Closed logicsys closed 3 days ago
Welcome @logicsys!
It looks like this is your first PR to kubernetes-sigs/kubespray 🎉. Please refer to our pull request process documentation to help your PR have a smooth ride to approval.
You will be prompted by a bot to use commands during the review process. Do not be afraid to follow the prompts! It is okay to experiment. Here is the bot commands documentation.
You can also check if kubernetes-sigs/kubespray has its own contribution guidelines.
You may want to refer to our testing guide if you run into trouble with your tests not passing.
If you are having difficulty getting your pull request seen, please follow the recommended escalation practices. Also, for tips and tricks in the contribution process you may want to read the Kubernetes contributor cheat sheet. We want to make sure your contribution gets all the attention it needs!
Thank you, and welcome to Kubernetes. :smiley:
Hi @logicsys. Thanks for your PR.
I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test
on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.
Once the patch is verified, the new status will be reflected by the ok-to-test
label.
I understand the commands that are listed here.
/kind feature
/ok-to-test
@logicsys Is there any special reason to force push many commits? Random pushes drain computing resources and do not pass the CI.
I was pushing fixes to satisfy the CI tests as they failed, force pushing after a squash, so as to not muddy up the pull request with many commits
if there was a way for me to run the CI tests locally, then I can do that to save resources
think thats everything fixed now though, the failing tests appear to be due to some vms not being able to be created
if there was a way for me to run the CI tests locally, then I can do that to save resources
You can use Vagrant to test your feature.
think thats everything fixed now though, the failing tests appear to be due to some vms not being able to be created
This is because the frequent creation of machines will trigger Vagrant machine HTTP 429, we're still working on it. Continuous push does not speed up CI passes.
great, I'll use vagrant next time.
Yes I understand frequent pushes will not speed up CI passes, I was only pushing again, to fix the issues that were raised by the CI tests as they failed.
Apologies for the burned resources
Does the vagrant test route, perform the linting steps that the CI does? Thats where i had issues, rather than with the actual functionality of the changes in this PR, which i had of course tested myself before creating this PR.
If not, I could perhaps look at getting the lint tests to run via vagrant, as my next PR ha
/retest-failed
appears to still be a 429 vm creation error as far as i can tell in the molecule_containerd test :( maybe with one more re-test ?
I think Kubespray CI
didn't record the molecule_containerd
job ID; let me retest for it.
/retest
EDIT: not working with content.
/retest
this has of course grown into adding some v1.16+ cilium support, as the new bgp apis do not exist in our current default cilium v1.15.9, i've not set the cilium default version any higher, ive just overridden for my own tests for now, just a couple more tests to run, but think i've got the new bgpv2 apis working properly when configured via kubespray vars.
Full support of cilium v1.16 will likely require more than this PR alone, but at least the way forward is slightly paved with these changes ha
sorry was one last typo to fix there, ready for review again now
HI @cyclinder Would you please help to review it?
@cyclinder: GitHub didn't allow me to request PR reviews from the following users: the, approval, please, for.
Note that only kubernetes-sigs members and repo collaborators can review this PR, and authors cannot review their own PRs.
Thanks @logicsys /approve
[APPROVALNOTIFIER] This PR is APPROVED
This pull-request has been approved by: logicsys, yankay
The full list of commands accepted by this bot can be found here.
The pull request process is described here
What type of PR is this?
What this PR does / why we need it: Allows user to define Cilium IP Load Balancer pools & BGP Peer Policies, the following new defaults have been added to preserve current behavior:
Due to CRDs being necessary before these features can be configured, this change first waits for these CRDs to exist before attempting to create, if above vars are configured.
Does this PR introduce a user-facing change?: No user-facing change, current behavior is preserved with defaults.