Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Observe .spec.publishNotReadyAddresses. #61056

Conversation

bmcustodio
Copy link
Contributor

What this PR does / why we need it:

This PR makes a service's .spec.publishNotReadyAddresses field be observed when set to true. If set to false or not set, the value to service.alpha.kubernetes.io/tolerate-unready-endpoints is used.

Which issue(s) this PR fixes (optional, in fixes #<issue number>(, fixes #<issue_number>, ...) format, will close the issue(s) when PR gets merged):
Fixes #58662.

Special notes for your reviewer:
I am not sure what the best way to test this would be. Would appreciate some guidance.

Release note:

Observe `.spec.publishNotReadyAddresses` if set to `true`.

@k8s-ci-robot k8s-ci-robot added release-note Denotes a PR that will be considered when it comes time to generate release notes. size/M Denotes a PR that changes 30-99 lines, ignoring generated files. labels Mar 12, 2018
@k8s-ci-robot
Copy link
Contributor

Hi @bmcstdio. Thanks for your PR.

I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot k8s-ci-robot added needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. labels Mar 12, 2018
@bmcustodio
Copy link
Contributor Author

/kind bug
/sig network

@k8s-ci-robot k8s-ci-robot added kind/bug Categorizes issue or PR as related to a bug. sig/network Categorizes an issue or PR as relevant to SIG Network. labels Mar 12, 2018
@thomaslee
Copy link

Thanks for looking into this @bmcstdio 😃

@bmcustodio
Copy link
Contributor Author

/assign @mikedanese

tolerateUnreadyEndpoints = b
} else {
utilruntime.HandleError(fmt.Errorf("Failed to parse annotation %v: %v", TolerateUnreadyEndpointsAnnotation, err))
if service.Spec.PublishNotReadyAddresses == true {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This has to be the other way - the annotation has to be preferred if it exists. Otherwise it is not fully backwards compatible

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@thockin thanks! I have amended it.

Signed-off-by: Bruno Miguel Custodio <[email protected]>
@bmcustodio bmcustodio force-pushed the bcustodio/publish-not-ready-addresses branch from e1069e3 to 4157c24 Compare March 23, 2018 21:32
@mikedanese
Copy link
Member

This seems correct to me but I would like to cc @bowei and @enisoc on the change.

@mikedanese
Copy link
Member

LGTM
/approve

@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: bmcstdio, mikedanese

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Mar 29, 2018
@enisoc
Copy link
Member

enisoc commented Mar 29, 2018

/hold
/assign @kow3ns

I believe @kow3ns considered this approach (make the field mean exactly the same thing as the original annotation) and decided not to do it because the way the original annotation works is hacky (conflates endpoint readiness and endpoint publishing).

The discussion and new plan are in #49239. To summarize: The annotation works by lying about Unready endpoints, telling downstream consumers that they are Ready. The proposed solution for the new field is to tell downstream consumers which endpoints are Ready, which endpoints are Unready, and whether we want to publish the Unready ones anyway (hence the name publishNotReadyAddresses). This preserves accurate readiness info while still achieving the original goal of the annotation (publishing endpoints before they're ready).

Unfortunately, the process stalled because the next step is to update downstream components that don't live in this repo (kube-dns, coredns?). I'd love to see progress on this issue, but I don't think this PR is the way we want to go unless the consensus on #49239 is reversed.

@k8s-ci-robot k8s-ci-robot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Mar 29, 2018
@thomaslee
Copy link

@enisoc I'm still a bit ignorant to most things Kubernetes & just trying to follow along, so excuse the possibly silly question: should users expect different semantics between what's implemented in the annotation & what's planned for publishNotReadyAddresses? If so, what might those differences be?

@enisoc
Copy link
Member

enisoc commented Apr 2, 2018

@thomaslee If all you care about is having a headless service that publishes a DNS entry for each endpoint regardless of Readiness, I don't think you would notice a difference between the current annotation's behavior and the plan for the publishNotReadyAddresses field as discussed in #49239. As far as I know, the concern was mostly about the implementation details of the annotation, not the externally visible behavior.

@thomaslee
Copy link

@enisoc great, glad to hear it -- thank you!

@mikedanese mikedanese removed their assignment Apr 3, 2018
@k8s-ci-robot
Copy link
Contributor

@bmcstdio: PR needs rebase.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot k8s-ci-robot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label May 17, 2018
@bmcustodio
Copy link
Contributor Author

I believe this can be closed now that #63742 has been merged. /cc @thockin

@idealhack
Copy link
Member

@bmcstdio Thanks for your work. Closing.

/close

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. kind/bug Categorizes issue or PR as related to a bug. needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. release-note Denotes a PR that will be considered when it comes time to generate release notes. sig/network Categorizes an issue or PR as relevant to SIG Network. size/M Denotes a PR that changes 30-99 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

publishNotReadyAddresses not working on service
9 participants