Fixes kubernetes/test-infra#5350
Broken into commit(s) per sig, with rationale in the commit message
I've removed UNKNOWN from validOwners to get CI to yell at me until I chase down the remaining jobs.
Currently the remaining jobs are related to:
@kubernetes/sig-api-machinery-test-failures
@kubernetes/sig-apps-test-failures
@kubernetes/sig-aws-test-failures
@kubernetes/sig-cli-test-failures
@kubernetes/sig-cluster-lifecycle-test-failures
@kubernetes/sig-gcp-test-failures
@kubernetes/sig-instrumentation-test-failures
@kubernetes/sig-node-test-failures
@kubernetes/sig-release-test-failures
@kubernetes/sig-scalability-test-failures
@kubernetes/sig-testing-test-failures
Please comment with suggestions for an alternate sig if you feel I have mis-assigned your sig
Does anyone know who should own the cadvisor jobs? Current guesses are sig-node or sig-instrumentation
https://github.com/kubernetes/test-infra/pull/5435
—
You are receiving this because you are on a team that was mentioned.
Reply to this email directly, view it on GitHub, or mute the thread.![]()
[APPROVALNOTIFIER] This PR is NOT APPROVED
This pull-request has been approved by: spiffxp
We suggest the following additional approver: ixdy
Assign the PR to them by writing /assign @ixdy in a comment when ready.
The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these OWNERS Files:You can indicate your approval by writing /approve in a comment
You can cancel your approval by writing /approve cancel in a comment
Remove UNKNOWN as a validOwner
🎉
@spiffxp: The following test failed, say /retest to rerun them all:
| Test name | Commit | Details | Rerun command |
|---|---|---|---|
| pull-test-infra-bazel | 7da8345 | link | /test pull-test-infra-bazel |
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.
@krzyzacy commented on this pull request.
> @@ -1,5 +1,4 @@ [ - "UNKNOWN",
❤️
looks like there are cadvisor and heapster jobs left, otherwise ![]()
@roberthbailey commented on this pull request.
In jobs/config.json:
> @@ -1849,7 +1849,7 @@
],
"scenario": "kubernetes_e2e",
"sigOwners": [
- "UNKNOWN"
+ "sig-cluster-lifecycle"
We talked about etcd ownership a bit during the most recent cluster lifecycle meeting and the only consensus was that it didn't have clear ownership. I'm not sure anyone in our sig wants to sign up to own this job atm, but I also don't know who else would own it. It was created by sig-scalability because they were driving the etcd2 --> etcd3 migration. But other than that no sig seems to be owning etcd versioning.
@BenTheElder commented on this pull request.
In jobs/config.json:
> @@ -9455,7 +9456,7 @@
],
"scenario": "kubernetes_verify",
"sigOwners": [
- "UNKNOWN"
+ "sig-testing"
I still very much dislike this job very much but it does seem sig-testing owns it 😂 ![]()
/shrug
@BenTheElder commented on this pull request.
In jobs/config.json:
> @@ -9455,7 +9456,7 @@
],
"scenario": "kubernetes_verify",
"sigOwners": [
- "UNKNOWN"
+ "sig-testing"
in fact every job using the kubernetes_verify is a pile of dirty hacks owned by sig-testing 🤷♂️
seconding
once cadvisor and heapster jobs are sorted 👍
/approve
[APPROVALNOTIFIER] This PR is APPROVED
This pull-request has been approved by: BenTheElder, spiffxp
The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these OWNERS Files:You can indicate your approval by writing /approve in a comment
You can cancel your approval by writing /approve cancel in a comment
—
@lavalamp @roberthbailey I assigned sig-cluster-lifecycle to the ci-kubernetes-e2e-gce-gci-latest-rollback-etcd job because it uses the Feature:EtcdUpgrade tag which shows up here: https://github.com/kubernetes/kubernetes/blob/master/test/e2e/lifecycle/cluster_upgrade.go#L179-L202
Last time I raised etcd2 vs. etcd3 or etcd2->etcd3 I also walked away feeling like sig-api-machinery owns all things registry-and-thus-etcd-related. But the test codebase today doesn't reflect this. I'd rather document the state of today and ask that you open an issue if you'd like to move it to test/e2e/apimachinery.
We've still got lingering etcd2 jobs that I would like a sole sig to decide the fate of, but that's outside the scope of this PR.
@spiffxp pushed 2 commits.
—
You are receiving this because you are subscribed to this thread.
View it on GitHub or mute the thread.![]()
/hold
for comment
@kubernetes/sig-node-test-failures I'm guessing you own cadvisor-related jobs
@kubernetes/sig-instrumentation-test-failures I'm guess you own heapster-related jobs
@krousey -- I was under the impression that the framework was just that; a framework to do the upgrades. Did we special case etcd upgrade testing?
@mtaufen commented on this pull request.
> @@ -1,5 +1,4 @@ [ - "UNKNOWN",
💯
SO great to see this come full circle! Thanks Aaron!
@roberthbailey We (and by we I mean @mml) special cased the etcd upgrade testing. In this "upgrade" test, the version remains the same, only etcd is switched out. It required a different disruption logic, that's why it was specialized. Aside from the disruption function and the list of tests it runs, it re-uses the framework.
/hold cancel
This might not be the 100% perfect totally accurate mapping of sigs to jobs, but it's something we can iterate on. Leaving all the individual commits vs. squashing for ease of revert if we need to down the line.
/lgtm
![]()
Corrections to ownership can be addressed in follow up discussion / PRs, thanks for tackling this @spiffxp! 😄
[APPROVALNOTIFIER] This PR is APPROVED
This pull-request has been approved by: BenTheElder, spiffxp
The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these OWNERS Files:You can indicate your approval by writing /approve in a comment
You can cancel your approval by writing /approve cancel in a comment
—
Merged #5435.