Skip to content

USHIFT-6912: Add DNS deployment resource configuration support#6621

Open
Neilhamza wants to merge 9 commits intoopenshift:mainfrom
Neilhamza:dns-recources
Open

USHIFT-6912: Add DNS deployment resource configuration support#6621
Neilhamza wants to merge 9 commits intoopenshift:mainfrom
Neilhamza:dns-recources

Conversation

@Neilhamza
Copy link
Copy Markdown
Contributor

@Neilhamza Neilhamza commented May 4, 2026

Allow users to configure CPU and memory resources for the dns container in the dns-default DaemonSet via dns.resources in config.yaml. Defaults to the current hardcoded values (cpu=50m, memory=70Mi requests, no limits) when not configured.

Summary by CodeRabbit

  • New Features

    • DNS container CPU/memory can be configured via requests and optional limits; defaults apply when requests omitted.
  • Documentation

    • Configuration examples and default settings updated to show dns.resources.requests and dns.resources.limits.
  • Bug Fixes

    • Validation now rejects invalid quantities and limits smaller than requests; invalid configs prevent startup with clear errors.
  • Tests

    • Added unit and integration tests plus a Robot Framework suite covering parsing, validation, overrides, and runtime behavior.

Allow users to configure CPU and memory resources for the dns container
in the dns-default DaemonSet via dns.resources in config.yaml. Defaults
to the current hardcoded values (cpu=50m, memory=70Mi requests, no limits)
when not configured.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@openshift-ci-robot
Copy link
Copy Markdown

@Neilhamza: This pull request references USHIFT-6912 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "5.0.0" version, but no target version was set.

Details

In response to this:

Allow users to configure CPU and memory resources for the dns container in the dns-default DaemonSet via dns.resources in config.yaml. Defaults to the current hardcoded values (cpu=50m, memory=70Mi requests, no limits) when not configured.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label May 4, 2026
@coderabbitai
Copy link
Copy Markdown

coderabbitai Bot commented May 4, 2026

Note

Reviews paused

It looks like this branch is under active development. To avoid overwhelming you with review comments due to an influx of new commits, CodeRabbit has automatically paused this review. You can configure this behavior by changing the reviews.auto_review.auto_pause_after_reviewed_commits setting.

Use the following commands to manage reviews:

  • @coderabbitai resume to resume automatic reviews.
  • @coderabbitai review to trigger a single review.

Use the checkboxes below for quick actions:

  • ▶️ Resume reviews
  • 🔍 Trigger review

Walkthrough

Add DNS container resource configuration: new config types and defaults; merge and validate user requests/limits; controller exposes template params; DaemonSet templates request values and optional limits; update schema, packaging, docs, and tests.

Changes

DNS Resource Configuration

Layer / File(s) Summary
Data Shape
pkg/config/dns.go
Add DNSResources (Requests/Limits) and Resources field on DNS.
Defaults
pkg/config/dns.go
dnsDefaults() sets default requests cpu=50m, memory=70Mi.
Validation
pkg/config/dns.go
Add validateResources() to parse quantities, restrict keys to cpu/memory, and enforce limits ≥ requests; DNS.validate() updated.
Config Merge
pkg/config/config.go
incorporateUserSettings() copies user DNS.Resources.Requests/Limits into active config, creating maps when nil.
Controller Wiring
pkg/components/controllers.go
startDNSController() adds template params for DNS requests/limits populated from config.
Manifest Template
assets/components/openshift-dns/dns/daemonset.yaml
DaemonSet dns container renders resources.requests from templated .DNSRequests and conditionally renders resources.limits from .DNSLimits.
Schema & Packaging
cmd/generate-config/config/config-openapi-spec.json, packaging/microshift/config.yaml
OpenAPI spec adds dns.resources.requests and dns.resources.limits; packaging default maps added.
Docs & Examples
docs/user/howto_config.md
Examples updated to include dns.resources with limits: {} and requests: {}.
Tests
pkg/config/config_test.go, test/suites/configuration/dns-resource-configuration.robot
Unit tests for YAML parsing and validation added; Robot Framework suite exercises runtime behavior (defaults, requests-only, partial overrides, invalid quantities, and DNS resolution).

Sequence Diagram

sequenceDiagram
  participant User
  participant ConfigService
  participant Controller
  participant Kubernetes
  participant Pod

  User->>ConfigService: write/edit `dns.resources` drop-in
  ConfigService->>Controller: incorporateUserSettings (merge requests/limits)
  Controller->>Kubernetes: render DaemonSet template with DNS requests/limits params
  Kubernetes->>Pod: create/update CoreDNS Pod with resources set
  Pod->>Kubernetes: report Pod status
Loading

Estimated code review effort

🎯 3 (Moderate) | ⏱️ ~22 minutes

🚥 Pre-merge checks | ✅ 11 | ❌ 1

❌ Failed checks (1 warning)

Check name Status Explanation Resolution
Docstring Coverage ⚠️ Warning Docstring coverage is 50.00% which is insufficient. The required threshold is 80.00%. Write docstrings for the functions missing them to satisfy the coverage threshold.
✅ Passed checks (11 passed)
Check name Status Explanation
Description Check ✅ Passed Check skipped - CodeRabbit’s high-level summary is enabled.
Title check ✅ Passed The title accurately summarizes the main change: adding DNS deployment resource configuration support, which is the core objective across all modified files.
Linked Issues check ✅ Passed Check skipped because no linked issues were found for this pull request.
Out of Scope Changes check ✅ Passed Check skipped because no linked issues were found for this pull request.
Stable And Deterministic Test Names ✅ Passed This PR does not contain any Ginkgo tests. The added tests use standard Go testing (testify) and Robot Framework, neither of which use Ginkgo's BDD-style naming. The custom check is not applicable.
Test Structure And Quality ✅ Passed PR contains no Ginkgo tests. Only Go unit tests (standard testing.T) and Robot Framework tests are present. The check is not applicable to this PR.
Microshift Test Compatibility ✅ Passed No Ginkgo e2e tests added. The PR adds Robot Framework tests and Go unit tests (testing.T), outside the check's scope for Ginkgo e2e tests.
Single Node Openshift (Sno) Test Compatibility ✅ Passed No Ginkgo e2e tests are added. Changes include Go unit tests and Robot Framework tests only. Check applies only to Ginkgo tests.
Topology-Aware Scheduling Compatibility ✅ Passed This PR only adds resource configuration to an existing DaemonSet. No topology-incompatible scheduling constraints (affinity, topology spread, etc.) are introduced.
Ote Binary Stdout Contract ✅ Passed No OTE Binary Stdout Contract violations detected. All modified Go code adds helper functions and configuration processing, not process-level code that could emit non-JSON stdout.
Ipv6 And Disconnected Network Test Compatibility ✅ Passed Check not applicable. Custom check applies to Ginkgo e2e tests in Go. This PR adds only Robot Framework tests, not Ginkgo tests.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests

Tip

💬 Introducing Slack Agent: The best way for teams to turn conversations into code.

Slack Agent is built on CodeRabbit's deep understanding of your code, so your team can collaborate across the entire SDLC without losing context.

  • Generate code and open pull requests
  • Plan features and break down work
  • Investigate incidents and troubleshoot customer tickets together
  • Automate recurring tasks and respond to alerts with triggers
  • Summarize progress and report instantly

Built for teams:

  • Shared memory across your entire org—no repeating context
  • Per-thread sandboxes to safely plan and execute work
  • Governance built-in—scoped access, auditability, and budget controls

One agent for your entire SDLC. Right inside Slack.

👉 Get started


Comment @coderabbitai help to get the list of available commands and usage tips.

@openshift-ci openshift-ci Bot requested review from ggiguash and jogeo May 4, 2026 08:57
Copy link
Copy Markdown

@coderabbitai coderabbitai Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 2

🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Inline comments:
In `@docs/user/howto_config.md`:
- Around line 207-209: The "Default Settings" example shows an empty requests
object ("requests: {}") which is misleading because the system applies defaults;
update the example in the Default Settings section so the effective DNS request
defaults are explicit (e.g., set requests to include cpu: 50m and memory: 70Mi)
and add a short note next to the example clarifying that these values reflect
the system's applied defaults; locate the block containing "resources:" /
"limits:" / "requests:" in the docs and replace the empty requests with the
explicit default key/value pairs and the clarifying note.

In `@pkg/config/dns.go`:
- Around line 131-153: The validateResources method on DNS should reject any
resource keys other than the allowed set ("cpu" and "memory"); update
DNS.validateResources to iterate Requests and Limits and return an error if a
key is not "cpu" or "memory" (before parsing), ensuring both
t.Resources.Requests and t.Resources.Limits are checked, and keep the existing
quantity parsing and comparison logic (use the same error formatting style) so
downstream templating in components/controllers.go and
assets/components/openshift-dns/dns/daemonset.yaml only sees cpu/memory keys.
🪄 Autofix (Beta)

Fix all unresolved CodeRabbit comments on this PR:

  • Push a commit to this branch (recommended)
  • Create a new PR with the fixes

ℹ️ Review info
⚙️ Run configuration

Configuration used: Repository YAML (base), Central YAML (inherited)

Review profile: CHILL

Plan: Enterprise

Run ID: 67ea07fa-e704-476d-83a9-5d9cae789b63

📥 Commits

Reviewing files that changed from the base of the PR and between 9a9d010 and 3a4995e.

📒 Files selected for processing (8)
  • assets/components/openshift-dns/dns/daemonset.yaml
  • cmd/generate-config/config/config-openapi-spec.json
  • docs/user/howto_config.md
  • packaging/microshift/config.yaml
  • pkg/components/controllers.go
  • pkg/config/config.go
  • pkg/config/config_test.go
  • pkg/config/dns.go

Comment thread docs/user/howto_config.md
Comment thread pkg/config/dns.go
Reject unsupported resource keys during config validation to prevent
typos and ensure only cpu/memory are accepted, matching what the
DaemonSet template renders.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@Neilhamza
Copy link
Copy Markdown
Contributor Author

@coderabbitai resolve

@coderabbitai
Copy link
Copy Markdown

coderabbitai Bot commented May 4, 2026

✅ Actions performed

Comments resolved. Approval is disabled; enable reviews.request_changes_workflow to allow explicit top-level @coderabbitai resolve or @coderabbitai approve commands.

@agullon
Copy link
Copy Markdown
Contributor

agullon commented May 4, 2026

hi @Neilhamza thank you very much for creating the PR early in the dev cycle.
Only one question from QE POV, are you planning to add RF tests in current PR or in a separate one?
I think best practise is to added them also in this PR to validate changes are working as expected. Let me know if you have any questions or I can help you with RF tests.

@Neilhamza
Copy link
Copy Markdown
Contributor Author

Thanks for the feedback @agullon !! i was thinking about a seperate PR so i wont bloat this one, but if adding the tests here is the accepted approach i can do it, what do you think? :)

@Neilhamza
Copy link
Copy Markdown
Contributor Author

/test e2e-aws-tests

@agullon
Copy link
Copy Markdown
Contributor

agullon commented May 4, 2026

Thanks for the feedback @agullon !! i was thinking about a seperate PR so i wont bloat this one, but if adding the tests here is the accepted approach i can do it, what do you think? :)

I don't have a strong opinion about when/where add the RF, it's up to you. As I said I think it's better to add them along with product change. This PR is not that big, no problem.

RobotFramework tests covering: default resources, custom requests
and limits, requests only, partial requests, invalid quantity
rejection, and DNS resolution after resource change.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@Neilhamza
Copy link
Copy Markdown
Contributor Author

@coderabbitai perform full review

@coderabbitai
Copy link
Copy Markdown

coderabbitai Bot commented May 4, 2026

Tip

For best results, initiate chat on the files or code changes.

@Neilhamza Sure! Kicking off a full review now.

[full_review]

@Neilhamza
Copy link
Copy Markdown
Contributor Author

@agullon added RF testscoverage - : default resources, custom requests+limits, requests only, partial requests, invalid quantity rejection, and DNS resolution after change

Copy link
Copy Markdown

@coderabbitai coderabbitai Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🧹 Nitpick comments (2)
test/suites/configuration/dns-resource-configuration.robot (2)

141-141: ⚡ Quick win

Make restart-failure assertion less brittle.

Line [141] hardcodes 0 != 1, which tightly couples the test to exact assertion text/order. A wildcard pattern is more resilient to harmless keyword-message changes.

Proposed change
-    Run Keyword And Expect Error    0 != 1    Restart MicroShift
+    Run Keyword And Expect Error    *!=*    Restart MicroShift
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@test/suites/configuration/dns-resource-configuration.robot` at line 141,
Replace the brittle exact-error match in the test's Run Keyword And Expect Error
call: instead of hardcoding the literal '0 != 1' use a wildcard pattern (e.g.
'*') so the assertion matches any error message from the Restart MicroShift
keyword; update the Run Keyword And Expect Error invocation that currently
contains '0 != 1' and 'Restart MicroShift' to use a wildcard error pattern.

42-115: ⚡ Quick win

Add a negative case for limit < request.

The suite validates bad quantity parsing, but it does not yet exercise the limits >= requests validation path in pkg/config/dns.go. Adding this guards an important contract from regressions.

Suggested test addition
+${DNS_INVALID_LIMIT_LT_REQUEST}     SEPARATOR=\n
+...                                 ---
+...                                 dns:
+...                                 \ \ resources:
+...                                 \ \ \ requests:
+...                                 \ \ \ \ cpu: "200m"
+...                                 \ \ \ limits:
+...                                 \ \ \ \ cpu: "100m"
+
+Limit Lower Than Request Prevents Start
+    [Documentation]    Verify MicroShift fails when dns limit is lower than request
+    [Setup]    Apply Invalid DNS Resource Config    ${DNS_INVALID_LIMIT_LT_REQUEST}
+    Pattern Should Appear In Log Output    ${CURSOR}    must be greater than or equal to request
+    [Teardown]    Restore Valid DNS Config
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@test/suites/configuration/dns-resource-configuration.robot` around lines 42 -
115, Add a new negative Robot test case that verifies the config validation
rejects entries where a resource limit is less than the corresponding request
(exercising the limits >= requests path in pkg/config/dns.go); create a test
named like "Invalid Limits Less Than Requests" that uses the existing helper
keywords (Apply DNS Resource Config or a new Apply Invalid DNS Resource Config
with a YAML payload where cpu limit < cpu request and/or memory limit < memory
request), assert the controller/log contains the appropriate error (e.g.,
"invalid dns resource request" or similar via Pattern Should Appear In Log
Output ${CURSOR}) and clean up with the existing teardown keyword (Restore Valid
DNS Config or Remove DNS Resource Config) so the suite remains isolated.
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Nitpick comments:
In `@test/suites/configuration/dns-resource-configuration.robot`:
- Line 141: Replace the brittle exact-error match in the test's Run Keyword And
Expect Error call: instead of hardcoding the literal '0 != 1' use a wildcard
pattern (e.g. '*') so the assertion matches any error message from the Restart
MicroShift keyword; update the Run Keyword And Expect Error invocation that
currently contains '0 != 1' and 'Restart MicroShift' to use a wildcard error
pattern.
- Around line 42-115: Add a new negative Robot test case that verifies the
config validation rejects entries where a resource limit is less than the
corresponding request (exercising the limits >= requests path in
pkg/config/dns.go); create a test named like "Invalid Limits Less Than Requests"
that uses the existing helper keywords (Apply DNS Resource Config or a new Apply
Invalid DNS Resource Config with a YAML payload where cpu limit < cpu request
and/or memory limit < memory request), assert the controller/log contains the
appropriate error (e.g., "invalid dns resource request" or similar via Pattern
Should Appear In Log Output ${CURSOR}) and clean up with the existing teardown
keyword (Restore Valid DNS Config or Remove DNS Resource Config) so the suite
remains isolated.

ℹ️ Review info
⚙️ Run configuration

Configuration used: Repository YAML (base), Central YAML (inherited)

Review profile: CHILL

Plan: Enterprise

Run ID: e441d468-d579-4a05-8012-d779622e04f5

📥 Commits

Reviewing files that changed from the base of the PR and between f3a5a9c and a872cea.

📒 Files selected for processing (1)
  • test/suites/configuration/dns-resource-configuration.robot

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Comment on lines +62 to +70
{{- if .DNSHasLimits }}
limits:
{{- if .DNSCPULimit }}
cpu: {{ .DNSCPULimit }}
{{- end }}
{{- if .DNSMemoryLimit }}
memory: {{ .DNSMemoryLimit }}
{{- end }}
{{- end }}
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why not just give customers whole resources: {}? If they define anything, we take it whatever they provide. Would simplify templating greatly

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I agree . since resource is something generic we might be able to reuse it for different components besides dns. (ie ingress)

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nice! simplified the template to pass resource map directly with range loops of 2 params instead of 7 and is reusable for other components

@pacevedom
Copy link
Copy Markdown
Contributor

/assign

@pacevedom
Copy link
Copy Markdown
Contributor

/assign @eslutsky

@pacevedom
Copy link
Copy Markdown
Contributor

/hold
Wait for enhancement to merge first to avoid subsequent PRs.

@openshift-ci openshift-ci Bot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label May 4, 2026
Pass resource maps directly instead of individual values, use range
loops in the template. Reduces params from 7 to 2 and makes the
pattern reusable for other components.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented May 5, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: Neilhamza
Once this PR has been reviewed and has the lgtm label, please ask for approval from eslutsky. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Reject resource requests below the defaults (cpu: 50m, memory: 70Mi)
to prevent unstable clusters from insufficient DNS resources.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Verify that configuring only limits preserves default requests,
covering the corner case raised in enhancement review.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@Neilhamza Neilhamza requested a review from eslutsky May 5, 2026 09:41
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>

*** Test Cases ***
Default DNS Resources
[Documentation] Verify default DNS resources when no custom config is applied
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
[Documentation] Verify default DNS resources when no custom config is applied
[Documentation] Verify default DNS resources when no custom config is applied
[Setup] Remove DNS Resource Config

Tests must be indempotent, meaning regardless the previous status of the system they must always pass. For that reason the test must enforce default DNS config before checking it.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the detailed review @agullon , i committed this suggested change


Partial Requests Preserves Defaults
[Documentation] Configure only CPU request and verify memory default is preserved
[Setup] Apply DNS Resource Config ${DNS_PARTIAL_REQUESTS}
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

the setup of this test only set requests.cpuin the config.
What would happen if requests.memory was already set to a value different than 70Mi (default) before this test starts? I think it would failed because the different value will still be present when the check is done.
To avoid this test must remove all configurations and then apply any config before doing any check.

Something not great about this suggestion is that MicroShift will restart many times (I think 3) on every test, which will lead into long test executions. Checks take less than a second. Successful microshift restart at least 1 min. We must have this in mind. An alternative may be running all the tests in a predefined order to reduce the number of times microshift restarts.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

fixed - now we remove any existing drop-in before applying the new one

*** Test Cases ***
Default DNS Resources
[Documentation] Verify default DNS resources when no custom config is applied
${cpu}= Oc Get JsonPath daemonset openshift-dns dns-default
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Oc Get JsonPath daemonset openshift-dns dns-default is duplicated 15 times. Can you move it into a Keyword

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

done created Get DNS Resource Value keyword that wraps it

${cpu}= Oc Get JsonPath daemonset openshift-dns dns-default
... .spec.template.spec.containers[0].resources.requests.cpu
${memory}= Oc Get JsonPath daemonset openshift-dns dns-default
... .spec.template.spec.containers[0].resources.requests.memory
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You may also want to extract .spec.template.spec.containers[0].resources into a var ${DNS_RESOURCE_PATH} .spec.template.spec.containers[0].resources and then use it ${DNS_RESOURCE_PATH}.requests.cpu

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

fixed

@Neilhamza
Copy link
Copy Markdown
Contributor Author

/jira refresh

@openshift-ci-robot
Copy link
Copy Markdown

openshift-ci-robot commented May 5, 2026

@Neilhamza: This pull request references USHIFT-6912 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "5.0.0" version, but no target version was set.

Details

In response to this:

/jira refresh

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

- Make tests idempotent by cleaning config in setup before checks
- Extract duplicate jsonpath into Get DNS Resource Value keyword
- Add DNS_RESOURCE_PATH variable for the base container path
- Clean existing drop-in before applying new config in Apply keyword

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Comment on lines +163 to +164
Remove Drop In MicroShift Config ${DNS_DROPIN}
Drop In MicroShift Config ${config} ${DNS_DROPIN}
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Inside Drop In MicroShift Config MicroShift config is being removed.
By only adding Remove Drop In MicroShift Config before Drop In MicroShift Config you are not changing any MicroShift config, only some files. This is because MicroShift config is only update it when microshift restarts. MicroShift must always restart after any config change.

Suggested change
Remove Drop In MicroShift Config ${DNS_DROPIN}
Drop In MicroShift Config ${config} ${DNS_DROPIN}
Remove DNS Resource Config
Drop In MicroShift Config ${config} ${DNS_DROPIN}

Apply Invalid DNS Resource Config
[Documentation] Apply an invalid DNS resource config that should prevent MicroShift from starting
[Arguments] ${config}
Remove Drop In MicroShift Config ${DNS_DROPIN}
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Remove Drop In MicroShift Config ${DNS_DROPIN}
Remove DNS Resource Config

Comment on lines +176 to +184
Remove DNS Resource Config
[Documentation] Remove the DNS resource drop-in config and restart MicroShift
Remove Drop In MicroShift Config ${DNS_DROPIN}
Restart MicroShift

Restore Valid DNS Config
[Documentation] Remove invalid config and restore MicroShift to a working state
Remove Drop In MicroShift Config ${DNS_DROPIN}
Restart MicroShift
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These 2 are the same, let's use only one.

@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented May 5, 2026

@Neilhamza: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-aws-tests-bootc-el10 9861e18 link true /test e2e-aws-tests-bootc-el10
ci/prow/e2e-aws-tests 9861e18 link true /test e2e-aws-tests

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants