-
Notifications
You must be signed in to change notification settings - Fork 611
Run the chaosduck component during our e2e testing. #3565
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
It passed, running it again. /test pull-knative-eventing-integration-tests |
Pretty sure this isn't running properly yet. Without a replicated webhook, I'd at least expect intermittent failures there, and looking through the logs the pods are far too old relative to the chaos duck:
|
Cracking the logs I see:
I just need to be less lazy about piggybacking on an existing SA and create my own with the right RBAC 🙃 |
This should be fixed, let's see what breaks now 😈 |
The problem now is where I'm standing things up. I saw this in serving where the |
Enabling the mt-broker-controller and some Brokers start failing to become ready 🤔 Rolled back the broker bit and trying the next component on my list. |
This runs the following components in an HA configuration and enabled "chaosduck" on them: - eventing webhook - eventing controller - sugar controller This also stubs things our for the IMC controller/dispatcher and the MT Broker, but these are disabled due to observed issues (see linked issues).
/hold |
/test pull-knative-eventing-integration-tests (running again to flush out flakes) 😇 |
One more time... /test pull-knative-eventing-integration-tests |
This looks like the webhook shutdown failure I am chasing (here):
/retest |
The following jobs failed:
Failed non-flaky tests preventing automatic retry of pull-knative-eventing-integration-tests:
|
Webhook again:
There is half a fix in (#3596), and I talked to @tcnghia about bumping /retest |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: mattmoor, vaikas The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/hold cancel If we start seeing pervasive issues, we should role this back, but the scope of this is intended to be a relatively stable subset to start flushing out more niche HA issues. |
No description provided.