New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bug 1800425: More appropriate annotation name #476
Bug 1800425: More appropriate annotation name #476
Conversation
/assign @frobware |
6e7be34
to
09ddefd
Compare
pkg/controller/machinehealthcheck/machinehealthcheck_controller.go
Outdated
Show resolved
Hide resolved
pkg/controller/machinehealthcheck/machinehealthcheck_controller.go
Outdated
Show resolved
Hide resolved
/retest |
pkg/controller/machinehealthcheck/machinehealthcheck_controller.go
Outdated
Show resolved
Hide resolved
@beekhof: This pull request references Bugzilla bug 1800425, which is invalid:
Comment In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/retest |
/bugzilla refresh @enxebre I was going to wait until the other PR merged and then rebase this one |
@beekhof: This pull request references Bugzilla bug 1800425, which is invalid:
Comment In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
I agree with the intent here, but now the strategy name remains generic (reboot -> external) while the annotation is provider-specific: Could we make the strategy name match more closely? Also, I forget, is this still feature gated in a way that blocks upgrades? If not, even if it's still tech-preview, can we update it like this? If I update an existing cluster that uses the |
Since MHC has no control over how the machine is remediated, it would be better not to imply that it will (only) be via reboot.
efa500d
to
49faa03
Compare
Rebased now that #475 has been merged.
Are we just talking about changing Otherwise, the challenge of using I don't think we can both have
I don't believe it is feature gated in 4.3, but we've also never shipped anything that depended these annotations. That does not exclude the possibility that customers have dug into the MAO internals and implemented something - but are annotations held to the same versioning standards as CRDs? I thought that was part of the attraction of using annotations when the "final" interface is still an open question. |
49faa03
to
5dad62c
Compare
5dad62c
to
736ecbe
Compare
Resolved goof when merging with #475 |
pkg/controller/machinehealthcheck/machinehealthcheck_controller.go
Outdated
Show resolved
Hide resolved
Yeah, sorry, that wasn't very clear. More or less what you described, yeah. If different strategies result in provider specific annotations going onto Machine objects, I just think the
Fair enough. I think you're probably right. I mostly wanted to bring up that the current behavior for an unknown strategy is to just silently fallback to "delete the Machine", which I think is a separate issue. I'll file a bug on that. |
@bison happy enough with the change to give lgtm? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
@enxebre what do you think, can we target this for 4.4? |
/bugzilla refresh |
@enxebre: This pull request references Bugzilla bug 1800425, which is valid. The bug has been moved to the POST state. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: enxebre The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/retest Please review the full test history for this PR and help us cut down flakes. |
2 similar comments
/retest Please review the full test history for this PR and help us cut down flakes. |
/retest Please review the full test history for this PR and help us cut down flakes. |
@beekhof: All pull requests linked via external trackers have merged. Bugzilla bug 1800425 has been moved to the MODIFIED state. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@beekhof: The following test failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
We have renamed the annotation to machine.openshift.io/remediation-strategy: external-baremetal to reflect the possibility there might be other external remediation strategies in future. The reboot based external remediation strategy is currently focused on bare metal use cases. See also openshift/machine-api-operator#476
We have renamed the annotation to machine.openshift.io/remediation-strategy: external-baremetal to reflect the possibility there might be other external remediation strategies in future. The reboot based external remediation strategy is currently focused on bare metal use cases. See also openshift/machine-api-operator#476 This commit also stress that this annotation is to enable experimental development to happen out of tree. If a strong ecosystem of remediation strategies ever emerge an adhoc follow up proposal must be provided with fleshed out details for stronger integration and full lifecycle.
Since MHC has no control over how the machine is remediated, it would be
better not to imply that it will (only) be via reboot.