-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Get Cluster Information for Running FA on AWS and Test Nodes Status #32
Get Cluster Information for Running FA on AWS and Test Nodes Status #32
Conversation
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: razo7 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/retest |
aeedc7a
to
33f2707
Compare
It seems like the PR helped to fetch the AWS cluster information, since it didn't fail in the process, but running the CLI command was denied ( I need to follow up after Passover to better understand from FAR's logs if it has failed due to wrong call of fence_aws with it's parameters or a permission issue... |
33f2707
to
4a22df3
Compare
1a11b1e
to
097ae00
Compare
274ce4e
to
b4a57dc
Compare
b76b869
to
dac9441
Compare
/retest |
ee98e22
to
93772c3
Compare
/retest |
Based on the fetched infromation from OpenShift CI we run the fence_aws FA
Check the FAR logs that indicate a successful CLI executation to verify that the fence agent has been running successfully
Automate FA selection and creation based on the platform it use - AWS or BMH
CRs are namepsaced, thus they should reside next to the operator. Action status is used to demonstrate the use case of fence_aws
Remove a prefix from the Provider ID for having the instance ID per machine
Instead of hard code the namespace of where the operator is installed just fetch the environment variable OPERATOR_NS so FAR CRs will be created on the same namespace that FAR operator has been installed
93772c3
to
129ac60
Compare
PR medik8s#42 add downward API which makes some code redundant
Meaningful and less confusing import names, and signal for GetDeploymentNamespace failure but don't faile e2e/ut test
Bad practice
Yay! All green |
@@ -39,12 +69,64 @@ var _ = Describe("FAR E2e", func() { | |||
Expect(k8sClient.Get(context.Background(), client.ObjectKeyFromObject(far), testFarCR)).To(Succeed(), "failed to get FAR CR") | |||
}) | |||
}) | |||
|
|||
Context("fence agent - non-Dummy", func() { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
maybe a better name than non-Dummy
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I was using the term dummy
for FA which is dumb and does not act as a real FA in comparison to a real one who
supports some FA actions and actually communicate with a machine/node.
Is fence agent - fence_aws or fence_ipmilan
sounds better to you?
Anyway will address this possible change in #20 and merge the current PR.
Due to code-review
65456a6
to
0d9572b
Compare
/lgtm |
/unhold |
Get cluster information for running Fence Agent (FA) on AWS (and partially for BMH cluster platform) and test node's status.
We now add a non-dummy FA,
fence_aws
for AWS clusters orfence_ipmilan
for Bare Metal cluster, to test it in CI. ATM we support AWS cluster, thus onlyfence_aws
has been tested.This PR uses Kubernetes resources to get cluster information for running the fence agent:
In this PR we only test
fence_aws
on CI with status action. and #20 will address thereboot
/remediation action.