New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CFE-679: Add user defined tags to the created DNS resources #874
Conversation
Skipping CI for Draft Pull Request. |
/label tide/merge-method-squash |
/cc @Miciah |
/assign |
/remove-label tide/merge-method-squash |
/retest |
/test e2e-aws-ovn-single-node Checking to see if the previous failure was resolved |
/test e2e-gcp-operator |
3d265c5
to
d5e80f1
Compare
/test e2e-gcp-operator |
/assign |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Minor comments; nothing that should block this PR.
/lgtm
/hold
for Candace since she is also assigned as a review.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks pretty good, but I wonder if a privateRecordSet is supposed to be marked as "owned" ?
0b38349
to
4807229
Compare
/test e2e-azure-ovn |
/test e2e-aws-ovn-single-node |
Is this a one-time failure?
/test e2e-azure-operator |
Presuming the test stops failing... |
I think |
/hold cancel |
/approved |
/label px-approved |
/label qe-approved |
/test e2e-azure-operator |
/label docs-approved |
/test e2e-azure-operator |
2 similar comments
/test e2e-azure-operator |
/test e2e-azure-operator |
Asked about today's CI failure in https://redhat-internal.slack.com/archives/CBN38N3MW/p1676645935272899 |
/retest-required |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: candita The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
level=info msg=Cluster operator insights SCAAvailable is False with Forbidden: Failed to pull SCA certs from https://api.openshift.com/api/accounts_mgmt/v1/certificates: OCM API https://api.openshift.com/api/accounts_mgmt/v1/certificates returned HTTP 403: {"code":"ACCT-MGMT-11","href":"/api/accounts_mgmt/v1/errors/11","id":"11","kind":"Error","operation_id":"afa5bc77-b571-4c71-87bd-ce09c3f5e513","reason":"Account with ID 2DUeKzzTD9ngfsQ6YgkzdJn1jA4 denied access to perform create on Certificate with HTTP call POST /api/accounts_mgmt/v1/certificates"} level=error msg=Cluster operator kube-controller-manager Degraded is True with MissingStaticPodController_SyncError::StaticPods_Error: MissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: "kube-controller-manager" in namespace: "openshift-kube-controller-manager" for revision: 6 on node: "ci-op-bg0rzsb7-04a70-gmtcd-master-2" didn't show up, waited: 3m0s |
@bharath-b-rh: all tests passed! Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
Enhancement proposed for Azure tags support in OCP, requires cluster-ingress-operator to add azure userTags available in the status sub resource of infrastructure CR, to the azure DNS resource created.