-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SIG Network test group for blocking jobs #19160
Comments
cc @aojea @danwinship for any further ideas on what we should add or remove to signal overall sig-net test health |
/assign |
I think we should start listing the "apis" we own and the components, ie.. apis:
components:
and then investigate how well we are covering those and report based on area, ideally we should be able to report on
and block on those reports. I've added kind jobs based on the regex [sig-network] https://testgrid.k8s.io/sig-network-kind ,
my 2 cents /cc @thockin |
/sig network |
i.e. for api coverage neworking api coverage https://apisnoop.cncf.io/1.20.0/stable/networking for the components ones, it's a bit tricky, per example, for ingress and network policy only the API is defined and left to 3rd party component the implementation. |
I tried something like the implementation-specific example when we were still working on kubernetes-anywhere but it didn't go very far because we did not want to choose one implementation over another. Testing the APIs themselves with conformance type tests are probably good enough IMO.
I agree that filtering on the SIG-Net labels in the presubmit dashboards and putting them under our grouping would be very useful. I will probably start with that. |
nah, just brainstorming, we are currently blocking on testgrid jobs but, it may be interesting to block on coverage? at least per release? i.e release x+1 can' t have less coverage than release x, cc: @spiffxp |
Related job to gate on coverage #19173 |
Cool, for what it's worth, I do agree that we should have conformance coverage tests for the NetworkPolicy API in stable. I think NP went stable before the idea of API conformance testing and I will open an issue/add those tests. |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle rotten |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
Rotten issues close after 30d of inactivity. Send feedback to sig-contributor-experience at kubernetes/community. |
@fejta-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
What should be cleaned up or changed:
A colleague of mine created a public collection of sig-node test jobs that are critical to determining sig-node test condition. SIG-Net would benefit from a similar job collection for network related jobs that may be blocking a release or consistently failing. We currently have the sig-network-test-failures mailing list but a testgrid collection should also be made for looking at overall jobs.
I think we want a similar setup as SIG Node but tuned for looking at only sig-network related tests:
Provide any links for context:
Mailing list
sig-node informing/blocking jobs
The text was updated successfully, but these errors were encountered: