-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
kubetest: add "EKS" provider #9814
Comments
Good to know. Yes, we are happy to follow the new pattern. Do we have any issue to track this? Would each provider have its own repository to trigger Prow jobs? |
I'm not sure what the tracking issue is but yeah, each cloud provider has a repo and can have presubmits on that repo. We'll also need non-presubmits though to give more signal for Kubernetes releases. @dims might be a good person to talk to on that. |
@BenTheElder this is not just for cloud provider code. this tool allows us to post CI signal for all the SIG AWS code that sits in k8s-sigs. |
Right I get that the tool does this, I was specifically asking about |
cc @justinsb |
@BenTheElder |
@BenTheElder I was proposing EKS k/k e2e test suites equivalent to This tool will also be used for sub-projects like ALB Ingress Controller, which requires EKS cluster.
Correct. |
I'll be able to make better suggestions after reading what your deployer is doing :-) |
SGTM, thanks! On a related note the naming conventions are probably worth reconsidering at some point, would love suggestions :-) Also +1 to what @krzyzacy said, adding that: We should definitely have blocking vendor presubmits in k8s-sigs! I'd start by introducing it as non blocking there too until we work out any necessary fixes but quickly transition it to blocking there 😅 We might even want a release blocking job (periodic) eventually for k/k, how that will work with the k-sigs providers is still tbd but eventually when there are no in-tree providers we'll need to make some decision about this. I'd love to get this in the conformance dashboard once we have something working. (Note: nothing CNCF official, just signal for us to keep those tests and kubernetes core functionality healthy, similar TBD discussing more about how we should continue or not to block releases on some or all of those..) |
BTW: have you see the prowjob pod presets support? It seems like a lot of those |
Have not. Great idea to package them into a preset. Will look into it. Thanks! |
Fantastic! |
/milestone v1.14 |
/area kubetest |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/close we don't need this right @gyuho ? |
@dims: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
https://github.com/aws/awstester implements
test-infra/kubetest/main.go
Lines 223 to 230 in 9a88e32
We have been running internal Prow cluster to test AWS ALB Ingress Controller. Please see https://github.com/gyuho/aws-alb-ingress-controller/pull/3 for example output.
Action items:
DumpClusterLogs
andPublish
methods to use upstream Google Cloud Storageci-kubernetes-e2e-aws-eks
Prow job (as a non-blocking post-submit job) (pending *: add EKS periodic jobs, upgrade "awstester" vendor #9940)/cc @d-nishi @BenTheElder @krzyzacy
The text was updated successfully, but these errors were encountered: