-
Notifications
You must be signed in to change notification settings - Fork 331
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add retry checker for DNS failure from Ingress #2351
Conversation
knative/serving#12294 runs this patch and seems error could be avoided. |
Codecov Report
@@ Coverage Diff @@
## main #2351 +/- ##
==========================================
- Coverage 64.52% 63.67% -0.85%
==========================================
Files 226 227 +1
Lines 9668 9814 +146
==========================================
+ Hits 6238 6249 +11
- Misses 3154 3288 +134
- Partials 276 277 +1
Continue to review full report at Codecov.
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/approve
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: markusthoemmes, nak3 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
I guess to clarify this isn't a flake as it consistently failed in Kind running on GitHub actions. Thus I wonder if the retry is masking some other issue. The other concerns I have, and let me know if this is just paranoia, is that by including this error checker by default we could mask issues in other ingresses and wouldn't know about it |
To be more specific this only failed on GitHub actions with kind 1.22 & net-istio |
I was also concerned but it retries only for the no DNS record in the internal DNS temporary. |
Then maybe as part of probing we should ensure that DNS works as expected. K8s 1.22 introduces a newer CoreDNS version - ie. with endpoint slice support thus maybe istio isn't playing well with it |
Sounds fair enough! Shall we track this and make sure we do our due diligence here? |
Sure, opened knative/networking#575 |
This patch fixes the recent flake in
service_to_service_test.go
on Kind/Istio.istio-ingressgateway returns 502 with no such host error when it fails to resolve the cluster domain.
/cc @markusthoemmes