-
Notifications
You must be signed in to change notification settings - Fork 82
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Check if the database is available before doing any exclusion checks #1758
Merged
johscheuer
merged 7 commits into
FoundationDB:main
from
johscheuer:check-if-database-is-available
Jul 28, 2023
Merged
Check if the database is available before doing any exclusion checks #1758
johscheuer
merged 7 commits into
FoundationDB:main
from
johscheuer:check-if-database-is-available
Jul 28, 2023
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Result of fdb-kubernetes-operator-pr on Linux CentOS 7
|
Result of fdb-kubernetes-operator-pr on Linux CentOS 7
|
Result of fdb-kubernetes-operator-pr on Linux CentOS 7
|
johscheuer
commented
Jul 26, 2023
sbodagala
reviewed
Jul 27, 2023
sbodagala
approved these changes
Jul 27, 2023
johscheuer
force-pushed
the
check-if-database-is-available
branch
from
July 27, 2023 15:26
1c0de81
to
97b05ea
Compare
johscheuer
commented
Jul 27, 2023
johscheuer
commented
Jul 27, 2023
Result of fdb-kubernetes-operator-pr on Linux CentOS 7
|
Result of fdb-kubernetes-operator-pr on Linux CentOS 7
|
Result of fdb-kubernetes-operator-pr on Linux CentOS 7
|
Seems like the exclusion was stuck for a bad Pod:
|
Result of fdb-kubernetes-operator-pr on Linux CentOS 7
|
Result of fdb-kubernetes-operator-pr on Linux CentOS 7
|
All the test failures that I saw were related to one Pod being stuck in Pending. As the Pod has no IP address, the operator doesn't know if it is safe to remove it or not. I create a radar to make the test suite handle those cases better and the operator too. |
Result of fdb-kubernetes-operator-pr on Linux CentOS 7
|
johscheuer
added a commit
to johscheuer/fdb-kubernetes-operator
that referenced
this pull request
Aug 2, 2023
…oundationDB#1758) * Check if the database is available before doing any exclusion checks
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
We want to make sure that the database is available if we do any checks for the exclusion status based on the machine-readable status. If the database is unavailable we could hit a case were processes are reported but not the roles for them. In this case it will be better to wait until the database is available again.
Type of change
Please select one of the options below.
Discussion
I decided to return all processes as "not excluded" to prevent the operator doing any additional checks with the exclude command, as the exclude command could make the unavailable database state even worse.
Testing
Unit tests.
Documentation
Follow-up