-
Notifications
You must be signed in to change notification settings - Fork 686
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Relax pod disruption budget for single node clusters #3167
Conversation
Since this is a community submitted pull request, a Jenkins build has not been kicked off automatically. Can an Elastic organization member please verify the contents of this patch and then kick off a build manually? |
💚 CLA has been signed |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @sanderma! I think your proposal makes sense 👍
I have a few suggestions about moving the code to a different place. Also can you make sure unit tests are modified accordingly?
Yeah I would consider it the user responsibility at this point. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Changes LGTM!
@sanderma it looks like you need to resolve some conflicts for this PR to be merged.
Also, can you sign the CLA? https://www.elastic.co/contributor-agreement
Ooof, I was running on an old branch as it seems (used v1beta1, not v1) so changed that.
Signed it (I did in the past btw, but perhaps this needs to be done regularly?) |
Jenkins test this please. |
cla/check |
@sanderma it looks like your commits were signed by different users (I see An easy way out could be to rebase and squash all your commits into a single one signed by the user you want. |
moved logic to allowedDisruptions() comment dots removed.
993df1c
to
7d6abf4
Compare
Pff, I've learned to start with a pull before diving in again... |
Jenkins test this please |
With elastic#3167 we allow the single Pod of a single node cluster to be disrupted, since we consider a single-node cluster is not intended to be highly available anyway.
With elastic#3167 we allow the single Pod of a single node cluster to be disrupted, since we consider a single-node cluster is not intended to be highly available anyway.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM. Thanks @sanderma!
With #3167 we allow the single Pod of a single node cluster to be disrupted, since we consider a single-node cluster is not intended to be highly available anyway.
See issue PDB per Node type (Master, Data, Ingest) #2936
This PR will make sure that when someone deploys a single node cluster, the pdb does not get set to 1.
If someone deploys a single node cluster now, it can make sure the k8s cluster cannot reboot.
The default setting for single node, IMHO, should not set the pdb to 1.
This change makes sure that when it is single node, the pdb is 0. When the elastic cluster is scaled up, the pdb is calculated as "normal".