Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Extend node e2e test suite with containerized Kubelet #56250

Conversation

ingvagabund
Copy link
Contributor

@ingvagabund ingvagabund commented Nov 22, 2017

How to run it?

make test-e2e-node \
    TEST_ARGS='--kubelet-containerized=true --hyperkube-image=hyperkube-amd64:1.9 --kubelet-flags="<FLAGS>"' \
    FOCUS="Conformance"

@ingvagabund ingvagabund added area/test sig/testing Categorizes an issue or PR as relevant to SIG Testing. labels Nov 22, 2017
@k8s-ci-robot k8s-ci-robot added do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. do-not-merge/release-note-label-needed Indicates that a PR should not merge because it's missing one of the release note labels. size/M Denotes a PR that changes 30-99 lines, ignoring generated files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. labels Nov 22, 2017
@ingvagabund ingvagabund force-pushed the extend-node-e2e-test-suite-with-containerized-kubelet branch from 5bb16e6 to 1636395 Compare November 22, 2017 21:19
@ingvagabund
Copy link
Contributor Author

How relevant is it to implement the non-systemd variant?

@ingvagabund
Copy link
Contributor Author

/test pull-kubernetes-unit

"-v", "/etc/machine-id:/etc/machine-id:ro",
"-v", "/etc/systemd/system:/host-etc/systemd/system",
"-v", filepath.Dir(kubeconfigPath)+":/etc/kubernetes",
"-v", "/lib/modules:/lib/modules",
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

loading kernel modules?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I got inspired by the openshift-node service file. If not needed, I can remove it.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we can remove these two (at least).

"-e HOST=/rootfs", "-e HOST_ETC=/host-etc",
"-v", "/etc/localtime:/etc/localtime:ro",
"-v", "/etc/machine-id:/etc/machine-id:ro",
"-v", "/etc/systemd/system:/host-etc/systemd/system",
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

what is this needed for?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I got inspired by the openshift-node service file. If not needed, I can remove it.

@sjenning
Copy link
Contributor

How relevant is it to implement the non-systemd variant?

What specifically makes this systemd only?

@ingvagabund
Copy link
Contributor Author

What specifically makes this systemd only?

If the systemd-run binary is present, the systemd service is created. Otherwise, a binary on a background is run. So it is needed by the non-systemd OSes.

@ingvagabund ingvagabund changed the title WIP: extend node e2e test suite with containerized Kubelet Extend node e2e test suite with containerized Kubelet Nov 27, 2017
@k8s-ci-robot k8s-ci-robot removed the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Nov 27, 2017
@sjenning
Copy link
Contributor

If the systemd-run binary is present, the systemd service is created. Otherwise, a binary on a background is run. So it is needed by the non-systemd OSes.

Ah I see. So you are just adding support for the systemd path in this PR atm.

How much trouble would it be to implement the non-systemd path as well? This might help our case for upstream containerized kubelet testing.

@sjenning
Copy link
Contributor

/sig node
/assign @dchen1107

@k8s-ci-robot k8s-ci-robot added the sig/node Categorizes an issue or PR as relevant to SIG Node. label Nov 28, 2017
@dims
Copy link
Member

dims commented Nov 29, 2017

/release-note-none

@k8s-ci-robot k8s-ci-robot added release-note-none Denotes a PR that doesn't merit a release note. and removed do-not-merge/release-note-label-needed Indicates that a PR should not merge because it's missing one of the release note labels. labels Nov 29, 2017
@ingvagabund
Copy link
Contributor Author

@dchen1107 PTAL

@dims
Copy link
Member

dims commented Dec 1, 2017

/unassign @dims

@derekwaynecarr derekwaynecarr added this to the v1.10 milestone Dec 4, 2017
@derekwaynecarr
Copy link
Member

this looks fine to me.

/lgtm
/approve

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Dec 4, 2017
@derekwaynecarr
Copy link
Member

/approve no-issue

@k8s-github-robot k8s-github-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Dec 4, 2017
@k8s-github-robot
Copy link

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: derekwaynecarr, ingvagabund

Associated issue requirement bypassed by: derekwaynecarr

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these OWNERS Files:

You can indicate your approval by writing /approve in a comment
You can cancel your approval by writing /approve cancel in a comment

@sjenning
Copy link
Contributor

sjenning commented Dec 4, 2017

/retest

@fejta-bot
Copy link

/retest
This bot automatically retries jobs that failed/flaked on approved PRs (send feedback to @fejta).

Review the full test history for this PR.

Copy link
Contributor

@ScorpioCPH ScorpioCPH left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm with minor nit comments :)

@@ -93,6 +97,10 @@ const (
// startKubelet starts the Kubelet in a separate process or returns an error
// if the Kubelet fails to start.
func (e *E2EServices) startKubelet() (*server, error) {
if kubeletContainerized && hyperkubeImage == "" {
return nil, fmt.Errorf("the --hyperkube-image option must be set")
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: the --hyperkube-image option must be set if we run kubelet in a docker container

Copy link
Contributor Author

@ingvagabund ingvagabund Dec 15, 2017

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The error message pops up only when the --containerized flag is set. Later, the --hyperkube-image can point to a container of non-docker container runtime. There is always a space for ambiguity. However, the hyperkube + image connection is currently strongly voting for containerized run, so the confusion will be minimal. But yeah, updating the message would help to make the statement clearer :).

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

SGTM.

@k8s-github-robot
Copy link

/test all [submit-queue is verifying that this PR is safe to merge]

@k8s-ci-robot
Copy link
Contributor

k8s-ci-robot commented Dec 16, 2017

@ingvagabund: The following test failed, say /retest to rerun them all:

Test name Commit Details Rerun command
pull-kubernetes-unit 607e863 link /test pull-kubernetes-unit

Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@k8s-github-robot
Copy link

Automatic merge from submit-queue (batch tested with PRs 56250, 56809, 56812, 56792, 56724). If you want to cherry-pick this change to another branch, please follow the instructions here.

@k8s-github-robot k8s-github-robot merged commit 0a940bf into kubernetes:master Dec 16, 2017
@ingvagabund ingvagabund deleted the extend-node-e2e-test-suite-with-containerized-kubelet branch December 19, 2017 10:52
k8s-github-robot pushed a commit that referenced this pull request Jan 8, 2018
…ntal-on-containerized-kubelet

Automatic merge from submit-queue. If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>.

Containerized kubelet is no longer experimental

Blocked by #56250

Given the node e2e Conformance tests over containerized ``Kubelet`` are already running and are published at https://k8s-testgrid.appspot.com/sig-node-kubelet#kubelet-containerized-conformance-aws-e2e-rhel, we can remove all mentions of the "experimental" keyword.

Are there any other place where the "containerized Kubelet" is mentioned as experimental?
  
```release-note
NONE
```
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. area/test cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. release-note-none Denotes a PR that doesn't merit a release note. sig/node Categorizes an issue or PR as relevant to SIG Node. sig/testing Categorizes an issue or PR as relevant to SIG Testing. size/M Denotes a PR that changes 30-99 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

9 participants