eks: changes required to support EKS cluster#1350
Conversation
…und into tmp_eks_cluster
…und into tmp_eks_cluster
It's passing now. I have to point out that I have re-run the pipeline 8 times before it worked - we should open an issue to investigate and fix these flaky tests. |
|
I have restored the code that applies the desired I have also checked the code, and |
I don't quite understand how we're actually testing wether the sysctls are set as we please or if the defaults are used. Could you reword or elaborate on it a little bit more? Would it makes sense to create a test which adjusts sysctls in a way that makes the test fail? |
We modify the The sysctl values will not be applied to plan pods, and they will use the default values. In other words, we have overridden them for the (parent) node(s), but not for the plan pods. How do we know that these changes have taken effect? Simple, without the changes where we permit So when I said that
I don't think it's possible to write a test that would do something like that, simply because it requires us to create a whole cluster without allowing |
I think I'm almost there with you but I feel like I'm still missing one connection. Isn't this - testground/pkg/runner/cluster_k8s.go Lines 826 to 830 in cf6e151 sysctls is set in env.toml file? Something like here: Lines 32 to 34 in e02c78f From what I understand, we now successfully set unsafe sysctls on the |
You are correct, I got some information mixed up. Yes, if the
I was wrong - no inheritance actually occurs, however we do set the |
|
Cheers, makes sense now 👍 |
|
(re-sharing the list of tasks here: #1499, thanks for the progress being made) |
Unused on k8s runner.
Merge testground#1350 from testground repo
This review contains all the required changes for the new EKS cluster. Most of the changes relate to the network annotations, IP ranges, configuration options, etc.
I have left comments listing the reasons for some of the most important changes.
Closes #1499
Related change in the infra: testground/infra#78