-
Notifications
You must be signed in to change notification settings - Fork 562
OCPEDGE-1512: feat: add dualreplica featuregate #2196
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OCPEDGE-1512: feat: add dualreplica featuregate #2196
Conversation
@eggfoobar: This pull request references OCPEDGE-1512 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.19.0" version, but no target version was set. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
Hello @eggfoobar! Some important instructions when contributing to openshift/api: |
4645129
to
80ff76b
Compare
Skimming this, the generation looks out of date to me, can you try a |
80ff76b
to
b3d1ab0
Compare
Hmm, so I didn't see anything change, I had forgotten to save a test file but other than that, nothing more got altered. The verify-crd-schema is failing but when checking against the
|
This could be an issue with the tooling, but if you check the generated CRDs, your updated enum values are not being applied to the merged schemas, will need to look into this 🤔 |
b3d1ab0
to
9a92c12
Compare
Yeah the way I had the tags was wrong, the tooling syntax parsing for the tags expects the This might be something we might want to alter, since currently enabling one featureSet enables the other, unless using rules validation would be the preferable way to enforce this scenario. Just not sure how that would work since we would need to know the featureSet value. |
I think what you have now will work, but won't let us promote the two features independently. I'll need to look into this because I don't think we've had this scenario before, and the tooling will likely need an update to be able to handle this |
I think that's fine, the two features are similar enough where that shouldn't be a problem. |
Just to clarify your comment @JoelSpeed, Arbiter hits GA before DualReplica, and we remove it from the featureGate tag and just make it a Default, will that be a problem for Arbiter since DualReplica will more than likely stay in TP a release longer? |
That's correct. We need to teach the tooling to be able to understand what to do when one of the gates is enabled, but the other is not, I will try to find some time to look into that problem this week, unless you'd like to? |
Yeah, I can give it a shot, been meaning to become more familiar with the tooling |
9a92c12
to
8475947
Compare
Hey @JoelSpeed got sometime to look at this today. I think this might be a bit more difficult than I had originally thought, or more likely I don't have more context on this pattern. As it currently stands this can behave as expected if, for example, when we go GA with Arbiter by adding it to the Default featureSet, changing this However, if we wish the behavior to be that Ideally, it would be better if we had What do you think, any other avenues come to mind on how to approach this? |
It's hack and hustle this friday, I'll see if I can dig in then. But your analysis is correct. I think the only away around this is to try and work out the combinations, so, if a file exists that matches more gates (ie HighlyAvailable+DualReplica) then it should ignore HighlyAvailable and DualReplica files. Then from the perspective of what does this look like in the API, we would have to have 4 entries The enum for the fone for each of We could then tell it what behaviour we want in each combination, and have the correct promotion behaviour |
8475947
to
7caf83f
Compare
Discussed in slack, added a TODO comment and created a Jira ticket to keep track of the issue discussed here. The |
/lgtm The core changes are what we need, but I'm concerned with the error reported in by the verify-crd-schema job since it doesn't look related. do something need to be regenerated? |
/retest I don't think we can do much more on the |
/override ci/prow/verify-crd-schema Existing failures in a partial CRD manifest |
/override ci/prow/verify-crd-schema Existing failures in a partial CRD manifest |
@JoelSpeed: Overrode contexts on behalf of JoelSpeed: ci/prow/verify-crd-schema In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
add feature gate to support DualReplica control plante topology as a featuregate for two node openshift deployments. added todo to make sure we do not go GA with out resolving the annotation issue. Signed-off-by: ehila <[email protected]>
b7593dd
to
8fb0163
Compare
Dang, got caught by another conflict from anther PR being merged in, rebased. |
/override ci/prow/verify-crd-schema Existing failures in a partial CRD manifest |
@eggfoobar: eggfoobar unauthorized: /override is restricted to Repo administrators, approvers in top level OWNERS file, and the following github teams:openshift: openshift-release-oversight openshift-staff-engineers. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: eggfoobar, jaypoulz, JoelSpeed The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Tried to override since nothing changed and we just needed to update due to conflict from another PR. @jerpeter1 Would you mind overriding verify-crd |
/override ci/prow/verify-crd-schema |
@jerpeter1: Overrode contexts on behalf of jerpeter1: ci/prow/verify-crd-schema In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/retest-required |
/test e2e-aws-ovn-hypershift |
/override ci/prow/verify-crd-schema |
@qJkee: qJkee unauthorized: /override is restricted to Repo administrators, approvers in top level OWNERS file, and the following github teams:openshift: openshift-release-oversight openshift-staff-engineers. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/override ci/prow/verify-crd-schema Existing failures in a partial CRD manifest |
@JoelSpeed: Overrode contexts on behalf of JoelSpeed: ci/prow/verify-crd-schema In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
@eggfoobar: all tests passed! Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
[ART PR BUILD NOTIFIER] Distgit: ose-cluster-config-api |
/payload-job periodic-ci-openshift-release-master-ci-4.19-e2e-gcp-ovn-techpreview-serial Please ignore for now. We are testing some payload failures |
@xueqzhan: trigger 4 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command
See details on https://pr-payload-tests.ci.openshift.org/runs/ci/119f0b60-ff7f-11ef-8cc1-b869ab0caa60-0 |
add feature gate to support DualReplica control plante topology as a featuregate for two node openshift deployments