-
Notifications
You must be signed in to change notification settings - Fork 4.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enable ExperimentalCriticalPodAnnotation feature gate #3345
Enable ExperimentalCriticalPodAnnotation feature gate #3345
Conversation
Otherwise, it is possible that critical system components will be evicted kubernetes#3194 kubernetes/kubernetes#51432 Closes kubernetes#3194
Hi @andreychernih. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
/assign @justinsb |
/ok-to-test |
pkg/model/components/kubelet.go
Outdated
@@ -191,5 +192,8 @@ func (b *KubeletOptionsBuilder) BuildOptions(o interface{}) error { | |||
} | |||
clusterSpec.Kubelet.PodInfraContainerImage = image | |||
|
|||
clusterSpec.Kubelet.FeatureGates = make(map[string]string) | |||
clusterSpec.Kubelet.FeatureGates["ExperimentalCriticalPodAnnotation"] = "true" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If you enabled a experimental feature, it worth to document it somewhere.
/ping @justinsb |
@andreychernih thanks for fixing... this puts us in a messy situation; we don't really want to get into the habit of enabling experimental features by default because they are (by definition) experimental. But in this case it seems that the behaviour when we don't have the flag on is pretty pathological. One option might be to enable it on k8s 1.8 clusters, for example, and document that, and then hopefully this will eventually become a non-experimental feature. But this is bad enough that I think it's worth forcing, as you have done. I think at this point we'll cut kops 1.8-alpha as our next release, and then we can just document this as a potentially breaking change in kops 1.8 (which will work for earlier k8s versions also). I think we need to make sure of a few things:
I think this is achieved by tweaking the logic to be:
Technically this was only introduced in 1.5.2 IIUC, but people running 1.5 should be running later revisions anyway. I'm not sure whether we want to skip this on 1.4 - again nobody should be running it, but we don't want to break anyone. But I can try this out and send a PR if you don't get there first! @andreychernih you are probably very aware of the trade-offs here - do you agree with this analysis? We have some 1.8 release notes WIP here: https://github.com/kubernetes/kops/blob/master/docs/releases/1.8-NOTES.md |
@justinsb yeah, this makes sense, thanks for looking. I've submitted the changes, can you give it another look, please? |
} | ||
|
||
return k8sVersion.GTE(*parsedVersion) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ah - so this is annoying...
The problem is that 1.8.0-alpha.1
is considered to be less than 1.8.0
. So 1.8.0-alpha.1
wouldn't match "1.8".
That said, we could just mask out the alpha.1
version before the comparison - I do like this approach!
/lgtm I'm going to mask out the |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: justinsb The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these OWNERS Files:
You can indicate your approval by writing |
/test all [submit-queue is verifying that this PR is safe to merge] |
Automatic merge from submit-queue. . |
Otherwise, it is possible that critical system components will be evicted
#3194
kubernetes/kubernetes#51432