-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OCPBUGS-44925: aws: add ec2:AllocateAddress perm requirement. #9234
base: master
Are you sure you want to change the base?
Conversation
@r4f4: This pull request references Jira Issue OCPBUGS-44925, which is valid. The bug has been moved to the POST state. 3 validation(s) were run on this bug
Requesting review from QA contact: The bug has been updated to refer to the pull request using the external bug tracker. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/label platform/aws |
/hold We are still missing another permission:
|
`ec2:AllocateAddress` and `ec2:AssociateAddress` are needed by CAPA when Ipv4Pools are supplied to allocate a new IP from the pool and associate that IP with an instance.
b2a5dc1
to
85617f6
Compare
@r4f4: The following tests failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
@r4f4 there is a problem in the machine manifest as the type added to the machineset manifest,
This is happening because is missing the permission
|
@r4f4 |
@mtulio that perm is not required in the non-edge case and we just display a warning that we could not find a preferred instance type. If the edge node cannot work with the default instance type, there should be a better default or further validation. |
@r4f4 I am interpreting this warning (which, imo, might be interpreted as failed in certain situations like CP or worker nodes' pool to prevent later failure) as required permission for control plane and worker pools. The installer will always call |
It's not required, it's optional. If this call fails, we proceed with the hardcoded default instance types in the installer master, worker |
AFAIK we do not as the way in which the steps are written we always set an instance type in the |
my interpretation of this is required as, afaik, we don't expect the default path to fail :) Furthermore, this function has been introduced long time ago, even before edge zones, to get the best instance in mostly regions, still covering regions that takes time to rolls up new gen of instances by AWS. For example, m6i.xlarge took some time to be available in eu-west-2 - where it supported only 5th Generation. Should the mostly users be penalty by getting more expensive, and slower instance types of mostly regions when some regions does not support it? |
If we want it to be required, we have to remove the warning and actually fail the install. But that's not the case today and the warning was a design choice to make the permission optional. |
@mtulio I suggested making the perm required for the edge case because an edge mpool misconfiguration doesn't cause the install to fail. We only noticed the issue due to the |
It's needed by CAPA when Ipv4Pools are supplied.