-
-
Notifications
You must be signed in to change notification settings - Fork 11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[ci.jenkins.io] Create private EKS cluster with "side" services (datadog, ACP, etc.) #4319
Comments
Discussed with @smerle33:
|
change of usage for the module since last time we used it https://github.com/terraform-aws-modules/terraform-aws-eks/blob/master/docs/UPGRADE-20.0.md |
We choose to deal with all the IAM usage within the private repository https://github.com/jenkins-infra/terraform-states/commit/cfd08c45dd4153d676c9223670f927d515585679 |
As per https://github.com/jenkins-infra/kubernetes-management/pull/6020/files#r1890521384, we'll start with datadog (changed since yesterday) |
Update:
=> cluster still has 1 node but it is up and running Next steps:
|
|
As per the cluster-autoscaler and coredns recommendations, we should not do this as it may constrain the cluster when operating upgrades. We shall let the scheduler do its job instead (as in EKS, like AKS, it relaxes constraints when possible) |
https://reports.jenkins.io/jenkins-infra-data-reports/aws-sponsorship.json => LGTM |
Update: had to re-create the cluster to ensure a successful bootstrap. There was a lot of node creation attempts in
Related code changes:
|
…as unique release (#6020) as per jenkins-infra/helpdesk#4319 (comment) starting adding the new EKS cluster to infra.ci kubernetes-management kubeconfig added as secrets here jenkins-infra/charts-secrets@a24b1ec and datadog api key here jenkins-infra/charts-secrets@c7505e8 need #6021⚠️ BEFORE merging this PR we need to create the `datadog` namespace using : ``` kubectl config use-context arn:aws:eks:us-east-2:326712726440:cluster/cijenkinsio-agents-2 kubectl create ns datadog ``` splitting in multiple PR: this one is with the minimum release possible, so only datadog as a start
Annnnd datadog is installed: jenkins-infra/kubernetes-management#6020 Merry Christmas! |
Update: starting work for installing ACP. First set of working hypothesis for the initial deployment: Internal SVC and standard (gp3) EBS persistence. Goal is to have an initial working deployment which can be used internally to the EKS cluster (e.g. by container agents). Second set of hypothesis: Use a "private LB". Goal is to allow EC2 VM agents to access ACP, without opening it publicly. We'll have to monitor ACP metrics once we'll start using it (mainly CPU and EBS IOPS) to see if it does not need more. |
Task list:
|
Related to jenkins-infra/helpdesk#4319 (comment) This PR introduces ACP in the AWS EKS cluster `cijenkinsio-agents-2`. it's the first set of hypothesis (EBS persistence on gp3)
ACP is now installed (jenkins-infra/terraform-aws-sponsorship#74, jenkins-infra/terraform-aws-sponsorship#75, jenkins-infra/kubernetes-management#6073) |
Next steps (all elements have the same priority):
|
for part 1 (jenkins namespace, service account, rbac and iam link with VM iam identity and kubernetes service account): namespace, service account and rbac are dealt with the helm chart: https://github.com/jenkins-infra/helm-charts/tree/main/charts/jenkins-kubernetes-agents |
We need a private EKS cluster to run ci.jenkins.io container agents.
The text was updated successfully, but these errors were encountered: