-
Couldn't load subscription status.
- Fork 1.8k
OCPBUGS-45800#updating resources info #89851
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
OCPBUGS-45800#updating resources info #89851
Conversation
7a07f2f to
24f4a79
Compare
|
@jinyunma, PTAL at the draft update. |
24f4a79 to
7414928
Compare
| *** For Azure, delete the `api-internal-v4` rule for the public load balancer. | ||
| *** For {azure-short}, you must delete the following resources: | ||
| ** The `api-v4` rule for the public load balancer. | ||
| ** The `frontenIPConfiguration` that is associated with the public load balancer. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Here frontenIPConfiguration is associated with api-v4 rule in public load balancer
| *** For {azure-short}, you must delete the following resources: | ||
| ** The `api-v4` rule for the public load balancer. | ||
| ** The `frontenIPConfiguration` that is associated with the public load balancer. | ||
| ** The public IP that is associated with the public load balancer. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
public IP refers to the ip specified in frontenIPConfiguration
| ** The `api-v4` rule for the public load balancer. | ||
| ** The `frontenIPConfiguration` that is associated with the public load balancer. | ||
| ** The public IP that is associated with the public load balancer. | ||
| ** The Network Security Group (NSG) rule for port 22. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
sorry, this should be incorrect, no nsg rule to be removed in this case. I updated description in the bug as well.
7414928 to
69ad32e
Compare
|
/lgtm |
69ad32e to
e4c0a0b
Compare
|
New changes are detected. LGTM label has been removed. |
| . In the web portal or console for your cloud provider, take the following actions: | ||
|
|
||
| .. Locate and delete the appropriate load balancer component: | ||
| ifndef::cpmso-using-azure[] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🤖 [error] AsciiDoc.ValidConditions: File contains unbalanced if statements. Review the file to ensure it contains matching opening and closing if statements.
| ifndef::cpmso-using-azure[] | ||
| *** For {aws-short}, delete the external load balancer. The API DNS entry in the private zone already points to the internal load balancer, which uses an identical configuration, so you do not need to modify the internal load balancer. | ||
| endif::cpmso-using-azure[] | ||
| ifndef::cpmso-using-aws[] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🤖 [error] AsciiDoc.ValidConditions: File contains unbalanced if statements. Review the file to ensure it contains matching opening and closing if statements.
| endif::cpmso-using-aws[] | ||
|
|
||
| .. Delete the | ||
| ifdef::cpmso-using-aws[`api.$clustername.$yourdomain`] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🤖 [error] AsciiDoc.ValidConditions: File contains unbalanced if statements. Review the file to ensure it contains matching opening and closing if statements.
|
|
||
| .. Delete the | ||
| ifdef::cpmso-using-aws[`api.$clustername.$yourdomain`] | ||
| ifdef::post-install[`api.$clustername.$yourdomain` or] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🤖 [error] AsciiDoc.ValidConditions: File contains unbalanced if statements. Review the file to ensure it contains matching opening and closing if statements.
| ifndef::cpmso-using-aws[`api.$clustername`] | ||
| DNS entry in the public zone. | ||
|
|
||
| ifdef::cpmso-using-aws[] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🤖 [error] AsciiDoc.ValidConditions: File contains unbalanced if statements. Review the file to ensure it contains matching opening and closing if statements.
| <2> Delete the `type` value for the external load balancer. | ||
| endif::cpmso-using-aws[] | ||
|
|
||
| ifdef::post-install[] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🤖 [error] AsciiDoc.ValidConditions: File contains unbalanced if statements. Review the file to ensure it contains matching opening and closing if statements.
|
/label peer-review-needed |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Left a few comments, but nice job navigating the complex conditional stuff. It can be like a logic puzzle sometimes. Some of my comments are a little long and complicated, so let me know if you have questions about any of them!
|
|
||
| .. Locate and delete the appropriate load balancer component: | ||
| ifndef::cpmso-using-azure[] | ||
| *** For {aws-short}, delete the external load balancer. The API DNS entry in the private zone already points to the internal load balancer, which uses an identical configuration, so you do not need to modify the internal load balancer. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I understand that existing docs may have this "For [platform name], do this step" format, but I'd suggest checking out the ISG section on indicating conditional steps. In short, you're supposed to preface the step with a condition or use an "if" statement before writing your step as normal.
I do think that your current structure is probably close enough to follow the spirit of that rule, so I'll suggest rewrites of this step based on the rule, but it's up to you if you think the feedback should be applied:
| *** For {aws-short}, delete the external load balancer. The API DNS entry in the private zone already points to the internal load balancer, which uses an identical configuration, so you do not need to modify the internal load balancer. | |
| *** {aws-short} clusters: Delete the external load balancer. The API DNS entry in the private zone already points to the internal load balancer, which uses an identical configuration, so you do not need to modify the internal load balancer. |
| *** For {aws-short}, delete the external load balancer. The API DNS entry in the private zone already points to the internal load balancer, which uses an identical configuration, so you do not need to modify the internal load balancer. | ||
| endif::cpmso-using-azure[] | ||
| ifndef::cpmso-using-aws[] | ||
| *** For {azure-short}, you must delete the following resources: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Same suggestion as before:
| *** For {azure-short}, you must delete the following resources: | |
| *** {azure-short} clusters: Delete the following resources: |
However, even if you don't use that suggestion, you must rewrite the first sentence to be in the imperative mood either way. That rule is also stated on the same ISG page:
| *** For {azure-short}, you must delete the following resources: | |
| *** For {azure-short}, delete the following resources: |
| *** For {azure-short}, you must delete the following resources: | ||
| ** The `api-v4` rule for the public load balancer. | ||
| ** The `frontenIPConfiguration` that is associated with the `api-v4` rule for the public load balancer. | ||
| ** The public IP that is specified in the `frontenIPConfiguration`. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could you add some sort of noun so that the backticks phrase/term is used as an adjective and not a noun? In general, doing so for all terms in backticks helps increase clarity:
| ** The public IP that is specified in the `frontenIPConfiguration`. | |
| ** The public IP that is specified in the `frontenIPConfiguration` parameter. |
I'm guessing the noun would be parameter but feel free to swap with anything more appropriate.
| ** The `frontenIPConfiguration` that is associated with the `api-v4` rule for the public load balancer. | ||
| ** The public IP that is specified in the `frontenIPConfiguration`. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I looked around the docs and I think this is a typo here, please confirm with SME/QE:
| ** The `frontenIPConfiguration` that is associated with the `api-v4` rule for the public load balancer. | |
| ** The public IP that is specified in the `frontenIPConfiguration`. | |
| ** The `frontendIPConfiguration` that is associated with the `api-v4` rule for the public load balancer. | |
| ** The public IP that is specified in the `frontendIPConfiguration`. |
| ** The `frontenIPConfiguration` that is associated with the `api-v4` rule for the public load balancer. | ||
| ** The public IP that is specified in the `frontenIPConfiguration`. | ||
|
|
||
| .. For {azure-short}, configure the Ingress Controller endpoint publishing scope to `Internal`. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Same suggestion as before, which I'm now noticing would align with how this line is written anyways:
| .. For {azure-short}, configure the Ingress Controller endpoint publishing scope to `Internal`. | |
| .. {azure-short} clusters: Configure the Ingress Controller endpoint publishing scope to `Internal`. |
|
|
||
| .. For the {azure-short} public load balancer, if you configure the Ingress Controller endpoint publishing scope to `Internal` and there are no existing inbound rules in the public load balancer, you must create an outbound rule explicitly to provide outbound traffic for the backend address pool. | ||
| For more information, see the Microsoft Azure documentation about adding outbound rules. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This step is a tough one but I feel like it needs to be rewritten somehow. Here are the issues I see with it:
- The beginning condition is so long to describe, and seems more like a substep of the previous step (i.e. it's worded like "if you did the last step and there are no existing inbound rules on the load balancer, you need to do this").
- It seems redundant (to me) to start with "for the load balancer" when the condition is really for Azure clusters and the load balancer context is mentioned later in the sentence
- As mentioned in a previous comment, this instruction is written as "you must do this" rather than "do this".
Here are my suggestions for you to consider.
Keep this as a step but clean it up to make it more like an instruction, maybe something like this:
| .. For the {azure-short} public load balancer, if you configure the Ingress Controller endpoint publishing scope to `Internal` and there are no existing inbound rules in the public load balancer, you must create an outbound rule explicitly to provide outbound traffic for the backend address pool. | |
| For more information, see the Microsoft Azure documentation about adding outbound rules. | |
| .. {azure-short} clusters: If you configure the Ingress Controller endpoint publishing scope to `Internal` and there are no existing inbound rules in the public load balancer, create an outbound rule explicitly to provide outbound traffic for the backend address pool. | |
| For more information, see the Microsoft Azure documentation about adding outbound rules. |
I don't like that option as much since it has two conditional statements, one of which seems to be based off the previous step. You can also make this a part of the previous step, either as another line or as a NOTE/IMPORTANT admonition:
| .. For the {azure-short} public load balancer, if you configure the Ingress Controller endpoint publishing scope to `Internal` and there are no existing inbound rules in the public load balancer, you must create an outbound rule explicitly to provide outbound traffic for the backend address pool. | |
| For more information, see the Microsoft Azure documentation about adding outbound rules. | |
| + | |
| [IMPORTANT] | |
| ==== | |
| If you configure the Ingress Controller endpoint publishing scope to `Internal` and there are no existing inbound rules in the public load balancer, you must create an outbound rule explicitly to provide outbound traffic for the backend address pool. | |
| For more information, see the Microsoft Azure documentation about adding outbound rules. | |
| ==== |
e4c0a0b to
046ab01
Compare
|
@brendan-daly-red-hat: all tests passed! Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
|
The This is because your PR targets the If the update in your PR does NOT apply to version 4.20 onward, please re-target this PR to go directly into the appropriate version branch or branches (enterprise-4.x) instead of main. |
|
In section same issues in AWS doc, procedure 1&2 are duplicated with procedure 3&4. |
| + | ||
| [IMPORTANT] | ||
| ==== | ||
| If you configure the Ingress Controller endpoint publishing scope to `Internal` and there are no existing inbound rules in the public load balancer, you must create an outbound rule explicitly to provide outbound traffic for the backend address pool. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Starting from 4.17+, installer create the outbound rule explicitly in public load balancer to provide outbound traffic, so I think there is no need to add this IMPORTANT admonition.
|
Issues go stale after 90d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle stale |
|
The This is because your PR targets the If the update in your PR does NOT apply to version 4.21 onward, please re-target this PR to go directly into the appropriate version branch or branches (enterprise-4.x) instead of main. |
Versions:
4.17+
Issue:
https://issues.redhat.com/browse/OCPBUGS-45800
Link to docs preview:
The updated module is reflected in these pages:
QE review:
Additional information:
From what I understand, the Vale messages below aren't valid. It is suggesting the ifdef statement requires an endif, but that's not required here. See #86647.