-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update the az.create-aks
task
#967
Conversation
az.create-aks
task and add it to the tests
abf9482
to
bb1cdcc
Compare
integration-tests/invoke_test.go
Outdated
@@ -55,17 +55,22 @@ func TestInvokes(t *testing.T) { | |||
testAzureInvokeVM(t, tmpConfigFile, *workingDir) | |||
}) | |||
|
|||
t.Run("az.create-aks", func(t *testing.T) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🔨 warning
We have limited aks resources and it takes usually very long to create an aks cluster, similarly to eks. I would rather have it as a manual test
bb1cdcc
to
ae94e61
Compare
az.create-aks
task and add it to the testsaz.create-aks
task
``` | ||
|
||
## Quick start: Create an EKS (Linux/Windows) + Fargate (Linux) Cluster + Agent (Helm) | ||
|
||
``` | ||
# You need to have a DD APIKey AND APPKey in variable DD_API_KEY / DD_APP_KEY | ||
aws-vault exec sso-agent-sandbox-account-admin -- pulumi up -c scenario=aws/eks -c ddinfra:aws/defaultKeyPairName=<your_exisiting_aws_keypair_name> -c ddinfra:env=aws/agent-sandbox -c ddagent:apiKey=$DD_API_KEY -c ddagent:appKey=$DD_APP_KEY -s <your_name>-eks | ||
pulumi up -c scenario=aws/eks -c ddinfra:aws/defaultKeyPairName=<your_exisiting_aws_keypair_name> -c ddinfra:env=aws/agent-sandbox -c ddagent:apiKey=$DD_API_KEY -c ddagent:appKey=$DD_APP_KEY -s <your_name>-eks |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👏 praise
@@ -76,7 +76,7 @@ func testAzureInvokeVM(t *testing.T, tmpConfigFile string, workingDirectory stri | |||
|
|||
stackName := fmt.Sprintf("az-invoke-vm-%s", os.Getenv("CI_PIPELINE_ID")) | |||
t.Log("creating vm") | |||
createCmd := exec.Command("invoke", "az.create-vm", "--no-interactive", "--stack-name", stackName, "--config-path", tmpConfigFile, "--account", "agent-qa") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
❓ question
It doesn't work with agent-qa
? Or we are setting it at setup?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I moved it to the config file: https://github.com/DataDog/test-infra-definitions/pull/967/files#diff-5b0d7f0d4cd5bb98edb0f1e6b5ac0747cae4be958137b00d9785e4863a90acdcR12 sorry it was not super explicit. We already do the same thing with AWS so I just centralised everything
/merge |
🚂 MergeQueue: pull request added to the queue The median merge time in Use |
What does this PR do?
az.create-aks
to create clusters in agent sandbox/qaaz.create-aks
to the integration tests in this CI, it takes only around 8 minutes but we do not have a lot of resources on AzureSome semi-related tasks to:
aws-vault exec
commands, not needed anymore since Set the Profile in the AwsProvider to avoid wrapping the commands intoaws-vault
commands #917Which scenarios this will impact?
Motivation
Allow users to create AKS in our new sandbox
Additional Notes
ssh-ed25519
keys here. They do not work with AKS and we explicitly needssh-rsa
keys so I created a new pair and pushed it