Uploaded image for project: 'Jenkins'
  1. Jenkins
  2. JENKINS-52584

Wrong availability zone in essentials for aws

    XMLWordPrintable

    Details

    • Similar Issues:
    • Sprint:
      Evergreen - Milestone 1

      Description

      used us-east-1 instead of us-east-1c

      Exception during provisioning
      com.amazonaws.services.ec2.model.AmazonEC2Exception: Invalid availability zone: [us-east-1] (Service: AmazonEC2; Status Code: 400; Error Code: InvalidParameterValue; Request ID: 92e3fbd3-b953-427f-9c44-0e56eb3d0c63)
      

        Attachments

          Activity

          Hide
          batmat Baptiste Mathus added a comment -

          Pretty sure this is the same issue I found this morning, and should be fixed with https://github.com/jenkins-infra/evergreen/pull/142/files#diff-92a47b588160b35d96b2b4271c571a2aL13

           

          Carlos Sanchez can you confirm/retry with the new image? https://github.com/jenkins-infra/evergreen/pull/142 was merged 9 hours ago, and https://hub.docker.com/r/jenkins/evergreen/tags/ updated 8 hours.

           

          I just checked, and the latest image has the right content:

           

          docker pull jenkins/evergreen:aws-ec2-cloud && docker run --rm jenkins/evergreen:aws-ec2-cloud cat /usr/share/jenkins/ref/configuration/ec2-cloud.yaml
          aws-ec2-cloud: Pulling from jenkins/evergreen
          Digest: sha256:1bb2fcee0e3a17bdc29cba2aacdeee504c9589a3b375577e90438d72d91375a3
          Status: Image is up to date for jenkins/evergreen:aws-ec2-cloud
          ---
          jenkins:
            clouds:
              - amazonEC2:
                  cloudName: "ec2"
                  instanceCapStr: 20
                  # this shouldn't be needed, since without explicit creds this should
                  # already be used but let's be explicit to avoid issues.
                  useInstanceProfileForCredentials: true
                  privateKey: "${PRIVATE_KEY}"
                  templates:
                    - description: "EC2 Agent"
                      ami: "ami-032b0a5293352ac96"
                      labelString: "agent"
                      type: "T2Xlarge"
                      securityGroups: "${AGENT_SECURITY_GROUP}"
                      remoteFS: "/home/ec2-user"
                      remoteAdmin: "ec2-user"
                      # FIXME: JENKINS-52319: without this, NPE during provisioning
                      userData: ""
                      # FIXME: JENKINS-52334: mode *required*, broken if missing.
                      mode: NORMAL
           
          Show
          batmat Baptiste Mathus added a comment - Pretty sure this is the same issue I found this morning, and should be fixed with https://github.com/jenkins-infra/evergreen/pull/142/files#diff-92a47b588160b35d96b2b4271c571a2aL13   Carlos Sanchez can you confirm/retry with the new image? https://github.com/jenkins-infra/evergreen/pull/142  was merged 9 hours ago, and https://hub.docker.com/r/jenkins/evergreen/tags/  updated 8 hours.   I just checked, and the latest image has the right content:   docker pull jenkins/evergreen:aws-ec2-cloud && docker run --rm jenkins/evergreen:aws-ec2-cloud cat /usr/share/jenkins/ref/configuration/ec2-cloud.yaml aws-ec2-cloud: Pulling from jenkins/evergreen Digest: sha256:1bb2fcee0e3a17bdc29cba2aacdeee504c9589a3b375577e90438d72d91375a3 Status: Image is up to date for jenkins/evergreen:aws-ec2-cloud --- jenkins: clouds: - amazonEC2: cloudName: "ec2" instanceCapStr: 20 # this shouldn't be needed, since without explicit creds this should # already be used but let's be explicit to avoid issues. useInstanceProfileForCredentials: true privateKey: "${PRIVATE_KEY}" templates: - description: "EC2 Agent" ami: "ami-032b0a5293352ac96" labelString: "agent" type: "T2Xlarge" securityGroups: "${AGENT_SECURITY_GROUP}" remoteFS: "/home/ec2-user" remoteAdmin: "ec2-user" # FIXME: JENKINS-52319: without this, NPE during provisioning userData: "" # FIXME: JENKINS-52334: mode *required*, broken if missing. mode: NORMAL
          Hide
          batmat Baptiste Mathus added a comment -

          Deemed to be resolved, see last comment.

          Show
          batmat Baptiste Mathus added a comment - Deemed to be resolved, see last comment.

            People

            Assignee:
            batmat Baptiste Mathus
            Reporter:
            csanchez Carlos Sanchez
            Votes:
            0 Vote for this issue
            Watchers:
            2 Start watching this issue

              Dates

              Created:
              Updated:
              Resolved: