Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[calico] call calico checks early on to prevent altering the cluster #8707

Conversation

cristicalin
Copy link
Contributor

call calico checks early on to prevent altering the cluster with bad configuration

What type of PR is this?

/kind feature

What this PR does / why we need it:
This PR ensures that calico checks are called early in the playbooks so that deployment fails before it makes bad changes to live clusters. Additionally this adds a migration procedure in the kubespray docs for folks migrating from 2.18 and hitting changing defaults.

Which issue(s) this PR fixes:

Fixes #8691

Special notes for your reviewer:

Does this PR introduce a user-facing change?:

[calico] call calico checks early on to prevent altering the cluster with bad settings and causing traffic outages

@k8s-ci-robot k8s-ci-robot added kind/feature Categorizes issue or PR as related to a new feature. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/L Denotes a PR that changes 100-499 lines, ignoring generated files. labels Apr 12, 2022
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: cristicalin

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot requested review from bozzo and holmsten April 12, 2022 17:57
@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Apr 12, 2022
@cristicalin cristicalin force-pushed the check_calico_encapsulation_early branch from 1cd7f39 to 4ee3b43 Compare April 12, 2022 18:16
Copy link
Contributor

@oomichi oomichi left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It is nice to move calico checks into calico specific playbook file to make it simple.
Just one comment for typo.
(I don't want to block this with such small thing. I will put lgtm even if not updating)

docs/calico.md Outdated Show resolved Hide resolved
@cristicalin cristicalin force-pushed the check_calico_encapsulation_early branch from 4ee3b43 to f38cf55 Compare April 13, 2022 05:48
@cristicalin cristicalin force-pushed the check_calico_encapsulation_early branch from f38cf55 to a73ebb4 Compare April 13, 2022 11:54
@oomichi
Copy link
Contributor

oomichi commented Apr 13, 2022

Thank you for updating.

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Apr 13, 2022
@k8s-ci-robot k8s-ci-robot merged commit 45262da into kubernetes-sigs:master Apr 14, 2022
Quehenr pushed a commit to Quehenr/unstable-laboratory-infrastructure-kubespray that referenced this pull request Apr 16, 2022
* master:
  metallb: Add images to downloads (kubernetes-sigs#8715)
  etcd: add etcd v3.5.3 for kubernetes 1.21+ (kubernetes-sigs#8712)
  [calico] call calico checks early on to prevent altering the cluster with bad configuration (kubernetes-sigs#8707)
sakuraiyuta pushed a commit to sakuraiyuta/kubespray that referenced this pull request Apr 16, 2022
@floryut floryut added kind/network Network section in the release note and removed kind/feature Categorizes issue or PR as related to a new feature. labels Apr 25, 2022
@oomichi oomichi mentioned this pull request May 28, 2022
LuckySB pushed a commit to southbridgeio/kubespray that referenced this pull request Jun 30, 2023
LuckySB pushed a commit to southbridgeio/kubespray that referenced this pull request Oct 23, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/network Network section in the release note lgtm "Looks good to me", indicates that a PR is ready to be merged. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Calico role fails migration from ipip to vxlan mode
4 participants