-
Notifications
You must be signed in to change notification settings - Fork 38.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
promote coredns 1.8.4 in kube 1.22 #99751
Comments
Thanks for taking this up! I have reviewed some of the DNS PRs.
|
There is a bug in CoreDNS 1.8.3 (and 1.8.1) that causes CoreDNS to fail to start while the k8s API is down. Eventually once the k8s API is up, CoreDNS will start. I don't know if this is severe enough of an issue to hold back until it is fixed. It would at least have the potential to cause a notable delay in CoreDNS starting, due to crashloop backoff. I don't know if it could cause more serious bootstrap type issues (wherein some process relies on CoreDNS forwarding queries out of cluster before the API can start). |
i think it's too late for bumping coredns for 1.21 at this point.
the cluster/addons folder used to be owned by SIG Cluster Lifecycle, but now this falls under the GCP cloud provider as they consume the addon installer for testing. from my POV the public use of addons/* is depracated.
thanks for the info, this contributes to my vote to delay the update. |
|
/sig network cluster-lifecycle |
/sig network |
Hi, I hope I don't disturb on this issue but maybe I have relevant information. We already planned to make use of coredns 1.8.3. However we found an issue regarding headless services. Beginning with coredns 1.8.3 (I did not find any images for 1.8.1 or 1.8.2 to test), coredns does still resolve names of headless services, while the pods itself is not yet marked as ready. Am I missing something here or does this look like a bug or breaking change? I have a gist here to reproduce it using Edit: I forgot to mention that the description of
|
@chrischdi |
Thanks for identifying it!, Yes, it's a bug, introduced with the move from the Endpoints API to EndpointSlices API. I opened a PR to fix it. coredns/coredns#4580 |
@pacoxu : we are also running the e2e conformance tests. Shouldn't there be a test for this (something like |
/cc |
cluster/ is still necessary for CI for the immediate future, we should continue to minimally maintain there for the purposes of kubernetes CI signal. It's not really relevant to GCP, we just run it in GCP because:
I disagree that this is SIG cloud provider. It's SIG everyone that wants e2e coverage beyond kind. |
it's also important to note that kubernetes/hack/local-up-cluster.sh Line 42 in 3a47ddc
kubernetes/hack/local-up-cluster.sh Line 949 in 3a47ddc
|
I made a mistake here. I thought that the dns-autoscaler only supports old kube-dns, however, it supports both kube-dns and coredns.
I am not sure which is the best practice. Or we should use BTW, I will look into #100795 later for the dns-autoscaling case failure before. |
My 2 cents: I don't know about best practice, but theoretically it does makes sense to use the cluster proportional auto-scaler in conjunction with a https://kubernetes.io/docs/tasks/administer-cluster/dns-horizontal-autoscaling/ doesn't provide guidance on what the value should be. It just says "Modify the fields according to your needs." |
Did this get done? |
Yes I think |
As far as I know, before that, we should update https://github.com/coredns/corefile-migration as well for kubeadm upgrading or so.
next step:
As 1.21 code freeze is next week, I'm not sure whether we should support it in this release or next.
I also checked the node local dns part.
https://github.com/ldir-EDB0/dnsmasq/blob/master/CHANGELOG#L111-L114
Cleanup of kube-dns:
BTW, is there a plan to remove https://github.com/kubernetes/kubernetes/tree/master/cluster/addons/dns/kube-dns as deprecated? (kube-dns rbac related issue #60897)
What would you like to be added:
Currently, the coredns using in Kubernetes is 1.7.0.
The newer version includes 1.7.1\1.8.0\1.8.3\1.8.4.
The kubeadm supports 1.8.0 so I did a cleanup in #
Why is this needed:
I go through the release notes in coredns/coredns. More info can be found in https://github.com/coredns/coredns/blob/master/notes/coredns-1.8.3.md
/cc @prameshj @rajansandeep
Not in 1.22 as it is not merged yet:
The text was updated successfully, but these errors were encountered: