Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix issue #1464: Added VSL Backup/Restore Tests #1552

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

stillalearner
Copy link
Contributor

@stillalearner stillalearner commented Oct 10, 2024

Why the changes were made

This PR adds VSL backup / restore tests to the e2e tests, for both mysql and mongo apps.

Fixes #1464

How to test the changes made

Use "make test-e2e" and run the new test cases with proper ginkgo variables.

@stillalearner
Copy link
Contributor Author

/retest

@stillalearner stillalearner force-pushed the add_vsl_backup_restore_test branch 2 times, most recently from f3c4da7 to 48c1618 Compare October 11, 2024 07:00
@mateusoliveira43

This comment was marked as resolved.

@stillalearner
Copy link
Contributor Author

@stillalearner
Copy link
Contributor Author

/retest

@kaovilai
Copy link
Member

/retest

Copy link

openshift-ci bot commented Oct 16, 2024

@stillalearner: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/4.18-dev-preview-e2e-test-aws 11ce9c4 link false /test 4.18-dev-preview-e2e-test-aws

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Oct 16, 2024
@@ -68,6 +68,8 @@ func prepareBackupAndRestore(brCase BackupRestoreCase, updateLastInstallTime fun
gomega.Eventually(lib.AreNodeAgentPodsRunning(kubernetesClientForSuiteRun, namespace), time.Minute*3, time.Second*5).Should(gomega.BeTrue())
}

// Velero does not change status of VSL objects. Users can only confirm if VSLs are correct configured when running a native snapshot backup/restore
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think it was said in some scrum in 2021/2022 that we don't need VSL tests when implementing e2e due to "CSI is the future, we will not suggests VSL to anyone new onboarding". Just an info.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

your call. I guess keeping tests if functionality is there / not deprecated yet is fine..

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

adding tests is fine yes. Pretty sure we had it at some point here

@@ -112,6 +114,13 @@ func (v *DpaCustomResource) Build(backupRestoreType BackupRestoreType) *oadpv1al
dpaSpec.Configuration.Velero.DefaultPlugins = append(dpaSpec.Configuration.Velero.DefaultPlugins, oadpv1alpha1.DefaultPluginCSI)
dpaSpec.Configuration.Velero.FeatureFlags = append(dpaSpec.Configuration.Velero.FeatureFlags, velero.CSIFeatureFlag)
dpaSpec.SnapshotLocations = nil
case NativeSnapshots:
dpaSpec.SnapshotLocations[0].Velero.Credential = &corev1.SecretKeySelector{

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Shouldn't we just load the VSL spec only for the NativeSnapshots spec ? Here we are only adding the credential reference, IMO we should configure VSL only for this case and not by default.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@shubham-pampattiwar

It is added to the default aws_settings right now.

The region field in VSL spec is dynamically filled based on the infra. So,i guess it would be better to load it by default from there, anyways it doesnt do any harm, if we choose FSB, or Datamover, that will be done..what say?

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cool, I am fine with it.

@kaovilai
Copy link
Member

/override ci/prow/4.17-e2e-test-kubevirt-aws

Copy link

openshift-ci bot commented Oct 17, 2024

@kaovilai: Overrode contexts on behalf of kaovilai: ci/prow/4.17-e2e-test-kubevirt-aws

In response to this:

/override ci/prow/4.17-e2e-test-kubevirt-aws

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Copy link

openshift-ci bot commented Oct 17, 2024

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: kaovilai, mateusoliveira43, shubham-pampattiwar, stillalearner

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@kaovilai
Copy link
Member

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Oct 17, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

VSL backup/restore test
5 participants