-
Notifications
You must be signed in to change notification settings - Fork 3.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
(aws-eks): Cannot remove logging configuration after setting them #19898
Comments
Amazon EKS Loggings was first introduced in aws#18112 and added Fargate logging support in aws#20707. However, disabled loggings was not take into consideration at the very beginning of the design. With this PR, enabled clusterLogging support for enablement/disablement. Also, added test cases for no logging configured, partial logging configured, full logging configured. Fixes: aws#19898
Amazon EKS Loggings was first introduced in aws#18112 and added Fargate logging support in aws#20707. However, disabled loggings was not take into consideration at the very beginning of the design. With this PR, enabled clusterLogging support for enablement/disablement. Also, added test cases for no logging configured, partial logging configured, full logging configured. Fixes: aws#19898
Amazon EKS Loggings was first introduced in aws#18112 and added Fargate logging support in aws#20707. However, disabled loggings was not take into consideration at the very beginning of the design. With this PR, enabled clusterLogging support for enablement/disablement. Also, added test cases for no logging configured, partial logging configured, full logging configured. Fixes: aws#19898
Amazon EKS Loggings was first introduced in aws#18112 and added Fargate logging support in aws#20707. However, disabled loggings was not take into consideration at the very beginning of the design. With this PR, enabled clusterLogging support for enablement/disablement. Also, added test cases for no logging configured, partial logging configured, full logging configured. Fixes: aws#19898
Amazon EKS Loggings was first introduced in aws#18112 and added Fargate logging support in aws#20707. However, disabled loggings was not take into consideration at the very beginning of the design. With this PR, enabled clusterLogging support for enablement/disablement. Also, added test cases for no logging configured, partial logging configured, full logging configured. Fixes: aws#19898
…1185) ### Description Amazon EKS Loggings was first introduced in #18112 and added Fargate logging support in #20707. However, disabled loggings was not take into consideration at the very beginning of the design. With this PR, enabled clusterLogging support for enablement/disablement. Also, added test cases for no logging configured, partial logging configured, full logging configured. Fixes: #19898 ### Test Results #### Tool versions ```sh $ node --version v16.16.0 ``` ```sh $ yarn --version 1.22.19 ``` #### yarn build ```sh $ yarn build yarn run v1.22.19 $ cdk-build ... Build times for @aws-cdk/aws-eks: Total time (59.5s) | /home/ec2-user/aws-cdk/tools/@aws-cdk/cdk-build-tools/node_modules/jsii/bin/jsii (35.0s) | cfn2ts (0.6s) Done in 59.94s. ``` #### yarn test ```sh $ yarn test yarn run v1.22.19 $ cdk-test PASS test/cluster.test.js (33.488 s) PASS test/nodegroup.test.js (10.465 s) PASS test/helm-chart.test.js (5.964 s) PASS test/fargate.test.js (5.391 s) PASS test/k8s-manifest.test.js PASS test/service-account.test.js PASS test/user-data.test.js PASS test/awsauth.test.js PASS test/alb-controller.test.js PASS test/k8s-patch.test.js ... =============================== Coverage summary =============================== Statements : 93.08% ( 888/954 ) Branches : 89.47% ( 442/494 ) Functions : 94.03% ( 142/151 ) Lines : 94.83% ( 881/929 ) ================================================================================ Test Suites: 13 passed, 13 total Tests: 277 passed, 277 total Snapshots: 0 total Time: 77.227 s, estimated 91 s Ran all test suites. Verifying integration test snapshots... UNCHANGED integ.eks-oidc-provider 27.294s UNCHANGED integ.fargate-cluster 35.153s UNCHANGED integ.eks-cluster-private-endpoint 35.223s UNCHANGED integ.eks-helm-asset 35.602s UNCHANGED integ.eks-bottlerocket-ng 35.981s UNCHANGED integ.eks-cluster-handlers-vpc 36.266s UNCHANGED integ.eks-inference 36.801s UNCHANGED integ.alb-controller 37.565s UNCHANGED integ.eks-cluster 38.041s Snapshot Results: Tests: 9 passed, 9 total Tests successful. Total time (1m59.1s) | /home/ec2-user/aws-cdk/node_modules/jest/bin/jest.js (1m18.4s) | integ-runner (40.6s) Done in 119.26s. ``` #### yarn integ ```sh $ yarn integ yarn run v1.22.19 $ integ-runner Verifying integration test snapshots... UNCHANGED integ.eks-oidc-provider 25.049s UNCHANGED integ.eks-bottlerocket-ng 34.895s UNCHANGED integ.eks-cluster-private-endpoint 35.012s UNCHANGED integ.fargate-cluster 35.417s UNCHANGED integ.eks-cluster-handlers-vpc 35.563s UNCHANGED integ.eks-helm-asset 35.691s UNCHANGED integ.eks-inference 36.303s UNCHANGED integ.alb-controller 37.071s UNCHANGED integ.eks-cluster 37.843s Snapshot Results: Tests: 9 passed, 9 total Done in 40.59s. ``` ---- ### All Submissions: * [X] Have you followed the guidelines in our [Contributing guide?](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md) ### Adding new Unconventional Dependencies: * [X] This PR adds new unconventional dependencies following the process described [here](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md/#adding-new-unconventional-dependencies) ### New Features * [X] Have you added the new feature to an [integration test](https://github.com/aws/aws-cdk/blob/main/INTEGRATION_TESTS.md)? * [X] Did you use `yarn integ` to deploy the infrastructure and generate the snapshot (i.e. `yarn integ` without `--dry-run`)? *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
|
…bled" (#21545) Reverts #21185 and #21463 Closes #21515 Re-opens #19898. Fix for this in progress. ---- ### All Submissions: * [ ] Have you followed the guidelines in our [Contributing guide?](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md) ### Adding new Unconventional Dependencies: * [ ] This PR adds new unconventional dependencies following the process described [here](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md/#adding-new-unconventional-dependencies) ### New Features * [ ] Have you added the new feature to an [integration test](https://github.com/aws/aws-cdk/blob/main/INTEGRATION_TESTS.md)? * [ ] Did you use `yarn integ` to deploy the infrastructure and generate the snapshot (i.e. `yarn integ` without `--dry-run`)? *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
…bled" (#21545) Reverts #21185 and #21463 Closes #21515 Re-opens #19898. Fix for this in progress. ---- ### All Submissions: * [ ] Have you followed the guidelines in our [Contributing guide?](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md) ### Adding new Unconventional Dependencies: * [ ] This PR adds new unconventional dependencies following the process described [here](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md/#adding-new-unconventional-dependencies) ### New Features * [ ] Have you added the new feature to an [integration test](https://github.com/aws/aws-cdk/blob/main/INTEGRATION_TESTS.md)? * [ ] Did you use `yarn integ` to deploy the infrastructure and generate the snapshot (i.e. `yarn integ` without `--dry-run`)? *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
…s#21185) ### Description Amazon EKS Loggings was first introduced in aws#18112 and added Fargate logging support in aws#20707. However, disabled loggings was not take into consideration at the very beginning of the design. With this PR, enabled clusterLogging support for enablement/disablement. Also, added test cases for no logging configured, partial logging configured, full logging configured. Fixes: aws#19898 ### Test Results #### Tool versions ```sh $ node --version v16.16.0 ``` ```sh $ yarn --version 1.22.19 ``` #### yarn build ```sh $ yarn build yarn run v1.22.19 $ cdk-build ... Build times for @aws-cdk/aws-eks: Total time (59.5s) | /home/ec2-user/aws-cdk/tools/@aws-cdk/cdk-build-tools/node_modules/jsii/bin/jsii (35.0s) | cfn2ts (0.6s) Done in 59.94s. ``` #### yarn test ```sh $ yarn test yarn run v1.22.19 $ cdk-test PASS test/cluster.test.js (33.488 s) PASS test/nodegroup.test.js (10.465 s) PASS test/helm-chart.test.js (5.964 s) PASS test/fargate.test.js (5.391 s) PASS test/k8s-manifest.test.js PASS test/service-account.test.js PASS test/user-data.test.js PASS test/awsauth.test.js PASS test/alb-controller.test.js PASS test/k8s-patch.test.js ... =============================== Coverage summary =============================== Statements : 93.08% ( 888/954 ) Branches : 89.47% ( 442/494 ) Functions : 94.03% ( 142/151 ) Lines : 94.83% ( 881/929 ) ================================================================================ Test Suites: 13 passed, 13 total Tests: 277 passed, 277 total Snapshots: 0 total Time: 77.227 s, estimated 91 s Ran all test suites. Verifying integration test snapshots... UNCHANGED integ.eks-oidc-provider 27.294s UNCHANGED integ.fargate-cluster 35.153s UNCHANGED integ.eks-cluster-private-endpoint 35.223s UNCHANGED integ.eks-helm-asset 35.602s UNCHANGED integ.eks-bottlerocket-ng 35.981s UNCHANGED integ.eks-cluster-handlers-vpc 36.266s UNCHANGED integ.eks-inference 36.801s UNCHANGED integ.alb-controller 37.565s UNCHANGED integ.eks-cluster 38.041s Snapshot Results: Tests: 9 passed, 9 total Tests successful. Total time (1m59.1s) | /home/ec2-user/aws-cdk/node_modules/jest/bin/jest.js (1m18.4s) | integ-runner (40.6s) Done in 119.26s. ``` #### yarn integ ```sh $ yarn integ yarn run v1.22.19 $ integ-runner Verifying integration test snapshots... UNCHANGED integ.eks-oidc-provider 25.049s UNCHANGED integ.eks-bottlerocket-ng 34.895s UNCHANGED integ.eks-cluster-private-endpoint 35.012s UNCHANGED integ.fargate-cluster 35.417s UNCHANGED integ.eks-cluster-handlers-vpc 35.563s UNCHANGED integ.eks-helm-asset 35.691s UNCHANGED integ.eks-inference 36.303s UNCHANGED integ.alb-controller 37.071s UNCHANGED integ.eks-cluster 37.843s Snapshot Results: Tests: 9 passed, 9 total Done in 40.59s. ``` ---- ### All Submissions: * [X] Have you followed the guidelines in our [Contributing guide?](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md) ### Adding new Unconventional Dependencies: * [X] This PR adds new unconventional dependencies following the process described [here](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md/#adding-new-unconventional-dependencies) ### New Features * [X] Have you added the new feature to an [integration test](https://github.com/aws/aws-cdk/blob/main/INTEGRATION_TESTS.md)? * [X] Did you use `yarn integ` to deploy the infrastructure and generate the snapshot (i.e. `yarn integ` without `--dry-run`)? *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
…bled" (aws#21545) Reverts aws#21185 and aws#21463 Closes aws#21515 Re-opens aws#19898. Fix for this in progress. ---- ### All Submissions: * [ ] Have you followed the guidelines in our [Contributing guide?](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md) ### Adding new Unconventional Dependencies: * [ ] This PR adds new unconventional dependencies following the process described [here](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md/#adding-new-unconventional-dependencies) ### New Features * [ ] Have you added the new feature to an [integration test](https://github.com/aws/aws-cdk/blob/main/INTEGRATION_TESTS.md)? * [ ] Did you use `yarn integ` to deploy the infrastructure and generate the snapshot (i.e. `yarn integ` without `--dry-run`)? *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
We are running into the same issue on an existing cluster (EKS 1.22 and CDK 2.53). Deploy stack with:
Afterwards, deploy with cluster logging disabled. Is there any update on when this issue will be resolved? |
In case this helps someone: I was getting "Received response status [FAILED] from custom resource. Message returned: The type for cluster update was not provided." even with this fix in place (CDK 2.59.0). Resolved by manually turning off all logging on the EKS cluster, then applying the change in Cloudformation. |
Had same issue on my end with: Received response status [FAILED] from custom resource. Message returned: No changes needed for the logging config provided Logs I deployed it with: Trying to remove the API logging line and running another CDK Deploy results in the error. I have found a solution by using a custom resource instead to update this which includes the onDelete line |
resolving by #24688 |
|
Describe the bug
Updating a cluster to remove cluster control plane logging cannot succeed. Also the rollback also fails with slightly different error.
Expected Behavior
The cluster should be updated or at least the rollback should complete.
Current Behavior
It fails with "The type for cluster update was not provided." error. Also the rollback also fails with slightly different error: "No changes needed for the logging config provided."
Reproduction Steps
Custom::AWSCDK-EKS-Cluster
resource fails to update with the following error:Possible Solution
🤷♂️
Additional Information/Context
No response
CDK CLI Version
2.20.0 (build 738ef49)
Framework Version
2.20.0
Node.js Version
v16.13.0
OS
Darwin Version 21.4.0
Language
Typescript
Language Version
Version 3.9.10
Other information
No response
The text was updated successfully, but these errors were encountered: