Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[connectivity] Retry deleting namespace while waiting #976

Conversation

jaredledvina
Copy link
Contributor

When https://github.com/yahoo/k8s-namespace-guard is setup and the connectivity tests are run with --force-deploy, this loop gets stuck waiting for the namespace to be deleted. This is because it takes a while for the pods to get removed after the deployment is gone but, the namespace-guard has already rejected the original deletion request.

In my testing, the simplest fix is to just add the deletion here which does work once the pods are gone. The logic just above this already takes care of issuing the delete request for objects that the namespace-guard cares about, there's simply a race between those commands and line 646.

@jaredledvina jaredledvina requested a review from a team as a code owner July 15, 2022 19:26
@jaredledvina jaredledvina temporarily deployed to ci July 15, 2022 19:26 Inactive
@squeed
Copy link
Contributor

squeed commented Jul 18, 2022

Seems silly but reasonable. Want to add a comment explaining the "useless" delete?

Also, k8s-ns-guard is horribly outdated (it doesn't even have a go.mod). Is there a more current version that is being deployed?

@jaredledvina
Copy link
Contributor Author

@squeed - I can add a comment yeah. Unaware of another version of it at this time.

Signed-off-by: Jared Ledvina <jared.ledvina@datadoghq.com>
@jaredledvina jaredledvina force-pushed the jared.ledvina/happier-delete-namespace-check-connectivity branch from 62debdd to 855bdcb Compare July 18, 2022 11:45
@jaredledvina jaredledvina temporarily deployed to ci July 18, 2022 11:45 Inactive
@tklauser tklauser merged commit ddc03cf into cilium:master Jul 26, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants