You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently kubenurse discovers all running neighbour Pods (see kubediscovery.go). If we perform maintenance on a Node it is possible that the kubenurse instance on this node can't be reached - which is not neccesairly a problem. Thus graphs/metrics might show errors (or even trigger false alarms).
Proposal
Exclude kubenurse instances from Nodes where scheduling is disabled.
Further enhancement
Disable checks entirely on a kubenurse instance if the node the instance runs on has scheduling disabled (to avoid possible service check errors for example).
The text was updated successfully, but these errors were encountered:
as there weren't many interaction on this issue, I think that there is not enough interest in disabling checks when the node is unschedulable.
also, given the default tolerations of the daemonset, when a node is NotReady, with the node.kubernetes.io/unreachable:NoExecute taint, the pod will be deleted.
if someone needs this feature in the future, feel free to reopen 🙃
Problem statement
Currently kubenurse discovers all running neighbour Pods (see kubediscovery.go). If we perform maintenance on a Node it is possible that the kubenurse instance on this node can't be reached - which is not neccesairly a problem. Thus graphs/metrics might show errors (or even trigger false alarms).
Proposal
Exclude kubenurse instances from Nodes where scheduling is disabled.
Further enhancement
Disable checks entirely on a kubenurse instance if the node the instance runs on has scheduling disabled (to avoid possible service check errors for example).
The text was updated successfully, but these errors were encountered: