-
Notifications
You must be signed in to change notification settings - Fork 4.8k
CORENET-5668: Update IPsec e2e test to validate NAT-T encapsulation option #29563
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
/lgtm I assume you need another PR in release for the lanes? |
|
which job here executes the ipsec code? I want to have a look at the logs. |
|
/hold Want to see the e2e logs. |
|
/test e2e-aws-ovn-ipsec-serial |
yes @martinkennelly , we need another CI lane to test nat-t changes. you can currently look at e2e-aws-ovn-ipsec-serial lane (https://prow.ci.openshift.org/job-history/gs/test-platform-results/pr-logs/directory/pull-ci-openshift-origin-main-e2e-aws-ovn-ipsec-serial) for ipsec test results. |
|
@pperiyasamy: This pull request references CORENET-5668 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.19.0" version, but no target version was set. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
why do you need another lane just for nat-t? cant you include it in the existing ipsec lane? |
|
/test e2e-aws-ovn-ipsec-serial infra failure @pperiyasamy above you said this test needed a new lane but i see you also testing ipsec serial ? where can i see this test your adding? |
when we try to enable nat-t in the existing ipsec lane, then there will another rollout of ovnkube-node deployment which introduce network disturbance for EW traffic during rollout, monitor events would show up again. |
@martinkennelly The failure in the run is being fixed with the bug https://issues.redhat.com/browse/OCPBUGS-54295 and we discussed about it with nmstate team (https://redhat-internal.slack.com/archives/CP7329Z5Z/p1744011607371099). |
|
Job Failure Risk Analysis for sha: e03cab7
Risk analysis has seen new tests most likely introduced by this PR. New Test Risks for sha: e03cab7
New tests seen in this PR at sha: e03cab7
|
b2b8fe2 to
db7ea4a
Compare
|
/test e2e-aws-ovn-ipsec-serial |
1 similar comment
|
/test e2e-aws-ovn-ipsec-serial |
|
/retest-required |
|
/unhold |
|
/approve |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: dgoodwin, martinkennelly, pperiyasamy The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
/retest-required |
1 similar comment
|
/hold Revision 6c4a40a was retested 3 times: holding |
|
/hold cancel |
|
/retest-required |
|
@pperiyasamy: The following tests failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
2969e75
into
openshift:main
|
/cherry-pick release-4.19 |
|
@pperiyasamy: new pull request created: #29944 In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
This PR updates IPsec E2E to test NAT-T implemented with PR: openshift/cluster-network-operator#2573.
Note: This requires a new CI lane to test IPsec NAT-T "Always" encapsulation option.
This PR also adds an e2e tests to ensure ovnk managed pod traffic (EW traffic) is always working across nodes when
ovn-ipsec-hostdaemonset goes for multiple reboots./assign @martinkennelly