Skip to content

ci: k8s 1.35 to EKS matrix#44403

Merged
julianwiedmann merged 1 commit intomainfrom
pr/artyop/eks-k8s-1.35
Feb 18, 2026
Merged

ci: k8s 1.35 to EKS matrix#44403
julianwiedmann merged 1 commit intomainfrom
pr/artyop/eks-k8s-1.35

Conversation

@Artyop
Copy link
Copy Markdown
Contributor

@Artyop Artyop commented Feb 17, 2026

Signed-off-by: Antony Reynaud <antony.reynaud@isovalent.com>
@Artyop Artyop requested review from a team as code owners February 17, 2026 13:40
@maintainer-s-little-helper maintainer-s-little-helper bot added the dont-merge/needs-release-note-label The author needs to describe the release impact of these changes. label Feb 17, 2026
@Artyop Artyop added the release-note/misc This PR makes changes that have no direct user impact. label Feb 17, 2026
@maintainer-s-little-helper maintainer-s-little-helper bot removed the dont-merge/needs-release-note-label The author needs to describe the release impact of these changes. label Feb 17, 2026
@Artyop Artyop added area/CI Continuous Integration testing issue or flake dont-merge/needs-release-note-label The author needs to describe the release impact of these changes. labels Feb 17, 2026
@maintainer-s-little-helper maintainer-s-little-helper bot removed the dont-merge/needs-release-note-label The author needs to describe the release impact of these changes. label Feb 17, 2026
@Artyop
Copy link
Copy Markdown
Contributor Author

Artyop commented Feb 17, 2026

/test

@Artyop Artyop added the ready-to-merge This PR has passed all tests and received consensus from code owners to merge. label Feb 17, 2026
Copy link
Copy Markdown
Member

@joestringer joestringer left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we be dropping 1.30 and 1.31 while we're at it? I'm wondering about the number of permutations we end up running for the same tests.

@julianwiedmann julianwiedmann added release-note/ci This PR makes changes to the CI. integration/cloud Related to integration with cloud environments such as AKS, EKS, GKE, etc. and removed release-note/misc This PR makes changes that have no direct user impact. labels Feb 18, 2026
@julianwiedmann
Copy link
Copy Markdown
Member

Should we be dropping 1.30 and 1.31 while we're at it? I'm wondering about the number of permutations we end up running for the same tests.

I see this as a non-blocking comment, which can be addressed separately (but is very valid). Merging this change.

@julianwiedmann julianwiedmann added this pull request to the merge queue Feb 18, 2026
Merged via the queue into main with commit 87fac93 Feb 18, 2026
462 of 467 checks passed
@julianwiedmann julianwiedmann deleted the pr/artyop/eks-k8s-1.35 branch February 18, 2026 07:23
@Artyop
Copy link
Copy Markdown
Contributor Author

Artyop commented Feb 18, 2026

Should we be dropping 1.30 and 1.31 while we're at it? I'm wondering about the number of permutations we end up running for the same tests.

According to https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html extended support by EKS of k8s 1.30 is until july 2026 so that's why I kept it here

@Artyop Artyop added needs-backport/1.17 This PR / issue needs backporting to the v1.17 branch affects/v1.17 This issue affects v1.17 branch needs-backport/1.18 This PR / issue needs backporting to the v1.18 branch affects/v1.18 This issue affects v1.18 branch affects/v1.19 This issue affects v1.19 branch needs-backport/1.19 This PR / issue needs backporting to the v1.19 branch labels Feb 18, 2026
@joestringer
Copy link
Copy Markdown
Member

I see, but also 1.29 is there and we don't test that. I wonder what value are we getting out of extra permutations and whether we should aim for a smaller set of versions that is representational of the full set without requiring more iterations through the tests. For instance we might consider running tests against the oldest supported and the two newest supported. I raise this because the PR here adds a new permutation without removing an old one, so we're increasing the number of tests we run.

The goals of reducing the number of permutations would be to reduce the likelihood of unrelated failures due to running the same tests many times, and also reduction in costs (monetary and otherwise) from additional test runs. If we can get a good sense for coverage with fewer test runs, that's worth considering IMO.

@Artyop
Copy link
Copy Markdown
Contributor Author

Artyop commented Feb 18, 2026

I see, but also 1.29 is there and we don't test that. I wonder what value are we getting out of extra permutations and whether we should aim for a smaller set of versions that is representational of the full set without requiring more iterations through the tests. For instance we might consider running tests against the oldest supported and the two newest supported. I raise this because the PR here adds a new permutation without removing an old one, so we're increasing the number of tests we run.

The goals of reducing the number of permutations would be to reduce the likelihood of unrelated failures due to running the same tests many times, and also reduction in costs (monetary and otherwise) from additional test runs. If we can get a good sense for coverage with fewer test runs, that's worth considering IMO.

Completely agree on the reasons of reducing the number of permutations. My first thought was that keeping the 1.30 should be okay since it's only going to run on the schedule part (once a day IIRC) and not bother all the pull request with it.

If you feel we could part ways with 1.30 & 1.31 without impacting the coverage too much, I'm all for it. After all, if anybody has an issue with a still ongoing version of k8s on EKS that we're not testing on a daily basis, there's always the possibility to open an issue on the repo.

Artyop added a commit that referenced this pull request Feb 18, 2026
Following discussion in #44403
Reduction of the number of k8s versions tested on EKS.

Signed-off-by: Antony Reynaud <antony.reynaud@isovalent.com>
@joestringer
Copy link
Copy Markdown
Member

My first thought was that keeping the 1.30 should be okay since it's only going to run on the schedule part

Ah, TIL. It wasn't obvious to me from the PR that these different versions are targeted differently by other CI jobs. SGTM.

@Artyop
Copy link
Copy Markdown
Contributor Author

Artyop commented Feb 19, 2026

My first thought was that keeping the 1.30 should be okay since it's only going to run on the schedule part

Ah, TIL. It wasn't obvious to me from the PR that these different versions are targeted differently by other CI jobs. SGTM.

IIRC it's the "default" set in the matrix that will be run in the PRs, the other entries are for the scheduled workflows.

github-merge-queue bot pushed a commit that referenced this pull request Feb 19, 2026
Following discussion in #44403
Reduction of the number of k8s versions tested on EKS.

Signed-off-by: Antony Reynaud <antony.reynaud@isovalent.com>
YutaroHayakawa pushed a commit that referenced this pull request Feb 24, 2026
[ upstream commit c407014 ]

Following discussion in #44403
Reduction of the number of k8s versions tested on EKS.

Signed-off-by: Antony Reynaud <antony.reynaud@isovalent.com>
Signed-off-by: Yutaro Hayakawa <yutaro.hayakawa@isovalent.com>
@YutaroHayakawa YutaroHayakawa mentioned this pull request Feb 24, 2026
21 tasks
@YutaroHayakawa YutaroHayakawa added backport-pending/1.19 The backport for Cilium 1.19.x for this PR is in progress. backport/author The backport will be carried out by the author of the PR. and removed needs-backport/1.19 This PR / issue needs backporting to the v1.19 branch labels Feb 24, 2026
@YutaroHayakawa
Copy link
Copy Markdown
Member

@Artyop I marked this as a backport/author as the matrix of the v1.18 and v1.17 are diverged from the main and I'm not certain which parameters should be kept/removed.

fzu-huang pushed a commit to fzu-huang/cilium that referenced this pull request Feb 25, 2026
Following discussion in cilium#44403
Reduction of the number of k8s versions tested on EKS.

Signed-off-by: Antony Reynaud <antony.reynaud@isovalent.com>
@joestringer
Copy link
Copy Markdown
Member

We typically wouldn't backport new platform support to older releases.

github-merge-queue bot pushed a commit that referenced this pull request Mar 2, 2026
[ upstream commit c407014 ]

Following discussion in #44403
Reduction of the number of k8s versions tested on EKS.

Signed-off-by: Antony Reynaud <antony.reynaud@isovalent.com>
Signed-off-by: Yutaro Hayakawa <yutaro.hayakawa@isovalent.com>
@github-actions github-actions bot added backport-done/1.19 The backport for Cilium 1.19.x for this PR is done. and removed backport-pending/1.19 The backport for Cilium 1.19.x for this PR is in progress. labels Mar 2, 2026
javiercardona-work pushed a commit to javiercardona-work/cilium that referenced this pull request Mar 18, 2026
Following discussion in cilium#44403
Reduction of the number of k8s versions tested on EKS.

Signed-off-by: Antony Reynaud <antony.reynaud@isovalent.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

affects/v1.17 This issue affects v1.17 branch affects/v1.18 This issue affects v1.18 branch affects/v1.19 This issue affects v1.19 branch area/CI Continuous Integration testing issue or flake backport/author The backport will be carried out by the author of the PR. backport-done/1.19 The backport for Cilium 1.19.x for this PR is done. integration/cloud Related to integration with cloud environments such as AKS, EKS, GKE, etc. needs-backport/1.17 This PR / issue needs backporting to the v1.17 branch needs-backport/1.18 This PR / issue needs backporting to the v1.18 branch ready-to-merge This PR has passed all tests and received consensus from code owners to merge. release-note/ci This PR makes changes to the CI.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants