 30, 2022

Yeah, TestAutoscaleSustaining/aggregation-weighted-exponential sometimes started failing suddenly and it happened on the daily CI openshift/knative-serving#1222 .

For 411-tls, sorry for the confusion. It enables internal-tls on openshift/knative-serving repo when job name contains tls as:
https://github.com/openshift/knative-serving/blob/a42405d1c360f55d6ed95fb1a5e0ab40444cf58d/openshift/e2e-common.sh#L232-L238

I thought that we can drop the TLS job soon as we should run CI with internal-tls by default in a few release later but probably I should add a new target in Makefile and use it to solve the confusion. I will change it soon.

@nak3
Copy link
Copy Markdown
Contributor Author

nak3 commented Aug 31, 2022

Added a target to call make test-e2e-tls. This PR will fail until openshift/knative-serving#1224 was merged.

@mgencur
Copy link
Copy Markdown
Contributor

mgencur commented Aug 31, 2022

Thanks!
/lgtm
/hold
Hold for the tests. Feel free to unhold.

@openshift-ci openshift-ci Bot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Aug 31, 2022
@openshift-ci openshift-ci Bot added the lgtm Indicates that a PR is ready to be merged. label Aug 31, 2022
@mgencur
Copy link
Copy Markdown
Contributor

mgencur commented Aug 31, 2022

I still see make: *** No rule to make target test-e2e-tls'. Stop` but I think the release-next branch needs to be re-created to get the new make target.

@nak3
Copy link
Copy Markdown
Contributor Author

nak3 commented Sep 1, 2022

/retest

1 similar comment
@nak3
Copy link
Copy Markdown
Contributor Author

nak3 commented Sep 1, 2022

/retest

@nak3
Copy link
Copy Markdown
Contributor Author

nak3 commented Sep 1, 2022

/retest

Hmm... tls test may have some issue 🤔

@openshift-ci openshift-ci Bot removed the lgtm Indicates that a PR is ready to be merged. label Sep 1, 2022
@skonto
Copy link
Copy Markdown
Contributor

skonto commented Sep 1, 2022

/retest

@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented Sep 1, 2022

@nak3: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/rehearse/openshift/knative-serving/release-next/411-tls-e2e-aws-ocp-411 d357e2a link unknown /test pj-rehearse

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@nak3
Copy link
Copy Markdown
Contributor Author

nak3 commented Sep 2, 2022

Hmm.... TLS on 4.10 works so 4.11 didn't work 🤔 I will debug it on serving repo instead of this repo as 4.11 will be available once this was merged.
@skonto @mgencur Could you please take a look?

@skonto
Copy link
Copy Markdown
Contributor

skonto commented Sep 2, 2022

@nak3 noticed that:

{"severity":"ERROR","timestamp":"2022-09-01T07:08:19.44918672Z","logger":"activator","caller":"websocket/connection.go:192","message":"Failed to send ping message to ws://autoscaler.knative-serving.svc.cluster.local:8080","commit":"2e2e098","knative.dev/controller":"activator","knative.dev/pod":"activator-7869d69698-69fmt","error":"connection has not yet been established","stacktrace":"knative.dev/pkg/websocket.NewDurableConnection.func3\n\t/go/src/knative.dev/serving/vendor/knative.dev/pkg/websocket/connection.go:192"}

Btw I dont see any tls secret mounted here.

@nak3
Copy link
Copy Markdown
Contributor Author

nak3 commented Sep 2, 2022

I think you are referring to the log in 411-tls-e2e-aws-ocp-411 but I'm not sure why happened and difficult to debug in this repo so I changed the tls cluster to 4.10 for now. All test passed so I will debug it on serving repo as I commented #31756 (comment)

Btw I dont see any tls secret mounted here.

Sorry what tls secret missed to mount. The system pod does not mount any secret with internal-tls. (Only queue-proxy will mount the secret.)

@skonto
Copy link
Copy Markdown
Contributor

skonto commented Sep 2, 2022

Sorry what tls secret missed to mount

Yes I was referring to that fail. I thought activator will mount a secret for connections that go through it (scale from zero) no (it has been a while since the tls review so I might remember wrongly)?

All test passed so I will debug it on serving repo as I commented #31756 (comment)

Ok approving then, should we create a jira for 4.11 as a blocker?

/lgtm

@nak3
Copy link
Copy Markdown
Contributor Author

nak3 commented Sep 2, 2022

Yes I was referring to that fail. I thought activator will mount a secret for connections that go through it (scale from zero) no (it has been a while since the tls review so I might remember wrongly)?

Ah, I see. Yes, I guess that you remembered that the intial implementation. We changed the secret to get the secret via secret lister and so we just can toggle the configuration via internal-encryption: true/false in the configmap.

Ok approving then, should we create a jira for 4.11 as a blocker?

Sure, I will.

@nak3
Copy link
Copy Markdown
Contributor Author

nak3 commented Sep 2, 2022

/hold cancel

@openshift-ci openshift-ci Bot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Sep 2, 2022
@nak3
Copy link
Copy Markdown
Contributor Author

nak3 commented Sep 2, 2022

@skonto could you add the label?

@nak3
Copy link
Copy Markdown
Contributor Author

nak3 commented Sep 3, 2022

@skonto ping

1 similar comment
@nak3
Copy link
Copy Markdown
Contributor Author

nak3 commented Sep 5, 2022

@skonto ping

@nak3
Copy link
Copy Markdown
Contributor Author

nak3 commented Sep 5, 2022

@mgencur ping

@mgencur
Copy link
Copy Markdown
Contributor

mgencur commented Sep 5, 2022

/lgtm

@openshift-ci openshift-ci Bot added the lgtm Indicates that a PR is ready to be merged. label Sep 5, 2022
@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented Sep 5, 2022

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: mgencur, nak3, skonto

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-merge-robot openshift-merge-robot merged commit cc77376 into openshift:master Sep 5, 2022
@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented Sep 5, 2022

@nak3: Updated the following 3 configmaps:

  • ci-operator-misc-configs configmap in namespace ci at cluster app.ci using the following files:
    • key openshift-knative-serving-release-next__410-tls.yaml using file ci-operator/config/openshift/knative-serving/openshift-knative-serving-release-next__410-tls.yaml
    • key openshift-knative-serving-release-next__4.10.yaml using file ``
    • key openshift-knative-serving-release-next__411.yaml using file ci-operator/config/openshift/knative-serving/openshift-knative-serving-release-next__411.yaml
    • key openshift-knative-serving-release-next__4.6.yaml using file ``
    • key openshift-knative-serving-release-next__46.yaml using file ci-operator/config/openshift/knative-serving/openshift-knative-serving-release-next__46.yaml
    • key openshift-knative-serving-release-next__4.7.yaml using file ``
    • key openshift-knative-serving-release-next__47.yaml using file ci-operator/config/openshift/knative-serving/openshift-knative-serving-release-next__47.yaml
  • job-config-misc configmap in namespace ci at cluster app.ci using the following files:
    • key openshift-knative-serving-release-next-postsubmits.yaml using file ci-operator/jobs/openshift/knative-serving/openshift-knative-serving-release-next-postsubmits.yaml
    • key openshift-knative-serving-release-next-presubmits.yaml using file ci-operator/jobs/openshift/knative-serving/openshift-knative-serving-release-next-presubmits.yaml
  • image-mirror-mappings configmap in namespace ci at cluster app.ci using the following files:
    • key mapping_knative_nightly_quay using file core-services/image-mirroring/knative/mapping_knative_nightly_quay
Details

In response to this:

As per title, this patch changes to use OCP 4.11 instead of 4.10 for knative serving release-next.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants