New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adds an E2E test for using peered VPCs and an internal ELB #3285
Adds an E2E test for using peered VPCs and an internal ELB #3285
Conversation
@josh-ferrell: This issue is currently awaiting triage. If CAPA/CAPI contributors determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Hi @josh-ferrell. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/ok-to-test |
/test pull-cluster-api-provider-aws-e2e |
a979d9f
to
998d41c
Compare
4509d18
to
2236dad
Compare
/test pull-cluster-api-provider-aws-e2e |
4138740
to
7eb2a16
Compare
/test pull-cluster-api-provider-aws-e2e |
/test pull-cluster-api-provider-aws-test |
testing Fix gci lint issue Change to test assertions
7eb2a16
to
0659828
Compare
/test pull-cluster-api-provider-aws-e2e |
@sedefsavas @Ankitasw Let me know if you have any feedback on this test. |
@josh-ferrell thank you for the PR. |
@sedefsavas when you get a free moment will you review this PR? |
This is a great way to do both internal ELB and peering validation at the same time! One question, instead of creating management cluster's infra, could we have used the ones auto-generated? In that case, we need to do some SDK calls to get the IDs and then do the peering with the workload cluster. Not asking to change the way it is, just curious. Also, have you confirmed in your local that |
It would be great to have a documentation for deployment in internet-restricted environments, possibly with a diagram of the scenario tested here. Do you want to open an issue for this? |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: sedefsavas The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Technically the workload isn't Internet restricted egress wise, the API server is just on the internal ELB. I've been thinking we need to architect and document a validated airgapped deployment if we don't have one already. I can open an issue to do so. |
I hadn't thought about using the CAPA created infrastructure to peer but I'm also still learning the SDK so it's now on my list to look into. DeleteInfrastructure took some time to get consistent but I think we're well covered. I could add some additional validation and probably will when refactoring the security groups test to use the same setup. |
What type of PR is this?
/kind feature
What this PR does / why we need it:
Creates an E2E test for creating clusters in peered VPCs and creating a workload cluster using an internal ELB.
Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when PR gets merged):Fixes #3249
Special notes for your reviewer:
Checklist:
Release note: