Skip to content
This repository has been archived by the owner on Jan 11, 2023. It is now read-only.

openshift: record etcd logs in test runs #2996

Merged
merged 1 commit into from
May 25, 2018

Conversation

jim-minter
Copy link
Member

No description provided.

@jim-minter
Copy link
Member Author

@Kargakis @pweil- ptal

}
master := fmt.Sprintf("%s@%s", eng.ClusterDefinition.Properties.LinuxProfile.AdminUsername, kubeConfig.GetServerName())

services := []string{"etcd.service"}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Soon this will run as a pod. Can you try to separate the logic based on the orchestrator version?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Follow-up.

@jim-minter
Copy link
Member Author

@CecileRobertMichon please merge

@0xmichalis
Copy link
Contributor

/lgtm

We should retrieve logs from the rest of the control plane in a follow-up. I am also looking into deploying all of our components with increased log verbosity as part of the e2e test deployment.

@acs-bot
Copy link

acs-bot commented May 21, 2018

@Kargakis: changing LGTM is restricted to assignees, and only Azure org members may be assigned issues.

In response to this:

/lgtm

We should retrieve logs from the rest of the control plane in a follow-up. I am also looking into deploying all of our components with increased log verbosity as part of the e2e test deployment.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@@ -45,5 +45,9 @@ func GetConfig() (*Config, error) {
// GetServerName returns the server for the given config in an sshable format
func (c *Config) GetServerName() string {
s := c.Clusters[0].ClusterInfo.Server
return strings.Split(s, "://")[1]
s = strings.Split(s, "://")[1]
if strings.ContainsRune(s, ':') {
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

should this not be a parsable URL?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

updated...

@jim-minter
Copy link
Member Author

We should retrieve logs from the rest of the control plane in a follow-up. I am also looking into deploying all of our components with increased log verbosity as part of the e2e test deployment.

@Kargakis unclear if you want me to open an issue or if you're working on it already?

@0xmichalis
Copy link
Contributor

@Kargakis unclear if you want me to open an issue or if you're working on it already?

Working on bumping the loglevel now, once this PR merges I will work on getting logs from the rest of the services.

@codecov
Copy link

codecov bot commented May 21, 2018

Codecov Report

Merging #2996 into master will decrease coverage by 0.84%.
The diff coverage is n/a.

Impacted file tree graph

@@            Coverage Diff             @@
##           master    #2996      +/-   ##
==========================================
- Coverage   51.59%   50.75%   -0.85%     
==========================================
  Files          97       97              
  Lines       14834    14682     -152     
==========================================
- Hits         7654     7452     -202     
- Misses       6482     6533      +51     
+ Partials      698      697       -1
Impacted Files Coverage Δ
cmd/orchestrators.go 31.81% <0%> (-45.46%) ⬇️
cmd/deploy.go 24.46% <0%> (-18.02%) ⬇️
cmd/generate.go 32.38% <0%> (-15.24%) ⬇️
cmd/scale.go 0% <0%> (-12.93%) ⬇️
pkg/api/v20170131/validate.go 34.23% <0%> (-1.96%) ⬇️
pkg/api/agentPoolOnlyApi/v20180331/validate.go 64.15% <0%> (-0.82%) ⬇️
pkg/operations/kubernetesupgrade/upgrader.go 57.5% <0%> (-0.53%) ⬇️
pkg/api/v20170701/validate.go 28.91% <0%> (-0.36%) ⬇️
pkg/api/vlabs/validate.go 45.88% <0%> (-0.1%) ⬇️
pkg/api/agentPoolOnlyApi/vlabs/validate.go 2.12% <0%> (-0.05%) ⬇️
... and 11 more

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update ea0dfd4...1bd6970. Read the comment docs.

@jim-minter
Copy link
Member Author

@CecileRobertMichon please merge

Copy link
Contributor

@CecileRobertMichon CecileRobertMichon left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

@CecileRobertMichon
Copy link
Contributor

/approve

@acs-bot
Copy link

acs-bot commented May 21, 2018

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: CecileRobertMichon

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@0xmichalis
Copy link
Contributor

$ kubectl config view -o json
panic: runtime error: index out of range

goroutine 1 [running]:
github.com/Azure/acs-engine/test/e2e/kubernetes.(*Config).GetServerName(0xc4203400c0, 0x0, 0x0)
	/go/src/github.com/Azure/acs-engine/test/e2e/kubernetes/config.go:48 +0x1af
github.com/Azure/acs-engine/test/e2e/runner.(*CLIProvisioner).FetchOpenShiftMachineLogs(0xc4200ec750, 0xc420197720, 0xc420341140, 0xc420300000, 0x5a, 0xc4202ba060, 0x30)
	/go/src/github.com/Azure/acs-engine/test/e2e/runner/cli_provisioner.go:341 +0x77
main.teardown()
	/go/src/github.com/Azure/acs-engine/test/e2e/runner.go:204 +0x717
main.main()
	/go/src/github.com/Azure/acs-engine/test/e2e/runner.go:118 +0x6df
exit status 2
test.mk:32: recipe for target 'test-openshift' failed

@jim-minter
Copy link
Member Author

@Kargakis: thanks for the catch - updated

@0xmichalis
Copy link
Contributor

lgtm, @CecileRobertMichon please merge

@0xmichalis
Copy link
Contributor

/lgtm

@acs-bot
Copy link

acs-bot commented May 25, 2018

@Kargakis: adding LGTM is restricted to approvers and reviewers in OWNERS files.

In response to this:

/lgtm

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@0xmichalis
Copy link
Contributor

/lgtm

@acs-bot
Copy link

acs-bot commented May 25, 2018

@Kargakis: adding LGTM is restricted to approvers and reviewers in OWNERS files.

In response to this:

/lgtm

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@0xmichalis
Copy link
Contributor

@acs-bot I keep forgetting

@CecileRobertMichon ping

@CecileRobertMichon
Copy link
Contributor

@jim-minter @Kargakis I restarted the openshift e2e twice and have not been able to get a single successful.I would like to get at least one e2e run since this PR is changing the test itself. It might be worth considering disabling the test until it is more reliable since there is little in a test that is red more often than it is green what do you think?

@jim-minter
Copy link
Member Author

Hey @CecileRobertMichon we're also frustrated by the testing situation. Two issues are that we're spread thin right now, and that we also don't have all the gating we need in place upstream on the origin and openshift-ansible repos so we're perpetually chasing breaks there. My personal preference is to leave the tests here enabled and red rather than disabled - we will get to the flakes and get them green.

@CecileRobertMichon CecileRobertMichon merged commit 9cd6ae1 into Azure:master May 25, 2018
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants