Skip to content

move images from gcr.io to quay.io#79390

Merged
k8s-ci-robot merged 2 commits intokubernetes:masterfrom
coffeepac:move-es-fd-to-quay
Jun 28, 2019
Merged

move images from gcr.io to quay.io#79390
k8s-ci-robot merged 2 commits intokubernetes:masterfrom
coffeepac:move-es-fd-to-quay

Conversation

@coffeepac
Copy link
Copy Markdown
Contributor

@coffeepac coffeepac commented Jun 25, 2019

What type of PR is this?

Uncomment only one /kind <> line, hit enter to put that in a new line, and remove leading whitespaces from that line:

/kind api-change
/kind bug
/kind cleanup
/kind design
/kind documentation
/kind failing-test

/kind feature

/kind flake

What this PR does / why we need it:
moves images from being hosted in gcr.io to quay.io. The reason for this move is that gcr.io isn't free, quay.io is and I don't have a personal budget to host these images.

Once this is merged I'm going to turn off access to the existing images. If people need older images I can rebuild specific versions when asked.

Which issue(s) this PR fixes:

Fixes #

Special notes for your reviewer:

Does this PR introduce a user-facing change?:

NONE

@k8s-ci-robot k8s-ci-robot added release-note-none Denotes a PR that doesn't merit a release note. size/S Denotes a PR that changes 10-29 lines, ignoring generated files. kind/feature Categorizes issue or PR as related to a new feature. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. needs-sig Indicates an issue or PR lacks a `sig/foo` label and requires one. needs-priority Indicates a PR lacks a `priority/foo` label and requires one. sig/cluster-lifecycle Categorizes an issue or PR as relevant to SIG Cluster Lifecycle. sig/instrumentation Categorizes an issue or PR as relevant to SIG Instrumentation. and removed needs-sig Indicates an issue or PR lacks a `sig/foo` label and requires one. labels Jun 25, 2019
@k8s-ci-robot k8s-ci-robot requested review from monotek and piosz June 25, 2019 21:39
@k8s-ci-robot
Copy link
Copy Markdown
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: coffeepac

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jun 25, 2019
@monotek
Copy link
Copy Markdown
Member

monotek commented Jun 25, 2019

/ok-to-test

@k8s-ci-robot k8s-ci-robot added the ok-to-test Indicates a non-member PR verified by an org member that is safe to test. label Jun 25, 2019
@coffeepac
Copy link
Copy Markdown
Contributor Author

/test pull-kubernetes-e2e-gce-100-performance
/test pull-kubernetes-kubemark-e2e-gce-big

@cblecker
Copy link
Copy Markdown
Member

/hold

@coffeepac Can we deprecate this code completely? Is it used somewhere? It's concerning that binary images in k/k are in repos that aren't in the project's control.

cc: @kubernetes/sig-cluster-lifecycle-pr-reviews

@k8s-ci-robot k8s-ci-robot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Jun 26, 2019
@monotek
Copy link
Copy Markdown
Member

monotek commented Jun 26, 2019

@cblecker

What code do you want to deprecate? The whole monitoring stuff? Imho this is used a lot. The image is also used in the fluentd-elasticsearch helm chart: https://hub.helm.sh/charts/kiwigrid/fluentd-elasticsearch

Also the current gcr.io docker repo (gcr.io/fluentd-elasticsearch/fluentd) is not in the projects control.
The problem now is that gcr.io is charging to much (private) money so we decided to move to a free registry (https://quay.io/organization/fluentd_elasticsearch).

The reason for the move away from the the original repo (gcr.io/google-containers/fluentd-elasticsearch) has been, that only Google employees we're able to build the images manually and we sometimes had to wait for several weeks to get this done, when we liked to release a new version of the image.

I also would like to have a repo where community members and or maintainers of the docker images have easy push access. An automatic build & push pipeline would be also nice.

/test pull-kubernetes-e2e-gce-100-performance

docker build --tag ${PREFIX}/${IMAGE}:${TAG} .

push:
docker push ${PREFIX}/${IMAGE}:${TAG}
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

please add push with latest tag too...

docker build --tag ${PREFIX}/${IMAGE}:${TAG} .

push:
docker push ${PREFIX}/${IMAGE}:${TAG} No newline at end of file
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

please add push with latest tag too...

@neolit123
Copy link
Copy Markdown
Member

/hold
/assign @spiffxp @dims
PTAL WRT code organization - GCP / cluster + k8s-infra related.

@neolit123
Copy link
Copy Markdown
Member

What code do you want to deprecate? The whole monitoring stuff? Imho this is used a lot. The image is also used in the fluentd-elasticsearch helm chart: https://hub.helm.sh/charts/kiwigrid/fluentd-elasticsearch

/cluster is deprecated and tools like juju-charms moved out already.
if /cluster/addons/fluentd-elasticsearch is widely used then this is a signal for this addon to move out of the directory.

@monotek
Copy link
Copy Markdown
Member

monotek commented Jun 26, 2019

/cluster is deprecated and tools like juju-charms moved out already.
if /cluster/addons/fluentd-elasticsearch is widely used then this is a signal for this addon to move out of the directory.

What would be the right directory now?

@neolit123
Copy link
Copy Markdown
Member

What would be the right directory now?

juju moved out of k/k.

@monotek
Copy link
Copy Markdown
Member

monotek commented Jun 26, 2019

@piosz what are your thoughts?

@detiber
Copy link
Copy Markdown
Contributor

detiber commented Jun 26, 2019

Assuming there is a SIG to provide sponsorship, github.com/kubernetes-sigs is probably the best home.

@coffeepac
Copy link
Copy Markdown
Contributor Author

a. this is owned by sig-instrumentation.
b. I have opened this feature request #79432 to make the move

however, I request both @cblecker and @neolit123 release their holds on this PR as I am spending money I shouldn't be to continue to host these images. I do not have stats for how large an impact it would be if I cut off access to these images but it wouldn't be non-zero. please see: #78684

@cblecker
Copy link
Copy Markdown
Member

@coffeepac I'm poking some folks to see what we can do here. I don't want you to keep having to pay for things, but I also don't want to thrash where this image is located.

I understand this is urgent for cost reasons, and I'll be circling back with an answer ASAP.

@coffeepac
Copy link
Copy Markdown
Contributor Author

coffeepac commented Jun 26, 2019

thanks @cblecker. this is entirely my own fault for incurring these charges as well. I'm bad at reading fine print apparently.

EDIT re: impact, rough math suggests there are/projected to be about ~1350 downloads of these images for June based on size of image and actual/projected costs.

@monotek
Copy link
Copy Markdown
Member

monotek commented Jun 27, 2019

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Jun 27, 2019
@coffeepac
Copy link
Copy Markdown
Contributor Author

@cblecker any progress on this or can we do a bit of location thrash while we sort out a long term solution?

@spiffxp
Copy link
Copy Markdown
Contributor

spiffxp commented Jun 28, 2019

/hold cancel
The wg-k8s-infra way (which I highly encourage and will eventually get pushy that someone use because it would also allow you to do this for "free") would be to request a staging repo, and using that for now. https://github.com/kubernetes/k8s.io/tree/master/k8s.gcr.io#creating-staging-repos

This would also result in location thrash though, as we don't currently promote from staging repos to k8s.gcr.io. So, let's thrash away.

@k8s-ci-robot k8s-ci-robot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Jun 28, 2019
@cblecker
Copy link
Copy Markdown
Member

@coffeepac Immediate term, yeah, we can just move the reference location.

The next step after this is I'd like to have a plan for moving this code out, I think. The manifests look stale, this is just the image generation piece, while other pieces like the helm chart for installation https://github.com/kiwigrid/helm-charts/blob/master/charts/fluentd-elasticsearch/values.yaml#L2 exist elsewhere.

There's also a couple other references to the old image location in our code base: https://cs.k8s.io/?q=gcr.io%2Ffluentd-elasticsearch

WDYT?

@coffeepac
Copy link
Copy Markdown
Contributor Author

Happy to move the code into a sig-inst repo. I tried doing that 6 months ago and it wasn't possible for some reason, I think it was tied to the build process for the add-on manager? But k8s infra has come along since then so I'm happy to do it.

I'll get a plan onto the feature ticket early next week for discussion.

Thanks for the help friends, I know this is a poor solution and I appreciate you taking it to help out my old poor decision.

@k8s-ci-robot k8s-ci-robot merged commit 68eb29c into kubernetes:master Jun 28, 2019
@monotek
Copy link
Copy Markdown
Member

monotek commented Jun 29, 2019

If it helps I'm willing to move fluentd-elasticsearch helm chart out of the Kiwigrid repo. Is there already an official k8s org helm registry available somewhere or would we need to create one?

@vguaglione
Copy link
Copy Markdown

Where is this image on quay.io? I've tried the following:

docker pull quay.io/fluentd-elasticsearch/fluentd:v2.5.1
docker pull quay.io/fluentd-elasticsearch/fluentd:latest
docker pull quay.io/fluentd-elasticsearch/fluentd

and all three return the following error:

Error response from daemon: unauthorized: access to the requested resource is not authorized

@monotek
Copy link
Copy Markdown
Member

monotek commented Jul 18, 2019

webwurst added a commit to webwurst/kubernetes that referenced this pull request Jul 22, 2019
ialidzhikov added a commit to gardener/logging that referenced this pull request Sep 30, 2019
The base image moved from gcr.io to quay.io.
Ref kubernetes/kubernetes#79390

Signed-off-by: ialidzhikov <i.alidjikov@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/feature Categorizes issue or PR as related to a new feature. lgtm "Looks good to me", indicates that a PR is ready to be merged. needs-priority Indicates a PR lacks a `priority/foo` label and requires one. ok-to-test Indicates a non-member PR verified by an org member that is safe to test. release-note-none Denotes a PR that doesn't merit a release note. sig/cluster-lifecycle Categorizes an issue or PR as relevant to SIG Cluster Lifecycle. sig/instrumentation Categorizes an issue or PR as relevant to SIG Instrumentation. size/S Denotes a PR that changes 10-29 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

9 participants