Bug 1820434: OpenStack: Allow Booting bootstrap node from volume#3434
Bug 1820434: OpenStack: Allow Booting bootstrap node from volume#3434openshift-merge-robot merged 2 commits intoopenshift:masterfrom
Conversation
|
@mandre: This pull request references Bugzilla bug 1820434, which is valid. The bug has been moved to the POST state. The bug has been updated to refer to the pull request using the external bug tracker. 3 validation(s) were run on this bug
DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/approve |
|
/lgtm |
|
/hold |
I do not think we need docs around this. The boostrap node is ephemeral and we don't really care how it's provisioned or how it works, as long as it works - it's a black box. This patch makes it work in environment where you're not allowed to provision VMs with ephemeral disks, by following the settings from the control plane machine pool. I believe this is the expected behavior since we're already using the flavor and security groups from the control plane for the bootstrap node. |
4605be5 to
8471bd8
Compare
|
/test e2e-openstack |
1 similar comment
|
/test e2e-openstack |
Some OpenStack environments might enforce a policy where VMs can't boot with ephemeral disks and need to boot from a cinder volume. In these cases, it would be impossible to install OCP because even though we configured the master and worker nodes to boot from volume using the `rootVolume` setting, the bootstrap node would still boot from ephemeral disk. With this change, the bootstrap node follows the `rootVolume` settings from controlPlane machine pool. This shouldn't be a surprising behavior since the bootstrap node is already using the same flavor and security groups as the control plane nodes.
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: pierreprinetti The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
/lgtm |
|
/test e2e-openstack |
|
@mandre: The following test failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
|
/test e2e-openstack |
|
/hold cancel |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
@mandre: All pull requests linked via external trackers have merged: openshift/installer#3434. Bugzilla bug 1820434 has been moved to the MODIFIED state. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/cherry-pick release-4.4 |
|
@pierreprinetti: #3434 failed to apply on top of branch "release-4.4": DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Some OpenStack environments might enforce a policy where VMs can't boot
with ephemeral disks and need to boot from a cinder volume. In these
cases, it would be impossible to install OCP because even though we
configured the master and worker nodes to boot from volume using the
rootVolumesetting, the bootstrap node would still boot fromephemeral disk.
With this change, the bootstrap node follows the
rootVolumesettingsfrom controlPlane machine pool. This shouldn't be a surprising behavior
since the bootstrap node is already using the same flavor and security
groups as the control plane nodes.