Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ROX-14696: Add terraforming and probe deployment to acs-stage-eu-01. #848

Merged
merged 5 commits into from
Mar 6, 2023

Conversation

ebensh
Copy link
Collaborator

@ebensh ebensh commented Feb 27, 2023

Description

Adds acs-stage-eu-01 terraforming to the CD pipeline.

https://issues.redhat.com/browse/ROX-14696

Checklist (Definition of Done)

  • Unit and integration tests added
  • Added test description under Test manual
  • Documentation added if necessary (i.e. changes to dev setup, test execution, ...)
  • CI and all relevant tests are passing
  • Add the ticket number to the PR title if available, i.e. ROX-12345: ...
  • Discussed security and business related topics privately. Will move any security and business related topics that arise to private communication channel.

Test manual

I could manually CD the cluster but I want to ensure adding it to CD is a supported way to do the initial bootstrapping. Per https://github.com/stackrox/acs-fleet-manager/blob/main/.github/workflows/deploy-stage.yaml#L5-L8 that means we need to merge to main and fix it if it's broken.

@ebensh ebensh temporarily deployed to development February 27, 2023 11:22 — with GitHub Actions Inactive
@ebensh
Copy link
Collaborator Author

ebensh commented Feb 27, 2023

Current dependencies on/for this PR:

This comment was auto-generated by Graphite.

@ebensh ebensh temporarily deployed to development February 27, 2023 11:31 — with GitHub Actions Inactive
@ebensh ebensh requested a review from porridge February 27, 2023 11:36
Comment on lines 34 to 35
env:
AWS_AUTH_HELPER: none # credentials are populated by the above action
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Perhaps it's possible to move this up a level to prevent repetition? 🤔

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I thought about it - my concern was then that if a single cluster terraform fails, all of them would fail. We want to have set -euo pipefail so that, if I understand it correctly, individual commands inside the terraform script failing would cause an overall failure; but we don't want the overall command to fail if any individual terraform failed.

What are your thoughts?

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Feb 27, 2023

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: ebensh, porridge

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Copy link
Collaborator Author

@ebensh ebensh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm concerned about a higher level problem regarding admin password creation that I will address separately in Slack. This can still be reviewed, but I won't merge until that discussion is done too.

Comment on lines 34 to 35
env:
AWS_AUTH_HELPER: none # credentials are populated by the above action
Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I thought about it - my concern was then that if a single cluster terraform fails, all of them would fail. We want to have set -euo pipefail so that, if I understand it correctly, individual commands inside the terraform script failing would cause an overall failure; but we don't want the overall command to fail if any individual terraform failed.

What are your thoughts?

@ebensh ebensh requested a review from porridge February 27, 2023 11:50
@porridge
Copy link
Collaborator

I thought about it - my concern was then that if a single cluster terraform fails, all of them would fail.

I think we're talking about different things.
I'm just thinking about moving the env block to the parent so that we don't need the same block in 3 places.

@ebensh
Copy link
Collaborator Author

ebensh commented Feb 27, 2023

/retest-required

@ebensh
Copy link
Collaborator Author

ebensh commented Feb 27, 2023

/retest

@openshift-ci openshift-ci bot removed the lgtm label Feb 27, 2023
@ebensh ebensh temporarily deployed to development February 27, 2023 16:16 — with GitHub Actions Inactive
@ebensh ebensh temporarily deployed to development February 27, 2023 16:16 — with GitHub Actions Inactive
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Feb 27, 2023

New changes are detected. LGTM label has been removed.

1 similar comment
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Feb 27, 2023

New changes are detected. LGTM label has been removed.

@@ -29,13 +29,20 @@ jobs:
with:
aws-region: ${{ secrets.AWS_REGION }}
role-to-assume: arn:aws:iam::${{ secrets.AWS_ACCOUNT_ID }}:role/github
- name: Run terraforming on THE stage cluster
- name: Run terraforming on acs-stage-dp-02
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We probably want to run these in sequence and stop after first failure. Not sure if this is possible with matrix.

@ebensh ebensh temporarily deployed to development March 6, 2023 15:15 — with GitHub Actions Inactive
@ebensh ebensh temporarily deployed to development March 6, 2023 15:31 — with GitHub Actions Inactive
@ebensh
Copy link
Collaborator Author

ebensh commented Mar 6, 2023

I'm just thinking about moving the env block to the parent so that we don't need the same block in 3 places.

I've made the change, but it looks less explicit and more magical to me having the env at the top.

@ebensh ebensh merged commit 0b740bb into main Mar 6, 2023
@ebensh ebensh deleted the evan/ROX-14696-cd-terraform-acs-stage-eu-01 branch March 6, 2023 16:30
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants