Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix coredns failing during custom networking tests #2844

Merged
merged 1 commit into from
Mar 13, 2024

Conversation

jchen6585
Copy link
Contributor

What type of PR is this?

testing

Which issue does this PR fix?:

N/A

What does this PR do / Why do we need it?:
Coredns pods are in a failing state during the custom networking suite due to missing security group rules. This doesn't affect the test result since the tests do not require DNS resolving but is still a good fix.

Testing done on this change:

Tested Custom Networking suite and tested test cases that use AuthorizeSecurityGroupIngress and RevokeSecurityGroupIngress.

  • Custom Networking
Screenshot 2024-03-12 at 2 57 10 PM Screenshot 2024-03-12 at 3 06 57 PM
  • Pod ENI
Screenshot 2024-03-12 at 3 36 04 PM
  • CNI (pod traffic test and pod traffic across az test)
Screenshot 2024-03-12 at 3 39 25 PM Screenshot 2024-03-12 at 3 49 51 PM

Will this PR introduce any new dependencies?:

N/A

Will this break upgrades or downgrades? Has updating a running cluster been tested?:
N/A

Does this change require updates to the CNI daemonset config files to work?:

N/A

Does this PR introduce any user-facing change?:

No


By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.

@jchen6585 jchen6585 requested a review from a team as a code owner March 12, 2024 23:01
Copy link
Member

@orsenthil orsenthil left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM.

@jchen6585 jchen6585 merged commit 4f42b6f into aws:master Mar 13, 2024
5 of 6 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants