Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[testgridshot] upload images to a bucket #943

Merged
merged 4 commits into from
Nov 28, 2019
Merged

[testgridshot] upload images to a bucket #943

merged 4 commits into from
Nov 28, 2019

Conversation

hoegaarden
Copy link
Contributor

As a followup to #882 (comment) we could store the images in a google storage bucket. This would supersede #882.

That would be relatively simple, assuming the person who calls the script is a a release-manager and therefore should have access to certain buckets and the gcloud tools setup correctly already. So no more special setup if my assumptions are correct.

I am not sure, to which bucket we'd want to push the images too. Should we create a new one, should we use an already existing one?

cc: @kubernetes/release-engineering
Closes: #882
/kind cleanup

@k8s-ci-robot k8s-ci-robot added do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. kind/cleanup Categorizes issue or PR as related to cleaning up code, process, or technical debt. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/M Denotes a PR that changes 30-99 lines, ignoring generated files. area/release-eng Issues or PRs related to the Release Engineering subproject sig/release Categorizes an issue or PR as relevant to SIG Release. labels Nov 26, 2019
@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Nov 26, 2019
Copy link
Member

@justaugustus justaugustus left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@hoegaarden -- I really like this compared to the wiki option!

Let me give some thought to what we call the bucket before I create it.
In the meantime, can you tweak this so that the images will land in a path like testgrid/$release/$timestamp-$rand?

Adding the $release in there will make it a little easier to search in the future.

@hoegaarden
Copy link
Contributor Author

hoegaarden commented Nov 27, 2019

Let me give some thought to what we call the bucket before I create it.

I think I'd slightly lean towards reusing an existing bucket, mostly because I don't have a good overview of all the buckets and their intended use, and don't want to introduce yet another one.
You probably have a better overview on all of that. Can you maybe give your reasoning why you'd prefer a new bucket over using an existing one, e.g. kubernetes-release or such?

But yeah, in the end I don't care too much in which bucket the images end up in.

@hoegaarden
Copy link
Contributor Author

Example bucket layout after c32934e:

→ gsutil ls -lr gs://$BUCKET/
gs://$BUCKET/testgridshot/:
        11  2019-11-26T12:19:48Z  gs://$BUCKET/testgridshot/

gs://$BUCKET/testgridshot/1.15/:

gs://$BUCKET/testgridshot/1.15/2019-11-27_10-18-42_0f1c8d9a/:
   1677303  2019-11-27T10:18:51Z  gs://$BUCKET/testgridshot/1.15/2019-11-27_10-18-42_0f1c8d9a/sig_release_1_15_informing_gce_windows_stable1.jpg

gs://$BUCKET/testgridshot/1.16/:

gs://$BUCKET/testgridshot/1.16/2019-11-27_10-18-56_c485091f/:
   1611709  2019-11-27T10:19:04Z  gs://$BUCKET/testgridshot/1.16/2019-11-27_10-18-56_c485091f/sig_release_1_16_informing_gce_windows_beta.jpg

gs://$BUCKET/testgridshot/1.17/:

gs://$BUCKET/testgridshot/1.17/2019-11-27_09-58-32_7eba5288/:
   1182460  2019-11-27T09:58:46Z  gs://$BUCKET/testgridshot/1.17/2019-11-27_09-58-32_7eba5288/sig_release_1_17_informing_aks_engine_azure_1_17_windows.jpg
   1627746  2019-11-27T09:58:46Z  gs://$BUCKET/testgridshot/1.17/2019-11-27_09-58-32_7eba5288/sig_release_1_17_informing_gce_cos_k8sbeta_default.jpg
   1584127  2019-11-27T09:58:46Z  gs://$BUCKET/testgridshot/1.17/2019-11-27_09-58-32_7eba5288/sig_release_1_17_informing_gce_windows_1_17.jpg

gs://$BUCKET/testgridshot/master/:

gs://$BUCKET/testgridshot/master/2019-11-27_10-03-00_77288065/:
   1204008  2019-11-27T10:03:20Z  gs://$BUCKET/testgridshot/master/2019-11-27_10-03-00_77288065/sig_release_master_informing_aks_engine_azure_1_17_windows.jpg
   1530266  2019-11-27T10:03:20Z  gs://$BUCKET/testgridshot/master/2019-11-27_10-03-00_77288065/sig_release_master_informing_capa_conformance_stable_k8s_master.jpg
   1582567  2019-11-27T10:03:20Z  gs://$BUCKET/testgridshot/master/2019-11-27_10-03-00_77288065/sig_release_master_informing_capg_conformance_stable_k8s_master.jpg
    309229  2019-11-27T10:03:19Z  gs://$BUCKET/testgridshot/master/2019-11-27_10-03-00_77288065/sig_release_master_informing_gce_master_scale_performance.jpg
   1654753  2019-11-27T10:03:19Z  gs://$BUCKET/testgridshot/master/2019-11-27_10-03-00_77288065/sig_release_master_informing_gce_windows_master.jpg

gs://$BUCKET/testgridshot/master/2019-11-27_10-19-08_a515ae9d/:
   1203871  2019-11-27T10:19:19Z  gs://$BUCKET/testgridshot/master/2019-11-27_10-19-08_a515ae9d/sig_release_master_informing_aks_engine_azure_1_17_windows.jpg
   1530212  2019-11-27T10:19:19Z  gs://$BUCKET/testgridshot/master/2019-11-27_10-19-08_a515ae9d/sig_release_master_informing_capa_conformance_stable_k8s_master.jpg
   1582281  2019-11-27T10:19:19Z  gs://$BUCKET/testgridshot/master/2019-11-27_10-19-08_a515ae9d/sig_release_master_informing_capg_conformance_stable_k8s_master.jpg
    309279  2019-11-27T10:19:19Z  gs://$BUCKET/testgridshot/master/2019-11-27_10-19-08_a515ae9d/sig_release_master_informing_gce_master_scale_performance.jpg
   1654590  2019-11-27T10:19:20Z  gs://$BUCKET/testgridshot/master/2019-11-27_10-19-08_a515ae9d/sig_release_master_informing_gce_windows_master.jpg
TOTAL: 16 objects, 20244412 bytes (19.31 MiB)

Copy link
Member

@justaugustus justaugustus left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@hoegaarden -- Made some code suggestions for the bucket name.

I think I'd slightly lean towards reusing an existing bucket, mostly because I don't have a good overview of all the buckets and their intended use, and don't want to introduce yet another one.
You probably have a better overview on all of that.

Opened #944 to document bucket usage.

Can you maybe give your reasoning why you'd prefer a new bucket over using an existing one, e.g. kubernetes-release or such?

I was thinking more about which realm I wanted the images to land in: Google-owned or K8s-Infra, primarily because the permissions are slightly different.
We currently have two projects on k8s infra, k8s-staging-release-test and k8s-release-test-prod, both of which may end up being temporary locations (the naming is not quite right).

Our primary bucket (kubernetes-release-gcb) in the kubernetes-release-test project should work fine for this.

@hoegaarden hoegaarden changed the title [WIP] [testgridshot] upload images to a bucket [testgridshot] upload images to a bucket Nov 27, 2019
@k8s-ci-robot k8s-ci-robot removed the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Nov 27, 2019
@hoegaarden
Copy link
Contributor Author

The default bucket has been changed to kubernetes-release-gcb.

@justaugustus justaugustus added the tide/merge-method-squash Denotes a PR that should be squashed by tide when it merges. label Nov 28, 2019
@justaugustus
Copy link
Member

Thanks Hannes!
/lgtm
/approve
/milestone v1.17

@k8s-ci-robot k8s-ci-robot added this to the v1.17 milestone Nov 28, 2019
@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Nov 28, 2019
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: hoegaarden, justaugustus

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:
  • OWNERS [hoegaarden,justaugustus]

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot merged commit 606ccd6 into kubernetes:master Nov 28, 2019
@k8s-ci-robot k8s-ci-robot removed this from the v1.17 milestone Nov 28, 2019
@k8s-ci-robot k8s-ci-robot added this to the v1.18 milestone Nov 28, 2019
@justaugustus justaugustus modified the milestones: v1.18, v1.17 Nov 28, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. area/release-eng Issues or PRs related to the Release Engineering subproject cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/cleanup Categorizes issue or PR as related to cleaning up code, process, or technical debt. lgtm "Looks good to me", indicates that a PR is ready to be merged. sig/release Categorizes an issue or PR as relevant to SIG Release. size/M Denotes a PR that changes 30-99 lines, ignoring generated files. tide/merge-method-squash Denotes a PR that should be squashed by tide when it merges.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants