-
Notifications
You must be signed in to change notification settings - Fork 59
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Uploading to cloud platforms: GCP #147
Comments
I think this involves the following:
|
related: coreos/coreos-assembler#493 |
Infra ticket to create the requisite GCP projects. |
I'm working on some GCP bits for RHCOS (see e.g. openshift/installer#2921 ) and not having FCOS there inhibits doing things upstream first. |
With manually uploaded GCP images, zincati checks for updates and reboots promptly (speedy!) after boot which has some interesting cascading affect on interrupting inital cluster bootstrapping that I noticed today. Being able to use a latest GCP channel image would have a nice side-benefit of (mostly) clearing up immediate reboot issues. |
@dghubble slightly related coreos/zincati#251 |
I think also related here is #392 In OKD we're working around this by adding a |
@LorbusChris That approach makes sense when the cluster has its own mechanism for updating nodes. In general, though, we shouldn't encourage users to disable updates. |
Indeed, we shouldn't encourage that in general. My thinking was that in this specific case of a (probably short-lived) bootstrap host it may make some sense :) |
Thanks for the suggestions. For now I'm content to follow this issue for GCP uploads. Manually uploading new images or sometimes having to retry the bootstrap in this one case is ok to me as I'd like to keep auto-updates enabled (its a master/controller, rather than a toss-away like OKD uses I think). Mainly just highlighting that stale manual images can cause these reboots (e.g. new instance creation, after GCE preemption) that wouldn't otherwise be needed, until the channel is in place. |
@dghubble good feedback points on poseidon/typhoon#687. I have a few more things for you:
|
Thanks @lucab! I think I'd wanna aim for the lock managing approach personally - a local file strategy could help in a pinch here (for bootstrap) and a later an airlock atop the cluster could get (roughly) one at a time node updates (I don't have strong consistency needs). I looked at airlock's etcd strategy, but I'm reluctant to give it access policy-wise or deal with giving it a TLS client cert, etc. I'd picture airlock (or similar) maybe running as a pod with rbac to write a configmap or annotation, some bit of scratch space for locked yes/no. airlock is looking promising and simpler than cluo was, avoiding the coordinator/daemonset. For 1, I'd worry about blocking the target on future reboots (bootstrap is once per cluster lifetime). 3 yeah is kinda , and agreed that 4 may not be the best for this situation. Maybe I'll move this to a (new?) issue so I don't hijack. |
Some updates...
We have a
We adapted
We modified the pipeline to start doing the upload:
GCP is working on making the
|
Is there a bucket with |
the url for the tar.gz within GCP is in the meta.json. My understanding is that it's accessible to any authenticated users. Previously I had considered the file in the image bucket to be purely ephemeral (i.e. only needing to exist for the image import to happen), but I've recently learned of openshift creating images on the fly during install. I'd like to understand why we need to do that if an image is available publicly (and globally) already? Different guestOSfeatures? Encryption? |
The idea broadly speaking was that RHEL CoreOS is an implementation detail of OpenShift. Hence, there wasn't a desire to publish pre-built images globally. This might change at some point. It would seem reasonable to me though to change openshift-install to support directly using a public GCP image if it's available, it'd just require some conditionals in the logic for terraform. |
Yeah I think that makes sense. Since we are publishing images already for Fedora CoreOS I think it makes sense to do what you suggest below 👇🏼 for Fedora CoreOS/OKD.
|
remaining items here:
|
updated #147 (comment) with current status. |
@dghubble yes, feel free to move to another ticket or a forum discussion. From your last reply, it looks like a volatile fragment in |
updated #147 (comment) with current status. |
I'm using the new uploaded GCP images instead of manually uploading. Many thanks for these!
|
ok all things in #147 (comment) are now done or broken out into other tickets. I also created a new ticket for us getting this plumbed through to our download page: #494 I'm going to mark this as done. It was a long journey. |
This is part of #146 and tracks the work/discussion around uploading to GCP.
The text was updated successfully, but these errors were encountered: