Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OCPBUGS-17701: daemon: igmore mounting MCD pod content when target is "/" #3860

Merged
merged 1 commit into from Aug 16, 2023

Conversation

sinnykumari
Copy link
Contributor

@sinnykumari sinnykumari commented Aug 15, 2023

With ReexecuteForTargetRoot, we have already chroot into rootfs. So, we should already have necessary MCD pod content mounted inside the host. This also avoids overriding previously mounted content.

We saw this issue in 4.13 #3812 (comment) . We don't see this issue in usual upgrade case in ci because we upgrade from 4.13 to 4.14 , where both have RHEL 9 baseOS. But I forgot that in EUS upgrade with paused pool, it is likely that OS upgrade will happen from 4.12 (RHEL 8) to 4.14 .

This was anyway I had in mind to cherry-pick to 4.14 but somehow went off the radar.

With ReexecuteForTargetRoot, we have already chroot into rootfs.
So, we should already have necessary MCD pod content mounted inside the host.
This also avoids overriding previously mounted content.
@openshift-ci-robot openshift-ci-robot added jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. jira/invalid-bug Indicates that a referenced Jira bug is invalid for the branch this PR is targeting. labels Aug 15, 2023
@openshift-ci-robot
Copy link
Contributor

@sinnykumari: This pull request references Jira Issue OCPBUGS-17701, which is invalid:

  • expected the bug to target the "4.14.0" version, but no target version was set

Comment /jira refresh to re-evaluate validity if changes to the Jira bug are made, or edit the title of this pull request to link to a different bug.

The bug has been updated to refer to the pull request using the external bug tracker.

In response to this:

With ReexecuteForTargetRoot, we have already chroot into rootfs. So, we should already have necessary MCD pod content mounted inside the host. This also avoids overriding previously mounted content.

We saw this issue in 4.13 #3812 (comment) . We don't see this issue in usual upgrade case in ci because we upgrade from 4.13 to 4.14 , where both have RHEL 9 baseOS. But I forgot that in EUS upgrade with paused pool, it is likely that OS upgrade will happen from 4.12 (RHEL 8) to 4.14 .

This was anyway I had in mind to cherry-pick to 4.14 but somehow went of radar.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci-robot
Copy link
Contributor

@sinnykumari: This pull request references Jira Issue OCPBUGS-17701, which is invalid:

  • expected the bug to target the "4.14.0" version, but no target version was set

Comment /jira refresh to re-evaluate validity if changes to the Jira bug are made, or edit the title of this pull request to link to a different bug.

In response to this:

With ReexecuteForTargetRoot, we have already chroot into rootfs. So, we should already have necessary MCD pod content mounted inside the host. This also avoids overriding previously mounted content.

We saw this issue in 4.13 #3812 (comment) . We don't see this issue in usual upgrade case in ci because we upgrade from 4.13 to 4.14 , where both have RHEL 9 baseOS. But I forgot that in EUS upgrade with paused pool, it is likely that OS upgrade will happen from 4.12 (RHEL 8) to 4.14 .

This was anyway I had in mind to cherry-pick to 4.14 but somehow went off the radar.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@sinnykumari
Copy link
Contributor Author

/jira refresh

@openshift-ci-robot openshift-ci-robot added jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. and removed jira/invalid-bug Indicates that a referenced Jira bug is invalid for the branch this PR is targeting. labels Aug 15, 2023
@openshift-ci-robot
Copy link
Contributor

@sinnykumari: This pull request references Jira Issue OCPBUGS-17701, which is valid. The bug has been moved to the POST state.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.14.0) matches configured target version for branch (4.14.0)
  • bug is in the state New, which is one of the valid states (NEW, ASSIGNED, POST)

Requesting review from QA contact:
/cc @qiowang721

In response to this:

/jira refresh

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Aug 15, 2023
@sinnykumari
Copy link
Contributor Author

This should be good to get reviewed and lgtm
/cc @cgwalters
Putting hold for QE testing
/hold
/cc @rioliu-rh for pre-merge testing

@openshift-ci openshift-ci bot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Aug 15, 2023
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Aug 15, 2023

@sinnykumari: GitHub didn't allow me to request PR reviews from the following users: for, pre-merge, testing.

Note that only openshift members and repo collaborators can review this PR, and authors cannot review their own PRs.

In response to this:

This should be good to get reviewed and lgtm
/cc @cgwalters
Putting hold for QE testing
/hold
/cc @rioliu-rh for pre-merge testing

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@rioliu-rh
Copy link

rioliu-rh commented Aug 16, 2023

installed aws cluster with version 4.12.29
pause worker pool

~ oc patch mcp worker -p '[{ "op": "add", "path": "/spec/paused", "value":  true }]' --type json
machineconfigpool.machineconfiguration.openshift.io/worker patched

~ oc get mcp/worker -o yaml | yq -y '.spec.paused'
true

upgrade cluster to 4.13.9

~ oc adm upgrade --to-image quay.io/openshift-release-dev/ocp-release:4.13.9-x86_64 --force --allow-explicit-upgrade
Requested update to release image quay.io/openshift-release-dev/ocp-release:4.13.9-x86_64

upgrade cluster to 4.14.0-0.ci.test-2023-08-16-002136-ci-ln-tr87ly2-latest

~ oc adm upgrade --to-image registry.build03.ci.openshift.org/ci-ln-tr87ly2/release:latest --force --allow-explicit-upgrade --allow-upgrade-with-warnings
Requested update to release image registry.build03.ci.openshift.org/ci-ln-tr87ly2/release:latest

unpause worker pool, wait for workers to be updated

 ~ oc patch mcp worker -p '[{ "op": "add", "path": "/spec/paused", "value":  false }]' --type json
machineconfigpool.machineconfiguration.openshift.io/worker patched

all workers are updated to 4.14

~ cv
NAME      VERSION                                                   AVAILABLE   PROGRESSING   SINCE   STATUS
version   4.14.0-0.ci.test-2023-08-16-002136-ci-ln-tr87ly2-latest   True        False         43m     Cluster version is 4.14.0-0.ci.test-2023-08-16-002136-ci-ln-tr87ly2-latest

~ mcp worker
NAME     CONFIG                                             UPDATED   UPDATING   DEGRADED   MACHINECOUNT   READYMACHINECOUNT   UPDATEDMACHINECOUNT   DEGRADEDMACHINECOUNT   AGE
worker   rendered-worker-b5624eea6f384e4a7f6b8b8137eb840a   True      False      False      3              3                   3                     0                      3h46m

 ~ co machine-config
NAME             VERSION                                                   AVAILABLE   PROGRESSING   DEGRADED   SINCE   MESSAGE
machine-config   4.14.0-0.ci.test-2023-08-16-002136-ci-ln-tr87ly2-latest   True        False         False      3h46m

~ oc get node -o wide -l node-role.kubernetes.io/worker
NAME                                         STATUS   ROLES    AGE     VERSION           INTERNAL-IP    EXTERNAL-IP   OS-IMAGE                                                       KERNEL-VERSION                 CONTAINER-RUNTIME
ip-10-0-142-62.us-east-2.compute.internal    Ready    worker   3h37m   v1.27.4+4e87926   10.0.142.62    <none>        Red Hat Enterprise Linux CoreOS 414.92.202308151250-0 (Plow)   5.14.0-284.25.1.el9_2.x86_64   cri-o://1.27.1-6.rhaos4.14.gitc2c9f36.el9
ip-10-0-160-128.us-east-2.compute.internal   Ready    worker   3h35m   v1.27.4+4e87926   10.0.160.128   <none>        Red Hat Enterprise Linux CoreOS 414.92.202308151250-0 (Plow)   5.14.0-284.25.1.el9_2.x86_64   cri-o://1.27.1-6.rhaos4.14.gitc2c9f36.el9
ip-10-0-218-182.us-east-2.compute.internal   Ready    worker   3h38m   v1.27.4+4e87926   10.0.218.182   <none>        Red Hat Enterprise Linux CoreOS 414.92.202308151250-0 (Plow)   5.14.0-284.25.1.el9_2.x86_64   cri-o://1.27.1-6.rhaos4.14.gitc2c9f36.el9

@rioliu-rh
Copy link

/label qe-approved
/unhold

@openshift-ci openshift-ci bot added qe-approved Signifies that QE has signed off on this PR and removed do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. labels Aug 16, 2023
@djoshy
Copy link
Contributor

djoshy commented Aug 16, 2023

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Aug 16, 2023
@openshift-ci-robot
Copy link
Contributor

/retest-required

Remaining retests: 0 against base HEAD d471718 and 2 for PR HEAD e5b6468 in total

@cgwalters
Copy link
Member

/lgtm

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Aug 16, 2023

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: cgwalters, djoshy, sinnykumari

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:
  • OWNERS [cgwalters,djoshy,sinnykumari]

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Aug 16, 2023

@sinnykumari: all tests passed!

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@openshift-merge-robot openshift-merge-robot merged commit 4858aa2 into openshift:master Aug 16, 2023
13 checks passed
@openshift-ci-robot
Copy link
Contributor

@sinnykumari: Jira Issue OCPBUGS-17701: All pull requests linked via external trackers have merged:

Jira Issue OCPBUGS-17701 has been moved to the MODIFIED state.

In response to this:

With ReexecuteForTargetRoot, we have already chroot into rootfs. So, we should already have necessary MCD pod content mounted inside the host. This also avoids overriding previously mounted content.

We saw this issue in 4.13 #3812 (comment) . We don't see this issue in usual upgrade case in ci because we upgrade from 4.13 to 4.14 , where both have RHEL 9 baseOS. But I forgot that in EUS upgrade with paused pool, it is likely that OS upgrade will happen from 4.12 (RHEL 8) to 4.14 .

This was anyway I had in mind to cherry-pick to 4.14 but somehow went off the radar.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged. qe-approved Signifies that QE has signed off on this PR
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

6 participants