Skip to content

workflows: Extend KPR + GKE tests#44406

Merged
pchaigno merged 7 commits intomainfrom
pr/pchaigno/extend-kpr-gke-tests
Feb 18, 2026
Merged

workflows: Extend KPR + GKE tests#44406
pchaigno merged 7 commits intomainfrom
pr/pchaigno/extend-kpr-gke-tests

Conversation

@pchaigno
Copy link
Copy Markdown
Member

@pchaigno pchaigno commented Feb 17, 2026

This pull request extends the Conformance KPR workflow to cover GKE in addition to EKS. As for EKS, several advanced features are also covered with three configs for IPsec encryption, WireGuard encryption, and no encryption. Gateway API coverage will be added in a subsequent pull request (ongoing for EKS).

@pchaigno pchaigno added release-note/ci This PR makes changes to the CI. integration/cloud Related to integration with cloud environments such as AKS, EKS, GKE, etc. area/kpr Anything related to our kube-proxy replacement. labels Feb 17, 2026
@pchaigno pchaigno force-pushed the pr/pchaigno/extend-kpr-gke-tests branch 5 times, most recently from b85d451 to bbaac4f Compare February 17, 2026 18:07
In the context of Conformance KPR, the AKS, GKE, and EKS workflows
are run in the same KPR workflow. We should therefore add a prefix to
the sysdump names to clarify to which job each sysdump belongs.

Signed-off-by: Paul Chaignon <paul.chaignon@gmail.com>
This commit is similar to 726967c ("workflows/eks: Allow multiple
parallel runs from same PR ") but for GKE. Quoting:

> We're now running the EKS workflow multiple times in parallel with
> configs that can be reduced to the same value tuple. This commit adds
> a UID number to the workflow runs so they can be easily
> distinguished. This number can then be used to differentiate the
> cluster names or the concurrency groups.

Signed-off-by: Paul Chaignon <paul.chaignon@gmail.com>
@pchaigno pchaigno force-pushed the pr/pchaigno/extend-kpr-gke-tests branch from 164cdc4 to 3477dc4 Compare February 17, 2026 22:13
In future commits, we will add more complex Helm configs. If we keep
passing them via the matrix directly, it will break the workflow because
the serialized matrix will be too long to be used in filenames.

Instead, let's follow what is done for the EKS workflow and set a single
'ipsec' field in the matrix from which we deduce Helm configs.

Signed-off-by: Paul Chaignon <paul.chaignon@gmail.com>
Coverage for Ingress will be replaced by coverage for Gateway API in a
later pull request. In the meantime, we need to disable it because we
will be disabling KPR in the default setup and Ingress requires KPR.

Signed-off-by: Paul Chaignon <paul.chaignon@gmail.com>
This commit implements the same change as was done for EKS in
caafe28 ("workflows/kpr: Move KPR tests to their own workflow for
EKS"), but for GKE instead.

Signed-off-by: Paul Chaignon <paul.chaignon@gmail.com>
We want to cover a set of advanced features with KPR, including egress
gateway, LRP, and BPF masquerading. This commit enables those under the
common test flag "advanced-features".

Signed-off-by: Paul Chaignon <paul.chaignon@gmail.com>
Both WireGuard and IPsec are covered.

Signed-off-by: Paul Chaignon <paul.chaignon@gmail.com>
@pchaigno pchaigno force-pushed the pr/pchaigno/extend-kpr-gke-tests branch from 3477dc4 to d71f6e4 Compare February 17, 2026 23:39
@pchaigno pchaigno marked this pull request as ready for review February 18, 2026 10:00
@pchaigno pchaigno requested review from a team as code owners February 18, 2026 10:00
@pchaigno pchaigno added this pull request to the merge queue Feb 18, 2026
Merged via the queue into main with commit 3b25b7d Feb 18, 2026
597 of 601 checks passed
@pchaigno pchaigno deleted the pr/pchaigno/extend-kpr-gke-tests branch February 18, 2026 13:11
YutaroHayakawa added a commit that referenced this pull request Feb 27, 2026
The Cilium's cluster name cluster name must be 32 character or less.
With the current naming convention, it will exceed 32 characters in
certain condition (e.g when the workflow is running in the fork that has
a longer name). The change we introduced in #44406 increased the risk
further.

To reduce the risk of exceeding 32 characters, use sha256 hash of the
run identifier part (trimmed down to the 7 character like Git short
hash) for the clusterName.

Signed-off-by: Yutaro Hayakawa <yutaro.hayakawa@isovalent.com>
YutaroHayakawa added a commit that referenced this pull request Mar 2, 2026
The Cilium's cluster name cluster name must be 32 character or less.
With the current naming convention, it will exceed 32 characters in
certain condition (e.g when the workflow is running in the fork that has
a longer name). The change we introduced in #44406 increased the risk
further.

To reduce the risk of exceeding 32 characters, remove repository_owner
and UID from the clusterName. This gives the sufficient entropy to avoid
name collision.

Fixes: #44406

Signed-off-by: Yutaro Hayakawa <yutaro.hayakawa@isovalent.com>
github-merge-queue bot pushed a commit that referenced this pull request Mar 2, 2026
The Cilium's cluster name cluster name must be 32 character or less.
With the current naming convention, it will exceed 32 characters in
certain condition (e.g when the workflow is running in the fork that has
a longer name). The change we introduced in #44406 increased the risk
further.

To reduce the risk of exceeding 32 characters, remove repository_owner
and UID from the clusterName. This gives the sufficient entropy to avoid
name collision.

Fixes: #44406

Signed-off-by: Yutaro Hayakawa <yutaro.hayakawa@isovalent.com>
javiercardona-work pushed a commit to javiercardona-work/cilium that referenced this pull request Mar 18, 2026
The Cilium's cluster name cluster name must be 32 character or less.
With the current naming convention, it will exceed 32 characters in
certain condition (e.g when the workflow is running in the fork that has
a longer name). The change we introduced in cilium#44406 increased the risk
further.

To reduce the risk of exceeding 32 characters, remove repository_owner
and UID from the clusterName. This gives the sufficient entropy to avoid
name collision.

Fixes: cilium#44406

Signed-off-by: Yutaro Hayakawa <yutaro.hayakawa@isovalent.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

area/kpr Anything related to our kube-proxy replacement. integration/cloud Related to integration with cloud environments such as AKS, EKS, GKE, etc. release-note/ci This PR makes changes to the CI.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants