-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fixes for attach-detach controller enablement on existing nodes #10748
Conversation
[test] |
fcc7480
to
ecda5d0
Compare
I want to know whether the upstream patch ever got applied. |
it was LGTM, but flake in unit test twice. |
@smarterclayton the upstream is LGTM, in the submit queue now. [test] |
return true | ||
} | ||
|
||
if kl.cloud == nil { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this is a carry we have (88abe47). We should keep the carry distinct from the upstream pick commit, since we'll drop the upstream commit in the next rebase, but keep the carry commit. I guess that means this PR needs to revert the carry, pick the upstream, then reapply the carry on top?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@liggitt I'm cool with doing it that way.
does this primarily impact nodes upgraded from previous releases? have sufficient upgrade tests been run upstream? trying to understand the potential risk and impact |
@liggitt yes, it fixes an issue where a node upgraded from a previous release that has the configuration item set to enable controller attach/detach will not annotate the node resource to tell the controller to do the attach. So, the node will wait for the controller to do the attach, and the controller never actually does it, which breaks all attachable volumes (basically every PV type except hostpath and nfs). |
Does a previous release have enable controller detach set? On Thu, Sep 1, 2016 at 12:03 PM, Paul Morie [email protected]
|
ecda5d0
to
958b522
Compare
} | ||
} | ||
|
||
return true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
move inside the existingNode.Spec.ExternalID == addr.Address
block
958b522
to
6532c6a
Compare
LGTM |
6532c6a
to
3918d6b
Compare
…with no cloud provider
…-detach on existing nodes
…vider Previously, if the kubelet tried to register itself with the API server, and was rejected due to the external ID changing, it would delete the node object and recreate it. This commit causes it to tolerate a change in ExternalID when the ExternalID is not being provided by a cloud provider, assuming the new ExternalID is either the node's (metadata) name, or one of node's addresses.
3918d6b
to
b21d368
Compare
Evaluated for origin test up to b21d368 |
continuous-integration/openshift-jenkins/test SUCCESS (https://ci.openshift.redhat.com/jenkins/job/test_pr_origin/8641/) |
@liggitt tag and bag? 🎨 👝 |
[merge] |
Evaluated for origin merge up to b21d368 |
continuous-integration/openshift-jenkins/merge SUCCESS (https://ci.openshift.redhat.com/jenkins/job/test_pr_origin/8641/) (Image: devenv-rhel7_4972) |
Upstream patches for:
Bug 1370312