-
Notifications
You must be signed in to change notification settings - Fork 7.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use new GKE cluster for ci-pr.yaml #2418
Conversation
🚲 PR staged at http://34.133.162.82 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM. Checks are all passing.
🚲 PR staged at http://34.133.162.82 |
PR_CLUSTER: "online-boutique-prs" | ||
ZONE: "us-central1-c" | ||
PR_CLUSTER: "prs-gke-cluster" | ||
REGION: "us-central1" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Rationale for change: Since autopilot = regional and standard = zonal.
🚲 PR staged at http://34.133.162.82 |
* Ideally, you would see `Apply complete! Resources: 0 added, 0 changed, 0 destroyed.` in the output. | ||
1. Make your desired changes to the Terraform code. | ||
1. Apply the Terraform: `terraform apply -var project_id=${PROJECT_ID}` | ||
* This time, Terraform will prompt you confirm your changes before applying them. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Future: Ideally, these instructions would be made redundant by a GitHub Action or Cloud Build trigger that terraform apply
s Terraform merged into the main
branch.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Interestingly, I have a similar issue on the GKE samples side: GoogleCloudPlatform/kubernetes-engine-samples#611
🚲 PR staged at http://34.133.162.82 |
bucket = "cicd-terraform-state" | ||
prefix = "terraform-state" | ||
} | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Heads-up: I stored the Terraform state in this Google Cloud Storage (GCS) bucket.
🚲 PR staged at http://34.133.162.82 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've put everything inside the .github/terraform
folder to match https://github.com/GoogleCloudPlatform/kubernetes-engine-samples.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!
* Ideally, you would see `Apply complete! Resources: 0 added, 0 changed, 0 destroyed.` in the output. | ||
1. Make your desired changes to the Terraform code. | ||
1. Apply the Terraform: `terraform apply -var project_id=${PROJECT_ID}` | ||
* This time, Terraform will prompt you confirm your changes before applying them. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Interestingly, I have a similar issue on the GKE samples side: GoogleCloudPlatform/kubernetes-engine-samples#611
@@ -0,0 +1,116 @@ | |||
/** |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is such a great idea. I know we have an internal doc with what infra we need to recreate the CICD environment for Online Boutique, but it's nice to have it all codify and easily-reproducible in a TF script. Thanks!
Background
deployment-tests
GitHub Action is broken — for other pull-requests (see example error logs).adservice
(Java microservice) is failing:Changes from this PR
terraform apply
-ed.How to test
cleanup.yaml
successfully cleans up the staging deployment created by this pull-request.ci-main.yaml
successfully deploys the HEAD commit inmain
to the new cluster (prs-gke-cluster).Additional info