Coder Social home page Coder Social logo

v1.9.0-alpha.2 about sig-release HOT 18 CLOSED

kubernetes avatar kubernetes commented on July 24, 2024
v1.9.0-alpha.2

from sig-release.

Comments (18)

dashpole avatar dashpole commented on July 24, 2024 1

yep, that just finished. I think I am all good

from sig-release.

dashpole avatar dashpole commented on July 24, 2024

I tried anago master --stage, and it got as far as:
Unable to find a green set of test results!

from sig-release.

enisoc avatar enisoc commented on July 24, 2024

@dashpole For now, you can skip the requirement for a green build, since we're just trying to set things up and do a mock run.

In the output before it says Unable to find a green set.., you should see a line containing --buildversion=.... Add this flag when you run anago again. This will tell it to use that build without checking the test results.

from sig-release.

spiffxp avatar spiffxp commented on July 24, 2024

Looking through tests today, I'll update this comment with links to issues as appropriate

https://k8s-testgrid.appspot.com/q/summary/release-master-blocking
release-master-blocking: 29 tabs

  • 11 FAILING
  • 10 FLAKY
  • 8 PASSING

FAILING

  • e2e-gci-gce-slow (triage)
    • kubernetes/kubernetes#54524 [sig-network] Networking Granular Checks: Services [Slow] should function for client IP based session affinity: udp
    • kubernetes/kubernetes#54571 [sig-network] Networking Granular Checks: Services [Slow] should function for client IP based session affinity: http
  • e2e-gci-gke-slow (triage)
    • kubernetes/kubernetes#54524 [sig-network] Networking Granular Checks: Services [Slow] should function for client IP based session affinity: udp
    • kubernetes/kubernetes#54571 [sig-network] Networking Granular Checks: Services [Slow] should function for client IP based session affinity: http
  • e2e-gci-gce-serial (triage)
    • TBD non-passing sorted-by-flake testgrid this has so many flakes it's impossible to get a green run, unsure if this is good candidate for release blocking
    • kubernetes/kubernetes#54574 [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] ReplicaSet Should scale from 1 pod to 3 pods and from 3 to 5
    • kubernetes/kubernetes#54574 [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] Deployment Should scale from 1 pod to 3 pods and from 3 to 5
  • e2e-gci-gke-serial (triage)
    • kubernetes/kubernetes#54574 [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] ReplicaSet Should scale from 1 pod to 3 pods and from 3 to 5
    • kubernetes/kubernetes#54574 [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] Deployment Should scale from 1 pod to 3 pods and from 3 to 5
    • kubernetes/kubernetes#54574 [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] ReplicaSet Should scale from 5 pod to 3 pods and from 3 to 1
    • kubernetes/kubernetes#54574 [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] Deployment Should scale from 5 pod to 3 pods and from 3 to 1
  • e2e-gci-gce-alpha-features (triage)
    • kubernetes/kubernetes#54524 [sig-network] Networking Granular Checks: Services [Slow] should function for client IP based session affinity: udp
    • kubernetes/kubernetes#54571 (almost always fails) [sig-network] Networking Granular Checks: Services [Slow] should function for client IP based session affinity: http
  • e2e-gce-scale-correctness (triage)
    • [sig-network] Services should be able to create an internal type load balancer [Slow]
    • [sig-network] Services should be able to change the type and ports of a service [Slow]
    • [sig-instrumentation] Monitoring should verify monitoring pods and all cluster nodes are available on influxdb using heapster
    • [sig-network] ESIPP [Slow] should only target nodes with endpoints
    • [sig-network] ESIPP [Slow] should work for type=LoadBalancer
    • [sig-network] Firewall rule should have correct firewall rules for e2e cluster
    • (same autoscaling and granular checks test cases as above are failing, unsure if failures are different)
  • soak-gce-test (triage)
    • kubernetes/kubernetes#54575 [sig-apps] Daemon set [Serial] Should adopt existing pods when creating a RollingUpdate DaemonSet regardless of templateGeneration
    • kubernetes/kubernetes#54524 [sig-network] Networking Granular Checks: Services [Slow] should function for client IP based session affinity: udp
  • soak-gce-gci-test (triage)
    • kubernetes/kubernetes#54575 [sig-apps] Daemon set [Serial] Should adopt existing pods when creating a RollingUpdate DaemonSet regardless of templateGeneration
    • kubernetes/kubernetes#54524 [sig-network] Networking Granular Checks: Services [Slow] should function for client IP based session affinity: udp
    • TBD (lots of flaking) [sig-scheduling] SchedulerPredicates *
  • e2e-kubeadm-gce (triage)
    • TBD the whole job has been failing since 10/16

FLAKY

PASSING

from sig-release.

enisoc avatar enisoc commented on July 24, 2024

I forgot to mention in the meeting, but hopefully it's not controversial: I don't think we'll be ready for alpha.2 tomorrow.

As part of my proposed update to the timeline, I moved alpha.2 to next week, Wed, Nov 1.

@dashpole Did you get a chance to retry the anago mock run with explicit --buildversion?

from sig-release.

dashpole avatar dashpole commented on July 24, 2024

I ran it yesterday as I was leaving. I got this error:
anago::build_tree(): Building Kubernetes v1.9.0-alpha.2 on master (detached head):
anago::build_tree(): make release KUBE_DOCKER_IMAGE_TAG=v1.9.0-alpha.2
+++ [1023 17:35:45] Verifying Prerequisites....
+++ [1023 17:35:45] Building Docker image kube-build:build-106b116b95-5-v1.9.1-1
+++ [1023 17:36:47] Creating data container kube-build-data-106b116b95-5-v1.9.1-1
+++ [1023 17:36:48] Syncing sources to container
docker: Error response from daemon: driver failed programming external connectivity on endpoint kube-rsync-106b116b95-5-v1.9.1-1 (6d3997c58db5ecbe9f54f75141e22b359281140ae27d105f1c18b824e843b7c5): iptables failed: iptables --wait -t filter -A DOCKER ! -i docker0 -o docker0 -p tcp -d 172.18.0.2 --dport 8730 -j ACCEPT: iptables: No chain/target/match by that name.
(exit status 1).
!!! [1023 17:36:48] Call tree:
!!! [1023 17:36:48] 1: build/../build/common.sh:654 kube::build::run_build_command_ex(...)
!!! [1023 17:36:48] 2: build/../build/common.sh:710 kube::build::start_rsyncd_container(...)
!!! [1023 17:36:48] 3: build/../build/common.sh:470 kube::build::sync_to_container(...)
!!! [1023 17:36:48] 4: build/release.sh:35 kube::build::build_image(...)
make: *** [release] Error 1
FAILED

from sig-release.

spiffxp avatar spiffxp commented on July 24, 2024

I've seen a few jobs removed from the board, and approved at least one bugfix to help address the situation. However, we still have a number of failing jobs and test cases.

https://k8s-testgrid.appspot.com/q/summary/release-master-blocking - this seems to be in disagreement with the counts I'm seeing below

FAILING

  • gci-gke-slow (triage)
    • TBD No results in the past week
  • gci-gce-serial (triage)
    • TBD non-passing sorted-by-flake testgrid this has so many flakes it's impossible to get a green run, unsure if this is good candidate for release blocking
    • kubernetes/kubernetes#54574 [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] ReplicaSet Should scale from ...
    • TBD [k8s.io] EquivalenceCache [Serial] validates pod anti-affinity works properly when new replica pod is scheduled
    • kubernetes/kubernetes#54575 [sig-apps] Daemon set [Serial] Should adopt existing pods when creating a RollingUpdat DaemonSet regardless of templateGeneration
    • TBD [sig-scheduling] SchedulerPredicates [Serial] validates that NodeAffinity is respected if not matching
    • TBD [sig-scheduling] SchedulerPredicates [Serial] validates that NodeSelector is respected if matching [Conformance]
  • gci-gke-serial (triage)
    • kubernetes/kubernetes#54574 [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] ReplicaSet Should scale from ...
  • gci-gce-alpha-features (triage)
    • kubernetes/kubernetes#54524 [sig-network] Networking Granular Checks: Services [Slow] should function for client IP based session affinity: udp
    • kubernetes/kubernetes#54571 (almost always fails) [sig-network] Networking Granular Checks: Services [Slow] should function for client IP based session affinity: http
  • gce-scale-correctness (triage)
    • kubernetes/kubernetes#54637 [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] ReplicationController light Should scale from ...
    • TBD [sig-network] Services should be able to create an internal type load balancer [Slow]
    • TBD [sig-network] Services should be able to change the type and ports of a service [Slow]
    • TBD [sig-instrumentation] Cluster level logging implemented by Stackdriver should ingest system logs from all nodes
    • TBD [sig-instrumentation] Monitoring should verify monitoring pods and all cluster nodes are available on influxdb using heapster
    • TBD [sig-network] Firewall rule should have correct firewall rules for e2e cluster
    • TBD [sig-network] Services should be able to change the type and ports of a service [Slow]
    • TBD [sig-network] Services should be able to create an internal type load balancer [Slow]
  • gci-gke-reboot (triage)
    • TBD
  • soak-gce-gci (triage)
    • TBD whole job is failing, and just started over since 10-25?

FLAKY

PASSING

from sig-release.

spiffxp avatar spiffxp commented on July 24, 2024

Mostly jobs flipping between PASSING/FLAKY, caught verify failing a bit early

FAILING

  • verify (triage)
  • gci-gke (triage)
  • gci-gce-serial (triage)
    • TBD non-passing sorted-by-flake testgrid this has so many flakes it's impossible to get a green run, unsure if this is good candidate for release blocking
    • kubernetes/kubernetes#54574 [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] ReplicaSet Should scale from ...
    • TBD [k8s.io] EquivalenceCache [Serial] validates pod anti-affinity works properly when new replica pod is scheduled
    • kubernetes/kubernetes#54575 [sig-apps] Daemon set [Serial] Should adopt existing pods when creating a RollingUpdat DaemonSet regardless of templateGeneration
    • TBD [sig-scheduling] SchedulerPredicates [Serial] validates that NodeAffinity is respected if not matching
    • TBD [sig-scheduling] SchedulerPredicates [Serial] validates that NodeSelector is respected if matching [Conformance]
  • gci-gke-serial (triage)
    • kubernetes/kubernetes#54574 [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] ReplicaSet Should scale from ...
  • gci-gce-alpha-features (triage)
    • kubernetes/kubernetes#54524 [sig-network] Networking Granular Checks: Services [Slow] should function for client IP based session affinity: udp
    • kubernetes/kubernetes#54571 (almost always fails) [sig-network] Networking Granular Checks: Services [Slow] should function for client IP based session affinity: http
  • gce-scale-correctness (triage)
    • kubernetes/kubernetes#54637 [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] ReplicationController light Should scale from ...
    • TBD [sig-network] Services should be able to create an internal type load balancer [Slow]
    • TBD [sig-network] Services should be able to change the type and ports of a service [Slow]
    • TBD [sig-instrumentation] Cluster level logging implemented by Stackdriver should ingest system logs from all nodes
    • TBD [sig-instrumentation] Monitoring should verify monitoring pods and all cluster nodes are available on influxdb using heapster
    • TBD [sig-network] Firewall rule should have correct firewall rules for e2e cluster
    • TBD [sig-network] Services should be able to change the type and ports of a service [Slow]
    • TBD [sig-network] Services should be able to create an internal type load balancer [Slow]
    • TBD
  • soak-gce-gci (triage)
    • TBD whole job is failing, and just started over since 10-25?

FLAKY

PASSING

from sig-release.

spiffxp avatar spiffxp commented on July 24, 2024

Some progress, but still more failing jobs than I would like

FAILING

  • gci-gce (triage)
    • TBD
  • gci-gce-serial (triage)
    • TBD non-passing sorted-by-flake testgrid this has so many flakes it's impossible to get a green run, unsure if this is good candidate for release blocking
    • kubernetes/kubernetes#54574 [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] ReplicaSet Should scale from ...
    • TBD [k8s.io] EquivalenceCache [Serial] validates pod anti-affinity works properly when new replica pod is scheduled
    • kubernetes/kubernetes#54575 [sig-apps] Daemon set [Serial] Should adopt existing pods when creating a RollingUpdat DaemonSet regardless of templateGeneration
    • TBD [sig-scheduling] SchedulerPredicates [Serial] validates that NodeAffinity is respected if not matching
    • TBD [sig-scheduling] SchedulerPredicates [Serial] validates that NodeSelector is respected if matching [Conformance]
  • gci-gke-serial (triage)
    • kubernetes/kubernetes#54574 [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] ReplicaSet Should scale from ...
  • gce-scale-correctness (triage)
    • kubernetes/kubernetes#54637 [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] ReplicationController light Should scale from ...
    • TBD [sig-network] Services should be able to create an internal type load balancer [Slow]
    • TBD [sig-network] Services should be able to change the type and ports of a service [Slow]
    • TBD [sig-instrumentation] Cluster level logging implemented by Stackdriver should ingest system logs from all nodes
    • TBD [sig-instrumentation] Monitoring should verify monitoring pods and all cluster nodes are available on influxdb using heapster
    • TBD [sig-network] Firewall rule should have correct firewall rules for e2e cluster
    • TBD [sig-network] Services should be able to change the type and ports of a service [Slow]
    • TBD [sig-network] Services should be able to create an internal type load balancer [Slow]
    • TBD
  • gci-gce-reboot (triage)
    • TBD
  • soak-gce-gci (triage)
    • TBD whole job is failing, and just started over since 10-25?
  • kubeadm-gce (triage)
    • TBD

FLAKY

PASSING

from sig-release.

dashpole avatar dashpole commented on July 24, 2024

got it working. I had to move my docker installation to the larger partition to ensure it had enough disk space.
anago: DONE main on dashpole0 Tue Oct 31 11:31:01 PDT 2017 in 46m6s

from sig-release.

enisoc avatar enisoc commented on July 24, 2024

@dashpole Great, thanks! Did you go all the way through a mock run, or just --stage? Are you good to go for the real, --nomock build tomorrow (Wed Nov 1)?

from sig-release.

dashpole avatar dashpole commented on July 24, 2024

oh, I just did anago master --stage --buildversion=v1.9.0-alpha.1.2001+bd28e6d0eaf9d5

from sig-release.

enisoc avatar enisoc commented on July 24, 2024

@dashpole Just for completeness, can you run it again without --stage? Unless you deleted the staged files, it should skip to the (mock) push phase.

from sig-release.

spiffxp avatar spiffxp commented on July 24, 2024

A lot of movement from PASSING to FLAKY, but I think some of this may be due to a point in time blip in the environment across jobs, not the code

FAILING

  • gci-gce-serial (triage)
    • TBD non-passing sorted-by-flake testgrid this has so many flakes it's impossible to get a green run, unsure if this is good candidate for release blocking
    • kubernetes/kubernetes#54574 [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] ReplicaSet Should scale from ...
    • TBD [k8s.io] EquivalenceCache [Serial] validates pod anti-affinity works properly when new replica pod is scheduled
    • kubernetes/kubernetes#54575 [sig-apps] Daemon set [Serial] Should adopt existing pods when creating a RollingUpdat DaemonSet regardless of templateGeneration
    • TBD [sig-scheduling] SchedulerPredicates [Serial] validates that NodeAffinity is respected if not matching
    • TBD [sig-scheduling] SchedulerPredicates [Serial] validates that NodeSelector is respected if matching [Conformance]
  • gci-gke-serial (triage)
    • kubernetes/kubernetes#54574 [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] [Serial] [Slow] ReplicaSet Should scale from ...
  • gci-gce-alpha-features (triage)
  • gce-scale-correctness (triage)
    • kubernetes/kubernetes#54637 [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: CPU) [sig-autoscaling] ReplicationController light Should scale from ...
    • TBD [sig-network] Services should be able to create an internal type load balancer [Slow]
    • TBD [sig-network] Services should be able to change the type and ports of a service [Slow]
    • TBD [sig-instrumentation] Cluster level logging implemented by Stackdriver should ingest system logs from all nodes
    • TBD [sig-instrumentation] Monitoring should verify monitoring pods and all cluster nodes are available on influxdb using heapster
    • TBD [sig-network] Firewall rule should have correct firewall rules for e2e cluster
    • TBD [sig-network] Services should be able to change the type and ports of a service [Slow]
    • TBD [sig-network] Services should be able to create an internal type load balancer [Slow]
  • soak-gce-gci (triage)
    • TBD whole job is failing, and just started over since 10-25?
  • kubeadm-gce (triage)

FLAKY

PASSING

from sig-release.

enisoc avatar enisoc commented on July 24, 2024

@spiffxp The fix for the DaemonSet issue (kubernetes/kubernetes#54575) has merged, and I've verified it passed in the latest (still in progress) gci-gce-serial build. I considered that the most serious since it manifested as an apiserver crash.

The others are either being actively addressed, or through inaction have now nominated themselves for removal from blocking.

Since the purpose of alphas is to enable other types of testing, I suggest we go ahead with the alpha.2 cut today. Are there any objections?

from sig-release.

spiffxp avatar spiffxp commented on July 24, 2024

No objections here.

We'd be cutting with the following jobs failing, which makes them candidates to be removed from the release-master-blocking list in the future:

  • gci-gce-serial
  • gci-gke-serial
  • gci-gce-alpha-features
  • gce-scale-correctness
  • soak-gce-gci
  • kubeadm-gce

from sig-release.

enisoc avatar enisoc commented on July 24, 2024

@dashpole is going to start the alpha.2 cut now at the following build:

  Job #                      Run #   Build # Time/Status
= ========================== =====   ======= ===========
* build                      #7030   #2092   [09:15 11/01]
* (--buildversion=v1.9.0-alpha.1.2092+444a161d227565)
- test-go                    #11314  #2092   PASSED
- verify-master              #15654  #2092   PASSED
- node-kubelet               #8186   #2092   PASSED
- e2e-gci-gce                #17181  #2092   PASSED
- e2e-gci-gke                #17863  #2092   PASSED
- e2e-kops-aws               #19068  #2092   PASSED
- e2e-gce-gpu                #2118   #2092   PASSED
- e2e-gce-device-plugin-gpu  #952    #2092   PASSED
- e2e-gke-device-plugin-gpu  #443    #2092   PASSED
- e2e-gci-gce-slow           #11657  #2092   PASSED
- e2e-gci-gke-slow           #11909  #2092   PASSED
- e2e-gci-gce-serial         --      --      FAILED
- e2e-gci-gke-serial         --      --      FAILED
- e2e-gci-gce-alpha-features --      --      FAILED
- e2e-gci-gce-audit          #3761   #2092   PASSED
- e2e-gci-gce-scalability    No Good Runs    SKIPPING
- e2e-gce-scale-correctness  No Good Runs    SKIPPING
- e2e-gce-scale-performance  --      --      FAILED
- e2e-gci-gce-ingress        #13889  #2092   PASSED
- e2e-gci-gke-ingress        #16128  #2092   PASSED
- e2e-gci-gce-reboot         #16975  #2092   PASSED
- e2e-gci-gke-reboot         #9644   #2092   PASSED
- soak-gce-gci               No Good Runs    SKIPPING
- e2e-kubeadm-gce            --      --      FAILED

from sig-release.

enisoc avatar enisoc commented on July 24, 2024

v1.9.0-alpha.2 is out!

https://github.com/kubernetes/kubernetes/releases/tag/v1.9.0-alpha.2

from sig-release.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.