Git Product home page Git Product logo

openshift-upgrade-controller's People

Contributors

bastjan avatar corvus-ch avatar renovate[bot] avatar simu avatar

Watchers

 avatar  avatar  avatar  avatar  avatar

openshift-upgrade-controller's Issues

Dependency Dashboard

This issue lists Renovate updates and detected dependencies. Read the Dependency Dashboard docs to learn more.

Repository problems

These problems occurred while renovating this repository. View logs.

  • WARN: Package lookup failures

Rate-Limited

These updates are currently rate-limited. Click on a checkbox below to force their creation now.

  • Update actions/cache action to v4

Warning

Renovate failed to look up the following dependencies: Could not determine new digest for update (go package github.com/openshift/machine-config-operator).

Files affected: go.mod


Open

These updates have all been created already. Click a checkbox below to force a retry/rebase of any.

Detected dependencies

dockerfile
Dockerfile
  • docker.io/library/alpine 3.18
github-actions
.github/workflows/build.yml
  • actions/checkout v4
  • actions/setup-go v4
  • actions/cache v3
.github/workflows/lint.yml
  • actions/checkout v4
  • actions/setup-go v4
  • actions/cache v3
.github/workflows/release.yml
  • actions/checkout v4
  • actions/setup-go v4
  • docker/setup-qemu-action v3
  • docker/setup-buildx-action v3
  • actions/cache v3
  • docker/login-action v3
  • mikepenz/release-changelog-builder-action v4
  • goreleaser/goreleaser-action v5
.github/workflows/test.yml
  • actions/checkout v4
  • actions/setup-go v4
  • actions/cache v3
gomod
go.mod
  • go 1.20
  • github.com/openshift/api v0.0.0-20230213134911-7ba313770556@7ba313770556
  • github.com/openshift/machine-config-operator v0.0.1-0.20230508173032-8f952d7fd139@8f952d7fd139
  • github.com/prometheus/client_golang v1.17.0
  • github.com/robfig/cron/v3 v3.0.1
  • github.com/stretchr/testify v1.8.4
  • golang.org/x/mod v0.12.0
  • k8s.io/api v0.28.1
  • k8s.io/apimachinery v0.28.1
  • k8s.io/client-go v0.28.1
  • sigs.k8s.io/controller-runtime v0.16.2
  • sigs.k8s.io/controller-tools v0.13.0
  • sigs.k8s.io/kustomize/kustomize/v5 v5.1.1
  • github.com/Masterminds/semver/v3 v3.2.1
  • go.uber.org/multierr v1.11.0
  • golang.org/x/exp v0.0.0-20230905200255-921286631fa9@921286631fa9

  • Check this box to trigger a request for Renovate to run again on this repository

Allow running hooks even if no upgrade exists

Summary

As a maintenance engineer
I want to execute code, in a maintenance window, that does not conflict with upgrades
So that I don't have to intervene during out-of-office hours.

Context

We added support for running arbitrary code before and after upgrades, we now not only use this for communication with external systems but also to rollout changes or drain nodes.

Some of those tasks need to be run in every maintenance window. We could create a cronjob for that, but the cronjob has no insight if the cluster is upgrading. We could block the upgrade process or introduce conditions where the cluster upgrade fails by accident.

Out of Scope

No response

Further links

Acceptance Criteria

  • Hooks can be run on the upgrade schedule:
    • immediately if no upgrade
    • in sync with the upgrade if one exists

Implementation Ideas

UpgradeConfig creates UpgradeJob with empty desiredVersion. Upgrade job runs health checks and jobs as usual, but does not touch the desiredVersion.

Allow distinction between possibly disruptive and non-disruptive UpgradeJobHooks

Summary

As cluster operator
I want to mark UpgradeJobHooks as possibly disruptive
So that I can decide if i should set up any alert silences

As cluster operator
I want to mark UpgradeJobHooks as possibly disruptive
So that I can have metrics and mark the jobs in dashboards

Context

At VSHN we use UpgradeJobHooks to set silences and to do various disruptive and non-disruptive tasks.

We only want to set silences if there is a possibly disruptive job or an upgrade.
We want to distinguished "risky" upgrades from "noop" upgrades on our dashboards.

Out of Scope

No response

Further links

Acceptance Criteria

  • UpgradeJobHook CRD has a new field allowing to mark jobs as disruptive.
  • UpgradeJob has a metric if it matches any disruptive UpgradeJobHook
  • UpgradeJobHook pods have an environment variable passed in with the disruptive status of the current hook and of the disruptive status of all matching hooks.

Implementation Ideas

No response

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.