Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(ossm): disables service mesh routes generation #738

Merged
merged 1 commit into from
Nov 14, 2023

Conversation

israel-hdez
Copy link
Contributor

Description

This disables automatic OpenShift routes creation.

How Has This Been Tested?

Smoke testing: turning on Service Mesh and KServe with Serverless. Then, checking that no rejected routes are created in istio-system namespace.

Merge criteria:

  • The commits are squashed in a cohesive manner and have meaningful messages.
  • Testing instructions have been added in the PR body (for PRs involving changes that are not immediately obvious).
  • The developer has manually tested the changes and verified that the changes work

This disables automatic OpenShift routes creation.

Signed-off-by: Edgar Hernández <23639005+israel-hdez@users.noreply.github.com>
@openshift-ci openshift-ci bot requested review from etirelli and LaVLaS November 14, 2023 18:38
@bartoszmajsak bartoszmajsak changed the title Disable Service Mesh IOR fix(ossm): disables service mesh routes generation Nov 14, 2023
Copy link
Contributor

@bartoszmajsak bartoszmajsak left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

thanks!

@bartoszmajsak
Copy link
Contributor

It seems we've been beaten by flaky DSCI tests again.

Copy link
Member

@zdtsw zdtsw left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

Copy link

openshift-ci bot commented Nov 14, 2023

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: bartoszmajsak, zdtsw
Once this PR has been reviewed and has the lgtm label, please assign lavlas for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@zdtsw zdtsw enabled auto-merge (squash) November 14, 2023 18:54
@zdtsw zdtsw merged commit 2c6f48c into opendatahub-io:incubation Nov 14, 2023
2 checks passed
@israel-hdez israel-hdez deleted the smcp-deactivate-ior branch November 14, 2023 19:56
VaishnaviHire pushed a commit to VaishnaviHire/opendatahub-operator that referenced this pull request Nov 15, 2023
This disables automatic OpenShift routes creation.

Signed-off-by: Edgar Hernández <23639005+israel-hdez@users.noreply.github.com>
(cherry picked from commit 2c6f48c)
VaishnaviHire pushed a commit to VaishnaviHire/opendatahub-operator that referenced this pull request Nov 15, 2023
This disables automatic OpenShift routes creation.

Signed-off-by: Edgar Hernández <23639005+israel-hdez@users.noreply.github.com>
(cherry picked from commit 2c6f48c)
zdtsw referenced this pull request in red-hat-data-services/rhods-operator Nov 15, 2023
* feat(kserve): automates installation and configuration of KServe prerequisites (#691)

* Implement installation and configuration of KServe prerequisites

KServe pre-requisites are:
* Service Mesh (Istio)
  * A minimal Control Plane is configured for KServe with only Pilot and default gateways.
  * An additional knative: ingressgateway is set for the Istio Ingress gateway workload.
  * Some ports are excluded from envoy to allow for metrics collection and KNative hooks.
  * Metrics collection is configured for Pilot and the gateways.
* Serverless (KNative)
  * Only serving components are needed from KNative.
  * For the most part, a typical Serving deployment is configured, with Istio as networking layer.
  * By default, a self-signed certificate is generated using the OpenShift Ingress domain. Users can provide their own secret with a production ready TLS certificate.

Signed-off-by: Edgar Hernández <23639005+israel-hdez@users.noreply.github.com>

* chore: updates apis/dscinitialization/v1/servicemesh_types.go

Co-authored-by: Cameron Garrison <cgarriso@redhat.com>

* wip: serverless as part of kserve

* chore: removes identitytype from CRD

* feat: ensures that serverless config is removed when KServe is enabled

* chore: checks if service mesh is configured when serving is enabled

* fix: returns error on fail to remove serverless

* chore(dsci): attempts to reduce test flakyness

* chore: removes misleading TODO

* Fix Dockerfile

Add new COPY statement, due to the new `infrastructure` directory

Signed-off-by: Edgar Hernández <23639005+israel-hdez@users.noreply.github.com>

* chore: regenerates bundle

---------

Signed-off-by: Edgar Hernández <23639005+israel-hdez@users.noreply.github.com>
Co-authored-by: Bartosz Majsak <bartosz.majsak@gmail.com>
Co-authored-by: Cameron Garrison <cgarriso@redhat.com>

* Disable Service Mesh IOR (#738)

This disables automatic OpenShift routes creation.

Signed-off-by: Edgar Hernández <23639005+israel-hdez@users.noreply.github.com>
(cherry picked from commit 2c6f48c)

* Add Defaults for new installs

---------

Signed-off-by: Edgar Hernández <23639005+israel-hdez@users.noreply.github.com>
Co-authored-by: Edgar Hernández <ehernand@redhat.com>
Co-authored-by: Bartosz Majsak <bartosz.majsak@gmail.com>
Co-authored-by: Cameron Garrison <cgarriso@redhat.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: Done
Development

Successfully merging this pull request may close these issues.

3 participants