Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OCPBUGS-38727: Enable Insight Operator entitlements for multi arch clusters #979

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

joselsegura
Copy link
Contributor

@joselsegura joselsegura commented Aug 13, 2024

This PR implements a new mechanism to gather a set of architectures used by nodes in the current cluster.

This set of architectures is not used yet, but if Insights Operator is not able to retrieve it, it will make the entitlements retrieval process to fail

Categories

  • Bugfix
  • Data Enhancement
  • Feature
  • Backporting
  • Others (CI, Infrastructure, Documentation)

Sample Archive

The archive won't change with this feature

Documentation

No documentation update

Unit Tests

No tests were updated

Privacy

Yes. There are no sensitive data in the newly collected information.

Changelog

No

Breaking Changes

No

References

https://issues.redhat.com/browse/OCPBUGS-38727

pkg/ocm/sca/sca_test.go Outdated Show resolved Hide resolved
pkg/ocm/sca/sca.go Outdated Show resolved Hide resolved
pkg/controller/operator.go Outdated Show resolved Hide resolved
@joselsegura
Copy link
Contributor Author

/override ci/prow/insights-operator-e2e-tests
/override ci/prow/e2e-agnostic-upgrade

Copy link

openshift-ci bot commented Aug 15, 2024

@joselsegura: joselsegura unauthorized: /override is restricted to Repo administrators, approvers in top level OWNERS file, and the following github teams:openshift: openshift-release-oversight openshift-staff-engineers.

In response to this:

/override ci/prow/insights-operator-e2e-tests
/override ci/prow/e2e-agnostic-upgrade

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@tremes
Copy link
Contributor

tremes commented Aug 15, 2024

Thank you!
/approve
/lgtm

@tremes
Copy link
Contributor

tremes commented Aug 15, 2024

/override ci/prow/insights-operator-e2e-tests
/override ci/prow/e2e-agnostic-upgrade

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Aug 15, 2024
Copy link

openshift-ci bot commented Aug 15, 2024

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: joselsegura, tremes

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Aug 15, 2024
Copy link

openshift-ci bot commented Aug 15, 2024

@tremes: Overrode contexts on behalf of tremes: ci/prow/e2e-agnostic-upgrade, ci/prow/insights-operator-e2e-tests

In response to this:

/override ci/prow/insights-operator-e2e-tests
/override ci/prow/e2e-agnostic-upgrade

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@tremes tremes changed the title Gather architectures from k8s API CCXDEV-14145: Gather architectures from k8s API Aug 15, 2024
@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Aug 15, 2024
@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Aug 15, 2024

@joselsegura: This pull request references CCXDEV-14145 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the task to target the "4.18.0" version, but no target version was set.

In response to this:

This PR implements a new mechanism to gather a set of architectures used by nodes in the current cluster.

This set of architectures is not used yet, but if Insights Operator is not able to retrieve it, it will make the entitlements retrieval process to fail

Categories

  • Bugfix
  • Data Enhancement
  • Feature
  • Backporting
  • Others (CI, Infrastructure, Documentation)

Sample Archive

The archive won't change with this feature

Documentation

No documentation update

Unit Tests

No tests were updated

Privacy

Yes. There are no sensitive data in the newly collected information.

Changelog

No

Breaking Changes

No

References

https://issues.redhat.com/browse/CCXDEV-14145

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci openshift-ci bot removed the lgtm Indicates that a PR is ready to be merged. label Aug 16, 2024
Copy link

openshift-ci bot commented Aug 16, 2024

New changes are detected. LGTM label has been removed.

@joselsegura joselsegura changed the title CCXDEV-14145: Gather architectures from k8s API CCXDEV-12875: Enable Insight Operator entitlements for multi arch clusters Aug 16, 2024
@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Aug 16, 2024

@joselsegura: This pull request references CCXDEV-12875 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the epic to target the "4.18.0" version, but no target version was set.

In response to this:

This PR implements a new mechanism to gather a set of architectures used by nodes in the current cluster.

This set of architectures is not used yet, but if Insights Operator is not able to retrieve it, it will make the entitlements retrieval process to fail

Categories

  • Bugfix
  • Data Enhancement
  • Feature
  • Backporting
  • Others (CI, Infrastructure, Documentation)

Sample Archive

The archive won't change with this feature

Documentation

No documentation update

Unit Tests

No tests were updated

Privacy

Yes. There are no sensitive data in the newly collected information.

Changelog

No

Breaking Changes

No

References

https://issues.redhat.com/browse/CCXDEV-14145

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Aug 16, 2024

@joselsegura: This pull request references CCXDEV-12875 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the epic to target the "4.18.0" version, but no target version was set.

In response to this:

This PR implements a new mechanism to gather a set of architectures used by nodes in the current cluster.

This set of architectures is not used yet, but if Insights Operator is not able to retrieve it, it will make the entitlements retrieval process to fail

Categories

  • Bugfix
  • Data Enhancement
  • Feature
  • Backporting
  • Others (CI, Infrastructure, Documentation)

Sample Archive

The archive won't change with this feature

Documentation

No documentation update

Unit Tests

No tests were updated

Privacy

Yes. There are no sensitive data in the newly collected information.

Changelog

No

Breaking Changes

No

References

https://issues.redhat.com/browse/CCXDEV-12875
https://issues.redhat.com/browse/CCXDEV-14145
https://issues.redhat.com/browse/CCXDEV-14146

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

.githooks/pre-commit Outdated Show resolved Hide resolved
@@ -33,7 +33,7 @@ import (
const (
responseBodyLogLen = 1024
insightsReqId = "x-rh-insights-request-id"
scaArchPayload = `{"type": "sca","arch": "x86_64"}`
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hey @Prashanth684 @aleskandro since we have multi-arch compute.... I'm assuming this would not work? Thoughts? Thanks, Paul

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

just read the rest of the code... makes sense


// gatherArchitectures connects to K8S API to retrieve the list of
// nodes and create a set of the present architectures
func (c *Controller) gatherArchitectures(ctx context.Context) (map[string]struct{}, error) {
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

it might be best to request all arches. MachineSets could be on an autoscaler when the gather action is executed.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't get your point. This method is requesting all archs from the nodes list returned by k8s API. Could you please elaborate more?

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Right - I see that. Since you can scale machinesets from zero, you may be temporarily excluding some arches from your retrieval.

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Example https://issues.redhat.com/browse/OCPBUGS-27509 and these would be the second set of MachineSets created.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I get your point now. If at the moment of retrieving the nodes list some machineset is scaled to 0, how can I get the node architecture? I think we can only gather the arch for the current existing nodes, not from those that are unavailable because any reason, but maybe there is another way to retrieve the nodes list...

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think there is a CVO task in the backlog https://issues.redhat.com/browse/MULTIARCH-4559
Maybe the right option is to load from a config, if missing getting the nodelist?

@joselsegura
Copy link
Contributor Author

/override ci/prow/insights-operator-e2e-tests

Copy link

openshift-ci bot commented Aug 19, 2024

@joselsegura: joselsegura unauthorized: /override is restricted to Repo administrators, approvers in top level OWNERS file, and the following github teams:openshift: openshift-release-oversight openshift-staff-engineers.

In response to this:

/override ci/prow/insights-operator-e2e-tests

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@BaiyangZhou
Copy link

/override ci/prow/insights-operator-e2e-tests

Copy link

openshift-ci bot commented Aug 19, 2024

@BaiyangZhou: BaiyangZhou unauthorized: /override is restricted to Repo administrators, approvers in top level OWNERS file, and the following github teams:openshift: openshift-release-oversight openshift-staff-engineers.

In response to this:

/override ci/prow/insights-operator-e2e-tests

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@ncaak
Copy link
Contributor

ncaak commented Aug 19, 2024

/override ci/prow/insights-operator-e2e-tests

Copy link

openshift-ci bot commented Aug 19, 2024

@ncaak: Overrode contexts on behalf of ncaak: ci/prow/insights-operator-e2e-tests

In response to this:

/override ci/prow/insights-operator-e2e-tests

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@joselsegura
Copy link
Contributor Author

/retest

@joselsegura joselsegura changed the title CCXDEV-12875: Enable Insight Operator entitlements for multi arch clusters OCPBUGS-38727: Enable Insight Operator entitlements for multi arch clusters Aug 20, 2024
@openshift-ci-robot openshift-ci-robot added the jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. label Aug 20, 2024
@openshift-ci-robot
Copy link
Contributor

@joselsegura: This pull request references Jira Issue OCPBUGS-38727, which is valid. The bug has been moved to the POST state.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.18.0) matches configured target version for branch (4.18.0)
  • bug is in the state New, which is one of the valid states (NEW, ASSIGNED, POST)

Requesting review from QA contact:
/cc @BaiyangZhou

The bug has been updated to refer to the pull request using the external bug tracker.

In response to this:

This PR implements a new mechanism to gather a set of architectures used by nodes in the current cluster.

This set of architectures is not used yet, but if Insights Operator is not able to retrieve it, it will make the entitlements retrieval process to fail

Categories

  • Bugfix
  • Data Enhancement
  • Feature
  • Backporting
  • Others (CI, Infrastructure, Documentation)

Sample Archive

The archive won't change with this feature

Documentation

No documentation update

Unit Tests

No tests were updated

Privacy

Yes. There are no sensitive data in the newly collected information.

Changelog

No

Breaking Changes

No

References

https://issues.redhat.com/browse/CCXDEV-12875
https://issues.redhat.com/browse/CCXDEV-14145
https://issues.redhat.com/browse/CCXDEV-14146

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot
Copy link
Contributor

@joselsegura: This pull request references Jira Issue OCPBUGS-38727, which is valid.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.18.0) matches configured target version for branch (4.18.0)
  • bug is in the state POST, which is one of the valid states (NEW, ASSIGNED, POST)

Requesting review from QA contact:
/cc @BaiyangZhou

In response to this:

This PR implements a new mechanism to gather a set of architectures used by nodes in the current cluster.

This set of architectures is not used yet, but if Insights Operator is not able to retrieve it, it will make the entitlements retrieval process to fail

Categories

  • Bugfix
  • Data Enhancement
  • Feature
  • Backporting
  • Others (CI, Infrastructure, Documentation)

Sample Archive

The archive won't change with this feature

Documentation

No documentation update

Unit Tests

No tests were updated

Privacy

Yes. There are no sensitive data in the newly collected information.

Changelog

No

Breaking Changes

No

References

https://issues.redhat.com/browse/OCPBUGS-38727

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

Copy link

openshift-ci bot commented Sep 17, 2024

@joselsegura: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/lint 1a3bd69 link true /test lint
ci/prow/insights-operator-e2e-tests 1a3bd69 link true /test insights-operator-e2e-tests
ci/prow/e2e-gcp-ovn-techpreview 1a3bd69 link true /test e2e-gcp-ovn-techpreview

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants