Skip to content

SREP-4053: Register rosa-e2e cluster profile#76494

Open
dustman9000 wants to merge 1 commit intoopenshift:mainfrom
dustman9000:rosa-e2e-cluster-profile
Open

SREP-4053: Register rosa-e2e cluster profile#76494
dustman9000 wants to merge 1 commit intoopenshift:mainfrom
dustman9000:rosa-e2e-cluster-profile

Conversation

@dustman9000
Copy link
Member

@dustman9000 dustman9000 commented Mar 18, 2026

Summary

Register the rosa-e2e cluster profile for dedicated rosa-e2e CI testing.

  • Add rosa-e2e to ci-secret-bootstrap (Vault secret at selfservice/rosa-e2e/)
  • Add rosa-e2e-quota-slice to boskos generator with 3 slots in us-west-2

The Vault secret is already populated with AWS credentials and OCM token.

AWS accounts (managed in app-interface):

  • rosa-e2e-prow-ci-01: 906876220742
  • rosa-e2e-prow-ci-02: 150105759567
  • rosa-e2e-prow-ci-03: 199584041573

All under osd-staging-1 payer, owned by SRE Platform Team.

This profile will be used by the rosa-e2e nightly periodic job (PR #76427).

Jira: https://redhat.atlassian.net/browse/SREP-4053
Fixes: SREP-4053

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Mar 18, 2026
@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Mar 18, 2026

@dustman9000: This pull request references ROSA-683 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the initiative to target the "4.22.0" version, but no target version was set.

Details

In response to this:

Summary

Register the rosa-e2e cluster profile for dedicated rosa-e2e CI testing.

  • Add rosa-e2e to ci-secret-bootstrap (Vault secret at selfservice/rosa-e2e/)
  • Add 3 boskos quota slices in us-west-2 (one per dedicated AWS account)

The Vault secret is already populated with AWS credentials and OCM token.

AWS accounts (managed in app-interface):

  • rosa-e2e-prow-ci-01: 906876220742
  • rosa-e2e-prow-ci-02: 150105759567
  • rosa-e2e-prow-ci-03: 199584041573

All under osd-staging-1 payer, owned by SRE Platform Team.

This profile will be used by the rosa-e2e nightly periodic job (PR #76427).

Jira: https://redhat.atlassian.net/browse/ROSA-683

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot openshift-ci-robot added the rehearsals-ack Signifies that rehearsal jobs have been acknowledged label Mar 18, 2026
Add ci-secret-bootstrap entry for rosa-e2e Vault secret
(selfservice/rosa-e2e/) and boskos quota slices for 3 dedicated
AWS accounts (rosa-e2e-prow-ci-01/02/03) in us-west-2.

These accounts are managed in app-interface under osd-staging-1
payer and are dedicated to the rosa-e2e nightly CI jobs.
@dustman9000 dustman9000 force-pushed the rosa-e2e-cluster-profile branch from 9a274bc to 17ab91b Compare March 18, 2026 23:06
@dustman9000 dustman9000 changed the title ROSA-683: Register rosa-e2e cluster profile SREP-4053: Register rosa-e2e cluster profile Mar 18, 2026
@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Mar 18, 2026

@dustman9000: This pull request references SREP-4053 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the task to target the "4.22.0" version, but no target version was set.

Details

In response to this:

Summary

Register the rosa-e2e cluster profile for dedicated rosa-e2e CI testing.

  • Add rosa-e2e to ci-secret-bootstrap (Vault secret at selfservice/rosa-e2e/)
  • Add rosa-e2e-quota-slice to boskos generator with 3 slots in us-west-2

The Vault secret is already populated with AWS credentials and OCM token.

AWS accounts (managed in app-interface):

  • rosa-e2e-prow-ci-01: 906876220742
  • rosa-e2e-prow-ci-02: 150105759567
  • rosa-e2e-prow-ci-03: 199584041573

All under osd-staging-1 payer, owned by SRE Platform Team.

This profile will be used by the rosa-e2e nightly periodic job (PR #76427).

Jira: https://redhat.atlassian.net/browse/SREP-4053
Fixes: SREP-4053

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

1 similar comment
@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Mar 18, 2026

@dustman9000: This pull request references SREP-4053 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the task to target the "4.22.0" version, but no target version was set.

Details

In response to this:

Summary

Register the rosa-e2e cluster profile for dedicated rosa-e2e CI testing.

  • Add rosa-e2e to ci-secret-bootstrap (Vault secret at selfservice/rosa-e2e/)
  • Add rosa-e2e-quota-slice to boskos generator with 3 slots in us-west-2

The Vault secret is already populated with AWS credentials and OCM token.

AWS accounts (managed in app-interface):

  • rosa-e2e-prow-ci-01: 906876220742
  • rosa-e2e-prow-ci-02: 150105759567
  • rosa-e2e-prow-ci-03: 199584041573

All under osd-staging-1 payer, owned by SRE Platform Team.

This profile will be used by the rosa-e2e nightly periodic job (PR #76427).

Jira: https://redhat.atlassian.net/browse/SREP-4053
Fixes: SREP-4053

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot
Copy link
Contributor

[REHEARSALNOTIFIER]
@dustman9000: no rehearsable tests are affected by this change

Note: If this PR includes changes to step registry files (ci-operator/step-registry/) and you expected jobs to be found, try rebasing your PR onto the base branch. This helps pj-rehearse accurately detect changes when the base branch has moved forward.

Interacting with pj-rehearse

Comment: /pj-rehearse to run up to 5 rehearsals
Comment: /pj-rehearse skip to opt-out of rehearsals
Comment: /pj-rehearse {test-name}, with each test separated by a space, to run one or more specific rehearsals
Comment: /pj-rehearse more to run up to 10 rehearsals
Comment: /pj-rehearse max to run up to 25 rehearsals
Comment: /pj-rehearse auto-ack to run up to 5 rehearsals, and add the rehearsals-ack label on success
Comment: /pj-rehearse list to get an up-to-date list of affected jobs
Comment: /pj-rehearse abort to abort all active rehearsals
Comment: /pj-rehearse network-access-allowed to allow rehearsals of tests that have the restrict_network_access field set to false. This must be executed by an openshift org member who is not the PR author

Once you are satisfied with the results of the rehearsals, comment: /pj-rehearse ack to unblock merge. When the rehearsals-ack label is present on your PR, merge will no longer be blocked by rehearsals.
If you would like the rehearsals-ack label removed, comment: /pj-rehearse reject to re-block merging.

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 18, 2026

@dustman9000: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@bmeng
Copy link
Contributor

bmeng commented Mar 18, 2026

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Mar 18, 2026
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 18, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: bmeng, dustman9000
Once this PR has been reviewed and has the lgtm label, please assign bear-redhat for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged. rehearsals-ack Signifies that rehearsal jobs have been acknowledged

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants