Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OCPBUGS-50849: add RHEL variant to IsEL() check #4856

Merged
merged 2 commits into from
Feb 25, 2025

Conversation

djoshy
Copy link
Contributor

@djoshy djoshy commented Feb 14, 2025

- What I did
Added an additional case for the isEL() check to account for the changes in /etc/os-release from RHCOS layers EP. Some more context here: openshift/enhancements#1755

- How to verify it
The test listed in the bug, periodic-ci-openshift-openshift-tests-private-release-4.19-multi-nightly-gcp-ipi-ovn-ipsec-arm-mixarch-f14 should succeed. I don't think there is a way to directly run it from this PR, so @sergiordlr will be doing this test manually via the QE private deck.

@openshift-ci-robot openshift-ci-robot added jira/severity-important Referenced Jira bug's severity is important for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. labels Feb 14, 2025
@openshift-ci-robot
Copy link
Contributor

@djoshy: This pull request references Jira Issue OCPBUGS-50849, which is valid. The bug has been moved to the POST state.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.19.0) matches configured target version for branch (4.19.0)
  • bug is in the state New, which is one of the valid states (NEW, ASSIGNED, POST)

Requesting review from QA contact:
/cc @huiran0826

The bug has been updated to refer to the pull request using the external bug tracker.

In response to this:

- What I did

- How to verify it

- Description for the changelog

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Feb 14, 2025
@djoshy djoshy force-pushed the rhel-extensions-fix branch from a15f161 to 4061297 Compare February 14, 2025 20:23
@djoshy
Copy link
Contributor Author

djoshy commented Feb 18, 2025

/test all

@djoshy
Copy link
Contributor Author

djoshy commented Feb 18, 2025

/periodic-job ?

@djoshy
Copy link
Contributor Author

djoshy commented Feb 18, 2025

/payload-job ?

Copy link
Contributor

openshift-ci bot commented Feb 18, 2025

@djoshy: it appears that you have attempted to use some version of the payload command, but your comment was incorrectly formatted and cannot be acted upon. See the docs for usage info.

@djoshy
Copy link
Contributor Author

djoshy commented Feb 18, 2025

/label acknowledge-critical-fixes-only

This could potentially be a blocking issue for 4.19 as it breaks ipsec extension installation

@openshift-ci openshift-ci bot added the acknowledge-critical-fixes-only Indicates if the issuer of the label is OK with the policy. label Feb 18, 2025
@djoshy
Copy link
Contributor Author

djoshy commented Feb 18, 2025

/testwith openshift/origin/master/e2e-aws-ovn-ipsec-serial

@djoshy
Copy link
Contributor Author

djoshy commented Feb 18, 2025

/test openshift/origin/master/e2e-aws-ovn-ipsec-serial

Copy link
Contributor

openshift-ci bot commented Feb 18, 2025

@djoshy: The specified target(s) for /test were not found.
The following commands are available to trigger required jobs:

/test 4.12-upgrade-from-stable-4.11-images
/test cluster-bootimages
/test e2e-aws-ovn
/test e2e-aws-ovn-upgrade
/test e2e-gcp-op
/test e2e-gcp-op-single-node
/test e2e-hypershift
/test images
/test unit
/test verify

The following commands are available to trigger optional jobs:

