Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

e2e: Don't try to create a UDP LoadBalancer on AWS #20959

Merged
merged 2 commits into from
Feb 20, 2016

Conversation

justinsb
Copy link
Member

AWS doesn't support type=LoadBalancer with UDP services. For now, we
simply skip over the test with type=LoadBalancer on AWS for the UDP
service.

Fix #20911

@k8s-github-robot
Copy link

Labelling this PR as size/M

@k8s-github-robot k8s-github-robot added the size/M Denotes a PR that changes 30-99 lines, ignoring generated files. label Feb 10, 2016
@k8s-bot
Copy link

k8s-bot commented Feb 10, 2016

GCE e2e test build/test passed for commit f5962c152e568e7b8add8fbf265b06ca57796e59.

@justinsb
Copy link
Member Author

Still running these tests against AWS... please don't LGTM just yet!

@k8s-bot
Copy link

k8s-bot commented Feb 10, 2016

GCE e2e test build/test passed for commit 091a7ea23e8787bf5dbc7300ada9428b1fea5953.

@ixdy
Copy link
Member

ixdy commented Feb 10, 2016

cc @thockin

@thockin thockin added lgtm "Looks good to me", indicates that a PR is ready to be merged. and removed lgtm "Looks good to me", indicates that a PR is ready to be merged. labels Feb 10, 2016
@thockin
Copy link
Member

thockin commented Feb 10, 2016

LGTM. Justin, feel free to self-lgtm when you think it's done. let me know if you want another round of review for some reason :)

AWS doesn't support type=LoadBalancer with UDP services.  For now, we
simply skip over the test with type=LoadBalancer on AWS for the UDP
service.

Fix kubernetes#20911
@justinsb
Copy link
Member Author

Further AWS e2e testing revealed that I had to add two more conditionals for some cases I missed (where it verified the previous state). But passing on AWS now.

Also we were using the wrong timeout after the initial creation of the TCP LB (LagTimeout vs CreateTimeout); I also added a note about the fact that the create timeout is conflating two concepts: https://github.com/kubernetes/kubernetes/pull/20959/files#diff-20a4e2095b63ecd60dd25e78bcd67372R55 It only surfaces on AWS because there's a delay after the LB is created and appears in the API before it actually starts working (DNS propagation, I think).

Given all that, would you mind giving it a quick once-over again @thockin ? I think it's fine, but don't feel entirely right doing a self-LGTM given that the extra changes aren't 100% trivial. 95% trivial, but not 100%...

@k8s-bot
Copy link

k8s-bot commented Feb 10, 2016

GCE e2e test build/test passed for commit a3558fa40c47213f854aedf21fdfb8e3e1786d2f.

@@ -52,6 +52,10 @@ const loadBalancerLagTimeout = 2 * time.Minute

// How long to wait for a load balancer to be created/modified.
//TODO: once support ticket 21807001 is resolved, reduce this timeout back to something reasonable
//TODO: this timeout is actually used in two distinct senses; once when waiting
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is not quite right - I used it again after changing the port number because that operation (on GCE) causes a full rebuild of the LB, so is akin to a create operation.

@thockin
Copy link
Member

thockin commented Feb 10, 2016

only comments about the timeout value

@justinsb
Copy link
Member Author

Changed the timeout commit to just use a longer lag-timeout on AWS for load balancers (10 minutes). You were right @thockin (of course) - the timeouts were set up correctly; just a little too short for the slow clouds :-)

@k8s-github-robot
Copy link

Labelling this PR as size/L

@k8s-github-robot k8s-github-robot added size/L Denotes a PR that changes 100-499 lines, ignoring generated files. and removed size/M Denotes a PR that changes 30-99 lines, ignoring generated files. labels Feb 11, 2016
@k8s-bot
Copy link

k8s-bot commented Feb 11, 2016

GCE e2e build/test failed for commit 69f8a37e22507f5fb1fd316d493c277cf1bcfa9c.

@thockin thockin added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 11, 2016
@thockin
Copy link
Member

thockin commented Feb 11, 2016

LGTM

@justinsb justinsb added this to the v1.2 milestone Feb 16, 2016
@justinsb
Copy link
Member Author

self-lgtm-ing, with thockin's approval on slack.

@justinsb justinsb added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 16, 2016
@k8s-github-robot
Copy link

@k8s-bot test this

Tests are more than 48 hours old. Re-running tests.

@k8s-bot
Copy link

k8s-bot commented Feb 16, 2016

GCE e2e test build/test passed for commit 46b8946.

@bprashanth
Copy link
Contributor

@k8s-bot unit test this github issue: #21257

@k8s-github-robot
Copy link

@k8s-bot test this [submit-queue is verifying that this PR is safe to merge]

@k8s-bot
Copy link

k8s-bot commented Feb 17, 2016

GCE e2e build/test failed for commit 46b8946.

