Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Race between kubelet startup and mounter prepare #112194

Closed
mattcary opened this issue Sep 1, 2022 · 2 comments · Fixed by #112195 or kubernetes/cloud-provider-gcp#365
Closed

Race between kubelet startup and mounter prepare #112194

mattcary opened this issue Sep 1, 2022 · 2 comments · Fixed by #112195 or kubernetes/cloud-provider-gcp#365
Assignees
Labels
kind/bug Categorizes issue or PR as related to a bug. sig/storage Categorizes an issue or PR as relevant to SIG Storage. triage/accepted Indicates an issue or PR is ready to be actively worked on.

Comments

@mattcary
Copy link
Contributor

mattcary commented Sep 1, 2022

What happened?

In GCE cluster startup, kubelet-start (which puts the cluster DNS server into the containerized mounter resolv.conf when the containerized mounter is enabled) race with prepare-mounter-rootfs (which copies the instance resolve.conf into the containerized mounter fs).

This causes domain resolution from the containerized mounter to be flakey.

What did you expect to happen?

No race to occur.

How can we reproduce it (as minimally and precisely as possible)?

Create a GCE cluster with the containerized mounter enabled. Create several nodes. The nameserver in the resolv.conf file in the mounter fs will not be the same.

Note that while it appears the race has existed for a long time, it's only started to manifest around v1.23.

Anything else we need to know?

No response

Kubernetes version

v1.23+

Cloud provider

GCE

OS version

No response

Install tools

No response

Container runtime (CRI) and version (if applicable)

No response

Related plugins (CNI, CSI, ...) and versions (if applicable)

No response

@mattcary mattcary added the kind/bug Categorizes issue or PR as related to a bug. label Sep 1, 2022
@k8s-ci-robot k8s-ci-robot added needs-sig Indicates an issue or PR lacks a `sig/foo` label and requires one. needs-triage Indicates an issue or PR lacks a `triage/foo` label and requires one. labels Sep 1, 2022
@mattcary
Copy link
Contributor Author

mattcary commented Sep 1, 2022

/sig storage
/assign @mattcary

@k8s-ci-robot k8s-ci-robot added sig/storage Categorizes an issue or PR as relevant to SIG Storage. and removed needs-sig Indicates an issue or PR lacks a `sig/foo` label and requires one. labels Sep 1, 2022
@mattcary
Copy link
Contributor Author

mattcary commented Sep 1, 2022

/triage accepted

@k8s-ci-robot k8s-ci-robot added triage/accepted Indicates an issue or PR is ready to be actively worked on. and removed needs-triage Indicates an issue or PR lacks a `triage/foo` label and requires one. labels Sep 1, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/bug Categorizes issue or PR as related to a bug. sig/storage Categorizes an issue or PR as relevant to SIG Storage. triage/accepted Indicates an issue or PR is ready to be actively worked on.
Projects
None yet
2 participants