/test 4.12-upgrade-from-stable-4.11-e2e-aws-ovn-upgrade
/test bootstrap-unit
/test e2e-agent-compact-ipv4
/test e2e-aws-disruptive
/test e2e-aws-ovn-fips
/test e2e-aws-ovn-fips-op
/test e2e-aws-ovn-ocb-techpreview
/test e2e-aws-ovn-upgrade-ocb-techpreview
/test e2e-aws-ovn-upgrade-out-of-change
/test e2e-aws-ovn-workers-rhel8
/test e2e-aws-proxy
/test e2e-aws-serial
/test e2e-aws-single-node
/test e2e-aws-upgrade-single-node
/test e2e-aws-workers-rhel8
/test e2e-azure
/test e2e-azure-ovn-upgrade
/test e2e-azure-ovn-upgrade-out-of-change
/test e2e-azure-upgrade
/test e2e-gcp-op-ocl
/test e2e-gcp-op-techpreview
/test e2e-gcp-ovn-rt-upgrade
/test e2e-gcp-rt
/test e2e-gcp-rt-op
/test e2e-gcp-single-node
/test e2e-gcp-upgrade
/test e2e-metal-assisted
/test e2e-metal-ipi-ovn-dualstack
/test e2e-metal-ipi-ovn-ipv6
/test e2e-openstack
/test e2e-openstack-dualstack
/test e2e-openstack-externallb
/test e2e-openstack-hypershift
/test e2e-openstack-parallel
/test e2e-openstack-singlestackv6
/test e2e-ovirt
/test e2e-ovirt-upgrade
/test e2e-ovn-step-registry
/test e2e-vsphere
/test e2e-vsphere-ovn-upi
/test e2e-vsphere-ovn-upi-zones
/test e2e-vsphere-ovn-zones
/test e2e-vsphere-upgrade
/test okd-e2e-aws
/test okd-e2e-gcp-op
/test okd-e2e-upgrade
/test okd-e2e-vsphere
/test okd-images
/test okd-scos-e2e-aws-ovn
/test okd-scos-images
/test security

Use /test all to run the following jobs that were automatically triggered:

pull-ci-openshift-machine-config-operator-master-bootstrap-unit
pull-ci-openshift-machine-config-operator-master-e2e-agent-compact-ipv4
pull-ci-openshift-machine-config-operator-master-e2e-aws-ovn
pull-ci-openshift-machine-config-operator-master-e2e-aws-ovn-upgrade
pull-ci-openshift-machine-config-operator-master-e2e-aws-ovn-upgrade-out-of-change
pull-ci-openshift-machine-config-operator-master-e2e-azure-ovn-upgrade-out-of-change
pull-ci-openshift-machine-config-operator-master-e2e-gcp-op
pull-ci-openshift-machine-config-operator-master-e2e-gcp-op-ocl
pull-ci-openshift-machine-config-operator-master-e2e-gcp-op-single-node
pull-ci-openshift-machine-config-operator-master-e2e-gcp-op-techpreview
pull-ci-openshift-machine-config-operator-master-e2e-hypershift
pull-ci-openshift-machine-config-operator-master-e2e-vsphere-ovn-upi
pull-ci-openshift-machine-config-operator-master-e2e-vsphere-ovn-upi-zones
pull-ci-openshift-machine-config-operator-master-e2e-vsphere-ovn-zones
pull-ci-openshift-machine-config-operator-master-images
pull-ci-openshift-machine-config-operator-master-okd-scos-e2e-aws-ovn
pull-ci-openshift-machine-config-operator-master-security
pull-ci-openshift-machine-config-operator-master-unit
pull-ci-openshift-machine-config-operator-master-verify

In response to this:

/test openshift/origin/master/e2e-aws-ovn-ipsec-serial

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@isabella-janssen
Copy link
Member

/lgtm

/hold
holding for qe

@openshift-ci openshift-ci bot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Feb 18, 2025
@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Feb 18, 2025
@@ -1784,7 +1784,7 @@ func (dn *CoreOSDaemon) applyExtensions(oldConfig, newConfig *mcfgv1.MachineConf
// Right now it supports default (traditional), realtime kernel and 64k pages kernel
func (dn *CoreOSDaemon) switchKernel(oldConfig, newConfig *mcfgv1.MachineConfig) error {
// We support Kernel update only on RHCOS and SCOS nodes
if !dn.os.IsEL() {
if !dn.os.IsCoreOSVariant() {
Copy link
Contributor

@yuqi-zhang yuqi-zhang Feb 19, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think at least for some of these (based on the comments) we want to exclude FCOS from running these (although I suppose you really shouldn't be trying to switch kernel on FCOS so it's probably fine to relax the checks on our end).

Thinking through the now possible cases based on openshift/enhancements#1755:

  1. RHEL 9.6 (now)
  2. RHCOS 9.x (old)
  3. RHCOS 8.x (bootimage only)
  4. SCOS
  5. FCOS
  6. RHEL workers (I suppose we're still doing RHEL 9 workers?)

Then we'd want this to work for 1-4. So basically:

  1. if os.variantID == coreos, this can be 1/2/4/5, so we'd want to filter out 5
  2. if os.id == rhcos || os.id == scos, this can be 2/3/4, so we're missing 1
  3. if os.id == rhel, this can be 1/6 so we'd want to filter out 6

With that in mind maybe the easiest way is to add a conditional check for 3, i.e. os.id==rhcos || (os.id==rhel && os.variantID == coreos) as a new check?

Please correct me if I'm overcomplicating, just thinking out loud

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Updated as per discussion on call 👍

@djoshy djoshy force-pushed the rhel-extensions-fix branch from 4061297 to 0636873 Compare February 19, 2025 15:06
@openshift-ci openshift-ci bot removed the lgtm Indicates that a PR is ready to be merged. label Feb 19, 2025
@openshift-ci-robot openshift-ci-robot added jira/severity-critical Referenced Jira bug's severity is critical for the branch this PR is targeting. and removed jira/severity-important Referenced Jira bug's severity is important for the branch this PR is targeting. labels Feb 19, 2025
@openshift-ci-robot
Copy link
Contributor

@djoshy: This pull request references Jira Issue OCPBUGS-50849, which is valid.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.19.0) matches configured target version for branch (4.19.0)
  • bug is in the state POST, which is one of the valid states (NEW, ASSIGNED, POST)

Requesting review from QA contact:
/cc @sergiordlr

In response to this:

- What I did
Added an additional case for the isEL() check to account for the changes in /etc/os-release from RHCOS layers EP. Some more context here: openshift/enhancements#1755

- How to verify it
The test listed in the bug, periodic-ci-openshift-openshift-tests-private-release-4.19-multi-nightly-gcp-ipi-ovn-ipsec-arm-mixarch-f14 should succeed. I don't think there is a way to directly run it from this PR, so @sergiordlr will be doing this test manually via the QE private deck.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci openshift-ci bot requested a review from sergiordlr February 19, 2025 15:33
@sergiordlr
Copy link

Verifying the fix using these jobs

https://qe-private-deck-ci.apps.ci.l2s4.p1.openshiftapps.com/view/gs/qe-private-deck/logs/periodic-ci-openshift-openshift-tests-private-release-4.19-amd64-nightly-ibmcloud-ipi-ovn-ipsec-f28/1892251333352755200

https://qe-private-deck-ci.apps.ci.l2s4.p1.openshiftapps.com/view/gs/qe-private-deck/logs/periodic-ci-openshift-openshift-tests-private-release-4.19-amd64-nightly-gcp-ipi-ovn-ipsec-f28-destructive-ota/1892251420585889792

Copy link
Contributor

@yuqi-zhang yuqi-zhang left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm
/hold

Holding since the referenced QE jobs are failing, although it doesn't seem MCO related. Will let @sergiordlr unhold when ready

@pperiyasamy
Copy link
Member

@djoshy The CI testing is still failing with this PR https://github.com/openshift/cluster-network-operator/pull/2649/checks?check_run_id=37539542021, PTAL.

@openshift-ci openshift-ci bot removed the lgtm Indicates that a PR is ready to be merged. label Feb 20, 2025
@djoshy
Copy link
Contributor Author

djoshy commented Feb 20, 2025

@djoshy The CI testing is still failing with this PR https://github.com/openshift/cluster-network-operator/pull/2649/checks?check_run_id=37539542021, PTAL.

Took a look at the logs there and it seems like 2 of the nodes made it, but 1 didn't. Strange. I'm going to kick off another run with some more debug logs.

@djoshy djoshy force-pushed the rhel-extensions-fix branch from b94cb8e to 40131c0 Compare February 20, 2025 20:03
@djoshy
Copy link
Contributor Author

djoshy commented Feb 20, 2025

Last couple runs were green on installs, but I think we just got lucky since all worker nodes went through 2 MC changes. Rerunning with the a slight change to the log message so it'll always write to the journal

@djoshy djoshy force-pushed the rhel-extensions-fix branch from 40131c0 to 206ae22 Compare February 24, 2025 13:10
@djoshy djoshy force-pushed the rhel-extensions-fix branch from 206ae22 to 1169e57 Compare February 24, 2025 17:31
@djoshy
Copy link
Contributor Author

djoshy commented Feb 24, 2025

I might be losing my mind here, but it seems like testwith does some kind of strange merge that is overwriting my changes. None of my debug logs are showing up. I'm going to rebase this PR on our master to see if it helps, but so far none of my debug logs have shown up, which makes me think something else is happening with the double PR runs.

@djoshy
Copy link
Contributor Author

djoshy commented Feb 24, 2025

/unhold

@openshift-ci openshift-ci bot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Feb 24, 2025
@isabella-janssen
Copy link
Member

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Feb 24, 2025
Copy link
Contributor

openshift-ci bot commented Feb 24, 2025

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: djoshy, isabella-janssen, yuqi-zhang

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:
  • OWNERS [djoshy,isabella-janssen,yuqi-zhang]

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@djoshy
Copy link
Contributor Author

djoshy commented Feb 24, 2025

I'm still unable to see the debug log on the /testwith PR, so we're going to try to merge this since it should be a safe change and test directly on openshift/cluster-network-operator#2649

Copy link
Contributor

openshift-ci bot commented Feb 25, 2025

@djoshy: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-azure-ovn-upgrade-out-of-change 1169e57 link false /test e2e-azure-ovn-upgrade-out-of-change
ci/prow/okd-scos-e2e-aws-ovn 1169e57 link false /test okd-scos-e2e-aws-ovn
ci/prow/e2e-gcp-op-ocl 1169e57 link false /test e2e-gcp-op-ocl

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@openshift-merge-bot openshift-merge-bot bot merged commit 1b3974b into openshift:master Feb 25, 2025
17 of 20 checks passed
@openshift-ci-robot
Copy link
Contributor

@djoshy: Jira Issue OCPBUGS-50849: All pull requests linked via external trackers have merged:

Jira Issue OCPBUGS-50849 has been moved to the MODIFIED state.

In response to this:

- What I did
Added an additional case for the isEL() check to account for the changes in /etc/os-release from RHCOS layers EP. Some more context here: openshift/enhancements#1755

- How to verify it
The test listed in the bug, periodic-ci-openshift-openshift-tests-private-release-4.19-multi-nightly-gcp-ipi-ovn-ipsec-arm-mixarch-f14 should succeed. I don't think there is a way to directly run it from this PR, so @sergiordlr will be doing this test manually via the QE private deck.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-bot
Copy link
Contributor

[ART PR BUILD NOTIFIER]

Distgit: ose-machine-config-operator
This PR has been included in build ose-machine-config-operator-container-v4.19.0-202502250909.p0.g1b3974b.assembly.stream.el9.
All builds following this will include this PR.

@djoshy djoshy deleted the rhel-extensions-fix branch February 26, 2025 14:03
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
acknowledge-critical-fixes-only Indicates if the issuer of the label is OK with the policy. approved Indicates a PR has been approved by an approver from all required OWNERS files. jira/severity-critical Referenced Jira bug's severity is critical for the branch this PR is targeting. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants