-
Notifications
You must be signed in to change notification settings - Fork 228
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OCPBUGS-32979: Update network operator status for IPsec #2360
OCPBUGS-32979: Update network operator status for IPsec #2360
Conversation
6def0a3
to
7598967
Compare
@pperiyasamy: This pull request references Jira Issue OCPBUGS-32979, which is invalid:
Comment The bug has been updated to refer to the pull request using the external bug tracker. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
/jira refresh |
@pperiyasamy: This pull request references Jira Issue OCPBUGS-32979, which is valid. The bug has been moved to the POST state. 3 validation(s) were run on this bug
Requesting review from QA contact: In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
@pperiyasamy: This pull request references Jira Issue OCPBUGS-32979, which is valid. 3 validation(s) were run on this bug
Requesting review from QA contact: In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@pperiyasamy please note that this will delay installs if ipsec is enabled from the get go, possibly delaying them over an installer global timeout and making them fail. We might need to account for this in ipsec CI jobs and also in docs if the default timeout is not big enough. |
yes @jcaamano , The |
/test e2e-ovn-ipsec-step-registry |
7598967
to
0dac514
Compare
/test e2e-ovn-ipsec-step-registry |
1 similar comment
/test e2e-ovn-ipsec-step-registry |
This 1788117489796780032 run shows change is in effect (here) and COs are back to running in 28mins. Would try for few more runs. |
/test e2e-ovn-ipsec-step-registry |
0dac514
to
56aa983
Compare
@@ -268,6 +268,9 @@ func renderOVNKubernetes(conf *operv1.NetworkSpec, bootstrapResult *bootstrap.Bo | |||
data.Data["OVNIPsecDaemonsetEnable"] = OVNIPsecDaemonsetEnable | |||
data.Data["OVNIPsecEnable"] = OVNIPsecEnable | |||
|
|||
// Set progressing to true until IPsec DaemonSet is rendered when EW IPsec config is enabled. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@pperiyasamy can you add a TODO here explaining what we want to do in the future and/or pointing to the jira issue? thanks!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
807c96f
to
2f27c7b
Compare
This commit updates network operator progressing condition for rolling out IPsec daemonset for cluster. It reflects appropriate status for network cluster operator which would make openshift-install to exit gracefully after installing all of IPsec components for the cluster. Signed-off-by: Periyasamy Palanisamy <[email protected]>
2f27c7b
to
763c565
Compare
/retest |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: jcaamano, pperiyasamy The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/label acknowledge-critical-fixes-only |
/retest |
1 similar comment
/retest |
@pperiyasamy: The following tests failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
0a03896
into
openshift:master
@pperiyasamy: Jira Issue OCPBUGS-32979: All pull requests linked via external trackers have merged: Jira Issue OCPBUGS-32979 has been moved to the MODIFIED state. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
[ART PR BUILD NOTIFIER] This PR has been included in build cluster-network-operator-container-v4.17.0-202405161113.p0.g0a03896.assembly.stream.el9 for distgit cluster-network-operator. |
Fix included in accepted release 4.16.0-0.nightly-2024-05-17-180525 |
This PR updates network operator progressing condition for rolling out IPsec daemonset for cluster. It reflects appropriate status for network cluster operator which would make openshift-install to exit gracefully after installing all of IPsec components for the cluster.