@justinsb
Copy link
Member Author

@k8s-bot test this github issue #21244

@k8s-bot
Copy link

k8s-bot commented Feb 17, 2016

GCE e2e test build/test passed for commit 46b8946.

@k8s-github-robot
Copy link

@k8s-bot test this [submit-queue is verifying that this PR is safe to merge]

@k8s-bot
Copy link

k8s-bot commented Feb 19, 2016

GCE e2e test build/test passed for commit 46b8946.

@k8s-github-robot
Copy link

@k8s-bot test this [submit-queue is verifying that this PR is safe to merge]

@k8s-bot
Copy link

k8s-bot commented Feb 19, 2016

GCE e2e build/test failed for commit 46b8946.

@justinsb
Copy link
Member Author

@k8s-bot test this github flake #21244

@k8s-bot
Copy link

k8s-bot commented Feb 19, 2016

GCE e2e test build/test passed for commit 46b8946.

@k8s-github-robot
Copy link

@k8s-bot test this [submit-queue is verifying that this PR is safe to merge]

@k8s-bot
Copy link

k8s-bot commented Feb 19, 2016

GCE e2e test build/test passed for commit 46b8946.

@justinsb
Copy link
Member Author

@k8s-bot unit test this github flake #21244

Not actually that flake - rather a weird error where there's just no unit test results - but we're already linked to it, so it shouldn't hurt.

@k8s-github-robot
Copy link

@k8s-bot test this [submit-queue is verifying that this PR is safe to merge]

@k8s-bot
Copy link

k8s-bot commented Feb 20, 2016

GCE e2e test build/test passed for commit 46b8946.

@k8s-github-robot
Copy link

Automatic merge from submit-queue

k8s-github-robot pushed a commit that referenced this pull request Feb 20, 2016
Auto commit by PR queue bot
@k8s-github-robot k8s-github-robot merged commit f08a8f2 into kubernetes:master Feb 20, 2016
openshift-publish-robot pushed a commit to openshift/kubernetes that referenced this pull request Oct 2, 2018
UPSTREAM: 68023: Replace git volume with configmap in emptydir wrapper conflict test

Origin-commit: 9e3b962ac61ae5425031a5bc08cf8b8fbfc72378
wking added a commit to wking/origin that referenced this pull request Apr 28, 2020
Instead of assuming that the AWS default applies to all providers, as
we've done since we carried the upstream code in 9732d01 (test: Add
a service upgrade test that verifies availability, 2020-01-28, openshift#24471).
This catches our copied-and-tweaked code up with upstream logic like
that has switched on provider since kubernetes/kubernetes@46b89464fd (
e2e: Allow longer for AWS LoadBalancers to start serving traffic,
2016-02-10, kubernetes/kubernetes#20959).
wking added a commit to wking/origin that referenced this pull request Apr 28, 2020
…nSuccessCount

Instead of assuming that the AWS default applies to all providers, as
we've done since we carried the upstream code in 9732d01 (test: Add
a service upgrade test that verifies availability, 2020-01-28,
kubernetes/kubernetes@46b89464fd ( e2e: Allow longer for AWS
LoadBalancers to start serving traffic, 2016-02-10,
kubernetes/kubernetes#20959), but Clayton doesn't want to depend on an
upstream constent that might be grown later without us noticing.
Hard-coding to 10m, which should be slow enough for all providers and
is decoupled from upstream constants.
wking added a commit to wking/origin that referenced this pull request Apr 28, 2020
…nSuccessCount

Instead of assuming that the AWS default applies to all providers, as
we've done since we carried the upstream code in 9732d01 (test: Add
a service upgrade test that verifies availability, 2020-01-28,
kubernetes/kubernetes@46b89464fd ( e2e: Allow longer for AWS
LoadBalancers to start serving traffic, 2016-02-10,
kubernetes/kubernetes#20959), but Clayton doesn't want to depend on an
upstream constent that might be grown later without us noticing.
Hard-coding to 10m, which should be slow enough for all providers and
is decoupled from upstream constants.
hexfusion pushed a commit to hexfusion/origin that referenced this pull request Jun 5, 2020
…nSuccessCount

Instead of assuming that the AWS default applies to all providers, as
we've done since we carried the upstream code in 9732d01 (test: Add
a service upgrade test that verifies availability, 2020-01-28,
kubernetes/kubernetes@46b89464fd ( e2e: Allow longer for AWS
LoadBalancers to start serving traffic, 2016-02-10,
kubernetes/kubernetes#20959), but Clayton doesn't want to depend on an
upstream constent that might be grown later without us noticing.
Hard-coding to 10m, which should be slow enough for all providers and
is decoupled from upstream constants.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
lgtm "Looks good to me", indicates that a PR is ready to be merged. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

8 participants