Skip to content

Instantly share code, notes, and snippets.

View jayunit100's full-sized avatar
🎯
Focusing

jay vyas jayunit100

🎯
Focusing
View GitHub Profile
From b7ed3381f37933fb34fb5d77942ab59440a758f4 Mon Sep 17 00:00:00 2001
From: Matthew Fenwick <[email protected]>
Date: Sun, 6 Dec 2020 09:45:51 -0500
Subject: [PATCH 1/2] NetworkPolicy Validation suite
Co-authored-by: Matt Fenwick <[email protected]>
Co-authored-by: Jay Vyas <[email protected]>
Co-authored-by: Rich Renner <[email protected]>
Co-authored-by: Sedef Savas <[email protected]>
Co-authored-by: Guangyang Wang <[email protected]>
@jayunit100
jayunit100 / gist:f2e978a2639455f22563027cdb9e838a
Created October 5, 2020 00:06
kube-proxy dependent tests in sig-network (excluding slow/disruptive/ipv6)
[
"[sig-network] Networking Granular Checks: Services should function for client IP based session affinity: http [LinuxOnly]",
"[sig-network] Services should have session affinity work for NodePort service [LinuxOnly] [Conformance]",
"[sig-network] Networking should check kube-proxy urls",
"[sig-network] Networking Granular Checks: Services should be able to handle large requests: udp",
"[sig-network] Conntrack should be able to preserve UDP traffic when server pod cycles for a ClusterIP service",
"[sig-network] ClusterDns [Feature:Example] should create pod that uses dns",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce multiple ingress policies with ingress allow-all policy taking precedence [Feature:NetworkPolicy]",
"[sig-network] SCTP [Feature:SCTP] [LinuxOnly] should allow creating a basic SCTP service with pod and endpoints",
"[sig-network] Services should be able to update service type to NodePort listening on same port number but differ
commit 2597df1a71dc27a0d491e36e478ccc29a60d47dd
Author: jay vyas <[email protected]>
Date: Wed Aug 26 17:10:44 2020 -0400
AZURE_CLIENT_SECRET
diff --git a/release-pipelines/install-pipelines/azure.gvy b/release-pipelines/install-pipelines/azure.gvy
index 1a98a4b..d9c7a22 100644
--- a/release-pipelines/install-pipelines/azure.gvy
+++ b/release-pipelines/install-pipelines/azure.gvy
#@ def antreayaml():
---
apiVersion: apiextensions.k8s.io/v1beta1
kind: CustomResourceDefinition
metadata:
labels:
app: antrea
name: antreaagentinfos.clusterinformation.antrea.tanzu.vmware.com
spec:
group: clusterinformation.antrea.tanzu.vmware.com
---
# Source: calico/templates/calico-config.yaml
# This ConfigMap is used to configure a self-hosted Calico installation.
kind: ConfigMap
apiVersion: v1
metadata:
name: calico-config
namespace: kube-system
data:
# Typha is disabled.

IP A indicates we're on vlan101

➜  tkgcli-nsx-job git:(TKG-1745) ✗ ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
cat << EOF > calico-conf.yaml
kind: Cluster
apiVersion: kind.sigs.k8s.io/v1alpha3
networking:
disableDefaultCNI: true # disable kindnet
#!/bin/bash
for i in `govc ls vm | grep mgmt` ; do govc vm.destroy $i ; done
# This script pulls a TKG release down from a URL (change it as needed).
# After pulling it then creates a small payload with ovas, kubectl, tkg-client
# That script can then be used to test tanzu on NSX using the conventions in this folder.
BUILD=362
wget https://kscom.svc.eng.vmware.com/view/production/job/build-tkg/${BUILD}/artifact/tkgversion.txt
for c in `./tkg get clusters | cut -d'|' -f 2 | grep -v '+' | grep -v NAME` ; do
tkg get credentials $c ;
kubectl config use-context $c-admin@$c ; kubectl cluster-info ;
done
#!/bin/bash
# This script pulls a TKG release down from a URL (change it as needed).
# After pulling it then creates a small payload with ovas, kubectl, tkg-client
# That script can then be used to test tanzu on NSX using the conventions in this folder.
BUILD=362
wget https://kscom.svc.eng.vmware.com/view/production/job/build-tkg/${BUILD}/artifact/tkgversion.txt