-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Service type LoadBalancer with externalTrafficPolicy: Local needs to work out of the box #212
Comments
Simple test scripts covering that: With
|
There is When you apply the wait condition for the test nginx pod we know that the pod is running and know that the error is coming from the loadbalancer. I am not sure if you can use the |
Yes, explicitly checking whether the pod is running already would be a good idea; Ruling out this potential error source.
Ah, did not know that In the testing setup, this is set earlier that traffic actually reaches the running pod. Another idea might be to look into K8s events, but I do not think that they are meant for automated use cases. So, this is either a fixable bug in the current implementation, or we could adjust the script to handle the first non-successful requests as non-fatal and only consider the case as failed if (a) a testcase timeout occurs or (b) a request failed when a prior request succeeded. |
@joshmue I could not find any spec yet from k8s. I think we just did this for our own sanity. |
Decision:
Additionally look into CCM whether we can delay reporting LB service IP until LB is ACTIVE. |
Upated simple test scripts: With
|
Test fails as it should against a loadbalancer on our Ref.Impl. unless we enable health-monitors by default, which is exactly what we expect. |
As SCS container user, I need to be sure that deploying a standard nginx-ingress controller will create the needed L4 load-balancer that works without me having to tweak things with provider-dependent (infrastructure-specific) annotations.
Trouble currently is that various cloud-infras require tweaked deployment yamls to pass on custom annotations, e.g. to enable a health-monitor on OpenStack (with our current k8s-cluster-api-provider ref. implementation, because of the interaction between a NodePort-based load balancer and
externalTrafficPolicy: Local
as set by nginx ingress).Definition of Ready:
Definition of Done:
The text was updated successfully, but these errors were encountered: