Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Uodate README table with WIP backends separated from complete ones #321

Open
jayunit100 opened this issue Aug 5, 2022 · 5 comments
Open
Labels
good first issue Denotes an issue ready for a new contributor, according to the "help wanted" guidelines. help wanted Denotes an issue that needs help from a contributor. Must meet "help wanted" guidelines. lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale.

Comments

@jayunit100
Copy link
Contributor

So far IPTables, IPVS are pretty stable passing 100s of the CI tests etc, with only a few bugs ( < 5 tests ).

But others (eBPF and NFT) arent as well tested.

A good first issue for someone would be to test all backends and write up into the README which ones we consider experimental

  • on ipv6
  • on ipv4
  • what % tests fail (sig-net/conformance)

/good-first-issue

@k8s-ci-robot
Copy link
Contributor

@jayunit100:
This request has been marked as suitable for new contributors.

Guidelines

Please ensure that the issue body includes answers to the following questions:

  • Why are we solving this issue?
  • To address this issue, are there any code changes? If there are code changes, what needs to be done in the code and what places can the assignee treat as reference points?
  • Does this issue have zero to low barrier of entry?
  • How can the assignee reach out to you for help?

For more details on the requirements of such an issue, please see here and ensure that they are met.

If this request no longer meets these requirements, the label can be removed
by commenting with the /remove-good-first-issue command.

In response to this:

So far IPTables, IPVS are pretty stable passing 100s of the CI tests etc, with only a few bugs ( < 5 tests ).

But others (eBPF and NFT) arent as well tested.

A good first issue for someone would be to test all backends and write up into the README which ones we consider experimental

  • on ipv6
  • on ipv4
  • what % tests fail (sig-net/conformance)

/good-first-issue

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot k8s-ci-robot added good first issue Denotes an issue ready for a new contributor, according to the "help wanted" guidelines. help wanted Denotes an issue that needs help from a contributor. Must meet "help wanted" guidelines. labels Aug 5, 2022
@jayunit100 jayunit100 changed the title Flag WIP backends from complete ones Uodate README table with WIP backends separated from complete ones Aug 5, 2022
@k8s-triage-robot
Copy link

The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs.

This bot triages issues and PRs according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the issue is closed

You can:

  • Mark this issue or PR as fresh with /remove-lifecycle stale
  • Mark this issue or PR as rotten with /lifecycle rotten
  • Close this issue or PR with /close
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/lifecycle stale

@k8s-ci-robot k8s-ci-robot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Nov 3, 2022
@emabota
Copy link
Contributor

emabota commented Dec 1, 2022

Hi @jayunit100,
I think that I can also try this one. Please let me know how or from where to begin. Thanks
/assign

@jayunit100
Copy link
Contributor Author

 ./test_e2e.sh -i ipv4 -b iptables
 ./test_e2e.sh -i ipv6 -b iptables
 ./test_e2e.sh -i ipv4 -b ipvs
  ./test_e2e.sh -i ipv6 -b ebpf

docs/TEST_REPORT_12_7_2022.md

Backend: Iptables
Stack: ipv4
Results:
   Mostly passing 215 of the tests.
   The two failures appear to be related to nodeports / clusterIPs.  
   Filed issues to look into it: xxx yyy

Backend: IPVS 
Stack:...

@emabota
Copy link
Contributor

emabota commented Dec 8, 2022

After running ./test_e2e.sh -i ipv4 -b iptables the cluster is created and the output of kubectl cluster-info is:

$ kubectl cluster-info 
Kubernetes control plane is running at https://127.0.0.1:36355
CoreDNS is running at https://127.0.0.1:36355/api/v1/namespaces/kube-system/services/kube-dns:dns/proxy

But the control plane is actually running on http and not https. Consequently, it seems that many tests are Failing as they attempt to connect through https.

Am I missing something or this is a bug?

@emabota emabota removed their assignment Apr 1, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
good first issue Denotes an issue ready for a new contributor, according to the "help wanted" guidelines. help wanted Denotes an issue that needs help from a contributor. Must meet "help wanted" guidelines. lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale.
Projects
None yet
Development

No branches or pull requests

4 participants