-
Notifications
You must be signed in to change notification settings - Fork 39.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
sync CNI config in goroutine #74389
sync CNI config in goroutine #74389
Conversation
Hi @answer1991. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
PTAL |
PTAL |
/ok-to-test |
/kind bug |
We encounter the same question, LGTM |
exec hack/update-bazel.sh please, if you modify |
a6f07eb
to
4fe13c2
Compare
cool, already done. Thanks |
/retest |
Discussed with @squeed this morning. I think this is an acceptable workaround for now. In the very near future we'd like to kill the periodic resync entirely and make the plugin choice more declarative, whether through a disk file or the kubelet ConfigMap (since dockershim doesn't have its own config options yet, they still go through Kubelet). /approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: answer1991, dcbw The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/retest Review the full test history for this PR. Silence the bot with an |
1 similar comment
/retest Review the full test history for this PR. Silence the bot with an |
Actually, we had already refactor CNI config using ConfigMap in our downstream K8S. But the implement has already broken the CNI specification. So this PR use this workaround to follow the CNI specification. Please feel free to let me know if you need any help when you start to refactor these codes, me and @changyaowei would like to provide some helps. |
@answer1991 I'm actually rethinking the ConfigMap bits; depending on the runtime you use (dockershim or crio or something else) kubelet may not be involved in the CNI decisions at all. So having any network plugin options in the kubelet config would be useless with a remote runtime like CRIO. Plus, dockershim is supposed to eventually also be a remote runtime and wouldn't use the kubelet options. Which leads me to believe that perhaps the file-based approach is a better one for now, even if it isn't as "kubernetes-y". |
What type of PR is this?
What this PR does / why we need it:
This PR fixes #74388 .
Kubelet run a new goroutine to sync CNI config if the runtime is dockershim, which fix the unexpected NotReady status when Node's iops is full.
Which issue(s) this PR fixes:
Fixes #74388
Special notes for your reviewer:
Before this fix, sync CNI config in the status check is inappropriate.
Does this PR introduce a user-facing change?: