-
-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[ci.jenkins.io] Migrate ci.jenkins.io EKS clusters out from CloudBees AWS account #3954
Comments
Update: proposal to boostrap the AWS account. To be discussed and validated during the next weekly team meeting.
|
…://github.com/jenkins-infra/helpdesk/issues/3954\#issuecomment-2119858778 Signed-off-by: Damien Duportal <damien.duportal@gmail.com>
…b.com/jenkins-infra/helpdesk/issues/3954\#issuecomment-2119858778 (#555) Signed-off-by: Damien Duportal <damien.duportal@gmail.com>
…://github.com/jenkins-infra/helpdesk/issues/3954\#issuecomment-2119858778 Signed-off-by: Damien Duportal <damien.duportal@gmail.com>
…://github.com/jenkins-infra/helpdesk/issues/3954\#issuecomment-2119858778 (#199) Signed-off-by: Damien Duportal <damien.duportal@gmail.com>
…ic, doks and doks-public and their hosted services as per https://github.com/jenkins-infra/helpdesk/issues/3954\#issuecomment-2119858778 Signed-off-by: Damien Duportal <damien.duportal@gmail.com>
…ic, doks and doks-public and their hosted services as per https://github.com/jenkins-infra/helpdesk/issues/3954\#issuecomment-2119858778 (#250) Signed-off-by: Damien Duportal <damien.duportal@gmail.com>
…nd doks-public as per https://github.com/jenkins-infra/helpdesk/issues/3954\#issuecomment-2119858778 (#3442) Signed-off-by: Damien Duportal <damien.duportal@gmail.com>
Update:
jenkins-infra/kubernetes-management#5243
jenkins-infra/jenkins-infra#3442
=> also, forgot to disable monitors, reminded by @smerle33 and done in jenkins-infra/datadog#250 |
…nd doks-public as per https://github.com/jenkins-infra/helpdesk/issues/3954\#issuecomment-2119858778 Signed-off-by: Damien Duportal <damien.duportal@gmail.com>
…nd doks-public as per https://github.com/jenkins-infra/helpdesk/issues/3954\#issuecomment-2119858778 (#554) Signed-off-by: Damien Duportal <damien.duportal@gmail.com>
…s.jenkins.io` CNAME record (#707) Related to jenkins-infra/helpdesk#3954 This PR removes the `digitalocean.updates.jenkins.io` CNAME DNS record which has been used for [prototyping the new update center](jenkins-infra/helpdesk#2649). As the Digital Ocean clusters have been removed and as we don't need this record, this PR deletes it
…ux (#724) Related to jenkins-infra/helpdesk#3954 Twin of #723, this PR fixes the OS to use Azure Linux. It was a mistake I did by forgetting to specify it: as such, the nodes are currently using Ubuntu
Service(s)
AWS, Azure, ci.jenkins.io, sponsors
Summary
Today, ci.jenkins.io utilizes 2 EKS clusters to spin up ephemeral agents (for plugin and BOM builds). These clusters are hosted in a CloudBees-sponsored account (historically used to host a lot of Jenkins services).
We want to move these clusters out of CloudBees AWS to ensure non CloudBees Jenkins contributors can manage it and to use credits from other sponsors as AWS, DigitalOcean and Azure gave us credits to be used.
Initial working path (destination: AWS sponsored account)
Updated working path
As discussed during the 2 previous infra SIG meetings, we have around 28k$ credits on the Azure sponsored account which expires end of August 2024 (was May 2024 but @MarkEWaite asked for extension of this deadline ❤️ ), while both DigitalOcean and AWS (non CloudBees) accounts have credits until January 2025.
=> As such, let's start by using a Kubernetes cluster in Azure (sponsored) AKS to use these credits until end of summer before moving to the new AWS account
Notes 📖
A few elements for planning these migrations:
This is a good opportunity to re-assess the naming convention we used for jenkins-infra/aws project:
cik8s
andeks-public
for instance...The terraform module for EKS has a major upgrade version currently waiting (20.x): Bump version of the Terraform module "eks" to 20.11.0 aws#517 . It features breaking changes around the management of the EKS configmap. Upgrading the module by using the new version on fresh new cluster would avoid a tedious migration of existing ones...
We have an upcoming Kubernetes 1.27 upgrade: it will most probably be applied to AWS cluster before, but we have to keep it in mind
We'll have to define at least 2 different AWS providers in the Terraform project to allow management of both accounts at the same time: https://build5nines.com/terraform-deploy-to-multiple-aws-accounts-in-single-project/ (we already have this kind of pattern with Azure)
Reproduction steps
No response
The text was updated successfully, but these errors were encountered: