Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fc: Drop multipath.conf snippet #36698

Merged
merged 2 commits into from
Mar 24, 2017

Conversation

fabiand
Copy link
Contributor

@fabiand fabiand commented Nov 12, 2016

What this PR does / why we need it:
Removes multipath.conf - The code does not make use of it - or ensure s that it's getting used - and it should in addition be handled elsewehre.

Which issue this PR fixes (optional, in fixes #<issue number>(, #<issue_number>, ...) format, will close that issue when PR gets merged): fixes #

Special notes for your reviewer:

Release note:

A minimalistic multipath.conf got written, but it was useless, as
it is unclear if multipathd is running and there was also no
config reload triggered.

This patch drops this snippet. In general it's probably a better idea
to leave the multipath.conf to the component managing the host.

Signed-off-by: Fabian Deutsch fabiand@fedoraproject.org


This change is Reviewable

@k8s-ci-robot
Copy link
Contributor

Can a kubernetes member verify that this patch is reasonable to test? If so, please reply with "@k8s-bot ok to test" on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands will still work. Regular contributors should join the org to skip this step.

If you have questions or suggestions related to this bot's behavior, please file an issue against the [kubernetes/test-infra](https://github.com/kubernetes/test-infra/issues/new?title=Prow%20issue:) repository.

@googlebot
Copy link

Thanks for your pull request. It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA).

📝 Please visit https://cla.developers.google.com/ to sign.

Once you've signed, please reply here (e.g. I signed it!) and we'll verify. Thanks.


  • If you've already signed a CLA, it's possible we don't have your GitHub username or you're using a different email address. Check your existing CLA data and verify that your email is set on your git commits.
  • If you signed the CLA as a corporation, please let us know the company's name.

@fabiand
Copy link
Contributor Author

fabiand commented Nov 12, 2016

@rootfs Could you please review this patch.

@fabiand
Copy link
Contributor Author

fabiand commented Nov 12, 2016

I signed the CNCF CLA as an employee, and my email address I used for submission is also associated to my github account. Let me know what else I should check to get this recognized by the bot.

@k8s-github-robot k8s-github-robot added size/S Denotes a PR that changes 10-29 lines, ignoring generated files. release-note-label-needed labels Nov 12, 2016
@dims
Copy link
Member

dims commented Nov 12, 2016

@k8s-bot ok to test

@dims
Copy link
Member

dims commented Nov 12, 2016

@fabiand can you please leave a message for the bot exactly with the words "I signed it!" in a new comment?

@fabiand
Copy link
Contributor Author

fabiand commented Nov 12, 2016

I signed it!

@dims
Copy link
Member

dims commented Nov 13, 2016

@kubernetes/test-infra-admins Can you please check why we still have cla:no after following all instructions from the bot

@apelisse
Copy link
Member

@foxish can you have a look?

@rootfs
Copy link
Contributor

rootfs commented Nov 14, 2016

multipath.conf is used for devicemapper. If it is not there, devicemapper multipath won't start properly.

@fabiand
Copy link
Contributor Author

fabiand commented Nov 14, 2016

Right - But who is taking care to bring up multipathd once the file is written?

Also: I wonder if not the OS is responsible for configuring multipath.

@rootfs
Copy link
Contributor

rootfs commented Nov 14, 2016

Yes, FC hosts are expected to have multipathd systemd service enabled and started.

@fabiand
Copy link
Contributor Author

fabiand commented Nov 14, 2016

Even if multipathd.service is enabled and started, then it still has no effect, because multipathd must be reloaded/-started to pickup the new multipath.conf. And I do not see that this is happening in the kubelet.

@fabiand
Copy link
Contributor Author

fabiand commented Nov 14, 2016

Besides that - The kubelet should not write multipath conf.

Depending on the default settings of multipath conf it could wreck an OS - the device names could change on a next reboot, which could lead to an unbootable host.

@rootfs
Copy link
Contributor

rootfs commented Nov 14, 2016

No, the code doesn't overwrite existing multipath.conf. It creates one only if none is there.
multipathd reload could be an issue. I'll get a setup to test it.

@rootfs
Copy link
Contributor

rootfs commented Nov 15, 2016

Ok, I found multipathd needs to restart to pick up new multipath.conf. Also confirmed by reading mpathconf.

Starting multipathd service or enabling multipath using mpathconf are both fixes to me. @fabiand ?

@fabiand
Copy link
Contributor Author

fabiand commented Nov 15, 2016

I would object if I can :) I think it's just wrong to do it from the kubelet.
Like networking, this basic storage configuration should be part of the build process.

Instead of modifying it I'd then suggest to rather raise a warning or alike.

multipath.conf is really something to the host, and not something an application like the kubelet should manage or modify.
As stated above - it can wreck the host.

Also: If you run the kubelet in a container - then any multipath configuration will not have any effect.

@rootfs
Copy link
Contributor

rootfs commented Nov 15, 2016

ok, I buy your containerized kubelet point :)
In addition to the code change, please also update readme mentioning multipath.conf requisite.

@foxish
Copy link
Contributor

foxish commented Nov 15, 2016

@dims We still haven't transitioned to the CNCF CLA and require the Google CLA at this time. The transition is likely to happen during this week or the next.

@dims
Copy link
Member

dims commented Nov 15, 2016

@foxish Ack. thanks!

@fabiand
Copy link
Contributor Author

fabiand commented Nov 16, 2016

@rootfs I've added an README to cover the multipath configuration which applies to both (or at least) iSCSI and FC.

I actually wonder if multipath is really working for iSCSI today ..

@k8s-github-robot k8s-github-robot added size/M Denotes a PR that changes 30-99 lines, ignoring generated files. and removed size/S Denotes a PR that changes 10-29 lines, ignoring generated files. labels Nov 16, 2016
@rootfs
Copy link
Contributor

rootfs commented Nov 16, 2016

@fabiand

FAILED   hack/make-rules/../../hack/verify-munge-docs.sh    16s

@rootfs
Copy link
Contributor

rootfs commented Nov 16, 2016

@fabiand I don't have an iscsi multipath to verify either.

@fabiand
Copy link
Contributor Author

fabiand commented Nov 16, 2016

@rootfs fhe failure seems to be unrelated. Can it be retriggered?

@k8s-github-robot k8s-github-robot added release-note Denotes a PR that will be considered when it comes time to generate release notes. and removed release-note-label-needed labels Dec 13, 2016
@fabiand
Copy link
Contributor Author

fabiand commented Dec 16, 2016

Yes - I'll get to it again!

@jsafrane
Copy link
Member

/approve

@jsafrane
Copy link
Member

... and nothing happened, interesting. Anyway, our Jenkins complains:

I1116 01:13:01.990] Some md files are missing ga-beacon analytics link:
I1116 01:13:01.991] /go/src/k8s.io/kubernetes/pkg/volume/README.md
I1116 01:13:01.991] Docs need munging. Please run hack/update-munge-docs.sh
I1116 01:13:01.992] FAILED   hack/make-rules/../../hack/verify-munge-docs.sh	16s

Please run hack/update-munge-docs.sh and force-push this branch so it can be merged, thanks.

@k8s-github-robot k8s-github-robot added approved Indicates a PR has been approved by an approver from all required OWNERS files. and removed approved Indicates a PR has been approved by an approver from all required OWNERS files. labels Jan 24, 2017
@k8s-github-robot k8s-github-robot assigned saad-ali and unassigned rootfs Jan 30, 2017
@jsafrane jsafrane removed the cla: no label Feb 1, 2017
A minimalistic multipath.conf got written, but it was useless, as
it is unclear if multipathd is running and there was also no
config reload triggered.

This patch drops this snippet. In general it's probably a better idea
to leave the multipath.conf to the component managing the host.

Signed-off-by: Fabian Deutsch <fabiand@fedoraproject.org>
Add some lines about how to enable multipath for block storage.
A new README was added, because multipath is relevant for at least
FC and iSCSI.

Signed-off-by: Fabian Deutsch <fabiand@fedoraproject.org>
@jsafrane
Copy link
Member

@k8s-bot verify test this
@k8s-bot bazel test this
@k8s-bot kops aws e2e test this

These were not started or logs are not available ("Unable to load build details from gs://kubernetes-jenkins/pr-logs/pull/36698/pull-kubernetes-verify/4824")

@jsafrane
Copy link
Member

Fabian has signed CLA and google-bot knows about it, as it can be seen e.g. in #41408. There is something wrong in this PR, I'm labeling it as cla-yes manually.

@jsafrane jsafrane added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Feb 24, 2017
@fabiand
Copy link
Contributor Author

fabiand commented Feb 24, 2017

I've rebased the patch and force-pushed it to the branch.
I was not able to run /hacks/update-munge-docs.shand runninghack/update-all.sh -v -a` lead to a gazillion changes, so that I did not include those in the PR.

Let's see what the automation comes up now with.

@jsafrane
Copy link
Member

@k8s-bot unit test this
flake #34953

@jsafrane
Copy link
Member

@k8s-bot gci gce e2e test this

#41902

@jsafrane
Copy link
Member

jsafrane commented Mar 9, 2017

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Mar 9, 2017
@k8s-github-robot
Copy link

[APPROVALNOTIFIER] This PR is APPROVED

The following people have approved this PR: fabiand, jsafrane

Needs approval from an approver in each of these OWNERS Files:

We suggest the following people:
cc @matchstick
You can indicate your approval by writing /approve in a comment
You can cancel your approval by writing /approve cancel in a comment

@jsafrane
Copy link
Member

jsafrane commented Mar 9, 2017

@k8s-bot gce etcd3 e2e test this

@fabiand
Copy link
Contributor Author

fabiand commented Mar 24, 2017

@jsafrane anything I need to provide? or just the usual test cycles?

@jsafrane
Copy link
Member

@fabiand, Kubernetes is frozen due to 1.6 release, merge queue should open later today. This PR is in the right state, prepared for merging, no action is needed.

@k8s-github-robot
Copy link

Automatic merge from submit-queue

@k8s-github-robot k8s-github-robot merged commit 2df943c into kubernetes:master Mar 24, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. release-note Denotes a PR that will be considered when it comes time to generate release notes. size/M Denotes a PR that changes 30-99 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

10 participants