-
Notifications
You must be signed in to change notification settings - Fork 38.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Pod status updates take longer to propagate to the API than necessary #116617
Comments
One key actual state report for me is to see that the kubelet has at least seen the pod and, if you like, acknowledged its responsibility for further status updates. I think that's the update to set |
Right, that's another good one. Please add others. Note however that it may take 50ms for a round trip of a pod status, and some containers might start and go ready within that time. Would be good to think through how we want to bias towards these, or whether workload characteristics might matter. |
/sig node |
With SSA, the kubelet can fire off multiple |
Right - Kubelet would simply need to guarantee that no two SSAs for the same pod are inflight at once. |
Not even that. No two conflicting SSAs. For example, I think we can send a request to apply |
/triage accepted |
Re: two inflight SSAs for non-conflicting operations to the same pod For our own sanity, we probably don't want to have to reason about that while debugging :) |
This issue has not been updated in over 1 year, and should be re-triaged. You can:
For more details on the triage process, see https://www.kubernetes.dev/docs/guide/issue-triage/ /remove-triage accepted |
What happened?
#107897 originally identified a number of inefficiencies in how pod status is reported back to the API:
In general these contribute to #113606 and should be improved.
/sig node
/sig scalability
What did you expect to happen?
Faster
How can we reproduce it (as minimally and precisely as possible)?
See kubelet logs. Several e2e tests stress this flow, but we need a test that shows the improvements.
Anything else we need to know?
No response
Kubernetes version
Cloud provider
OS version
Install tools
Container runtime (CRI) and version (if applicable)
Related plugins (CNI, CSI, ...) and versions (if applicable)
The text was updated successfully, but these errors were encountered: