Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update IPsec e2e test to validate NAT-T encapsulation option #29563

Open
wants to merge 4 commits into
base: master
Choose a base branch
from

Conversation

pperiyasamy
Copy link
Member

This PR updates IPsec E2E to test NAT-T implemented with PR: openshift/cluster-network-operator#2573. Rework on this PR once #29437 is merged.
Note: This requires a new CI lane to test IPsec NAT-T "Always" encapsulation option.

/assign @martinkennelly

When IPsec tests configuring certificates into libreswan nss db for
north south traffic via a machine config, it's rebooting worker nodes
by default which still makes one of the following monitor test to fail.

4 unexpected clusteroperator state transitions during e2e test run.  These did not match any known exceptions, so they cause this test-case to fail:

Jan 15 19:44:18.575 E clusteroperator/kube-storage-version-migrator condition/Available reason/KubeStorageVersionMigrator_Deploying status/False KubeStorageVersionMigratorAvailable: Waiting for Deployment
Jan 15 19:44:18.575 - 5s    E clusteroperator/kube-storage-version-migrator condition/Available reason/KubeStorageVersionMigrator_Deploying status/False KubeStorageVersionMigratorAvailable: Waiting for Deployment
Jan 15 20:06:29.820 E clusteroperator/kube-storage-version-migrator condition/Available reason/KubeStorageVersionMigrator_Deploying status/False KubeStorageVersionMigratorAvailable: Waiting for Deployment
Jan 15 20:06:29.820 - 1s    E clusteroperator/kube-storage-version-migrator condition/Available reason/KubeStorageVersionMigrator_Deploying status/False KubeStorageVersionMigratorAvailable: Waiting for Deployment

2 unwelcome but acceptable clusteroperator state transitions during e2e test run.  These should not happen, but because they are tied to exceptions, the fact that they did happen is not sufficient to cause this test-case to fail:

Jan 15 19:44:24.518 W clusteroperator/kube-storage-version-migrator condition/Available reason/AsExpected status/True All is well (exception: Available=True is the happy case)
Jan 15 20:06:31.725 W clusteroperator/kube-storage-version-migrator condition/Available reason/AsExpected status/True All is well (exception: Available=True is the happy case)

Actually it is not required to reboot the nodes just for configuring
certs on the nss db. Hence adding nod edisruption machine configuration
policy so that nodes are not rebooted while deploying certificates on the
worker nodes.

Signed-off-by: Periyasamy Palanisamy <[email protected]>
(cherry picked from commit a540286)
When IPsec mode are changed across tests within IPsec test suite,
it causes reboot of ovnkube-node daemonset pods, It's expected
workload traffic would fail temporarily until pods are settle down
after IPsec is properly configured in every node's OVN and OvS across
the cluster. So we should not test ipsec mode change in the ipsec
test suite and instead for every ipsec mode, there should be one CI lane,
then in the test corresponding configuration and traffic must be tested.

So this commit removes everything related to IPsec mode changes and having
a single test which can be run from Full and External IPsec mode CI lanes.

Signed-off-by: Periyasamy Palanisamy <[email protected]>
(cherry picked from commit 5db298d)
Signed-off-by: Periyasamy Palanisamy <[email protected]>
@openshift-ci openshift-ci bot requested review from JoelSpeed and knobunc February 25, 2025 14:31
@openshift-ci openshift-ci bot added the vendor-update Touching vendor dir or related files label Feb 25, 2025
Copy link
Contributor

openshift-ci bot commented Feb 25, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: pperiyasamy
Once this PR has been reviewed and has the lgtm label, please assign neisw for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Copy link
Contributor

openshift-ci bot commented Feb 25, 2025

@pperiyasamy: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-aws-ovn-kube-apiserver-rollout e281c3f link false /test e2e-aws-ovn-kube-apiserver-rollout
ci/prow/e2e-gcp-ovn-upgrade e281c3f link true /test e2e-gcp-ovn-upgrade
ci/prow/e2e-aws-ovn-single-node-upgrade e281c3f link false /test e2e-aws-ovn-single-node-upgrade
ci/prow/e2e-aws-ovn-single-node e281c3f link false /test e2e-aws-ovn-single-node
ci/prow/e2e-metal-ipi-ovn e281c3f link false /test e2e-metal-ipi-ovn
ci/prow/okd-scos-e2e-aws-ovn e281c3f link false /test okd-scos-e2e-aws-ovn
ci/prow/e2e-metal-ipi-ovn-kube-apiserver-rollout e281c3f link false /test e2e-metal-ipi-ovn-kube-apiserver-rollout

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
vendor-update Touching vendor dir or related files
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants