Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix static pod UID generation and cleanup #4508

Merged
merged 1 commit into from Jul 31, 2023

Conversation

brandond
Copy link
Contributor

@brandond brandond commented Jul 26, 2023

Proposed Changes

Partial revert of 53d8510

This reverts static pod UID generation to use the same logic as the kubelet, in favor of manually removing stale static pods for etcd and the apiserver. The fixed pod UID was an attempt to trick the kubelet into syncing static pod containers even when the apiserver was unavailable, but it had the downside of preventing it from ever updating the mirror pods. This was confusing for end users who expect the pods visible via the apiserver to reflect what is actually running on the nodes.

Types of Changes

bugfix

Verification

See linked issue

Linked Issues

Further Comments

Note for QA: Please be sure to test this on a multi-server split-role (etcd-only/control-plane-only) cluster. I have validated it locally but would appreciate an extra set of eyes.

@brandond brandond requested a review from a team as a code owner July 26, 2023 00:24
@brandond brandond force-pushed the static_pod_uid2 branch 3 times, most recently from 58122d1 to d4bed77 Compare July 26, 2023 08:04
Partial revert of 53d8510

This reverts static pod UID generation to use the same logic as the
kubelet, in favor of manually removing stale static pods for etcd and
the apiserver. The fixed pod UID was an attempt to trick the kubelet
into syncing static pod containers even when the apiserver was
unavailable, but it had the downside of preventing it from ever updating
the mirror pods. This was confusing for end users who expect the pods
visible via the apiserver to reflect what is actually running on the
nodes.

Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants