Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(controller): prevent negative vsvc weights on a replica scaledown following a canary abort for istio trafficrouting #3467

Merged

Conversation

shubhajyoti-bagchi-groww
Copy link
Contributor

@shubhajyoti-bagchi-groww shubhajyoti-bagchi-groww commented Mar 23, 2024

fixes: #3470

Checklist:

  • Either (a) I've created an enhancement proposal and discussed it with the community, (b) this is a bug fix, or (c) this is a chore.
  • The title of the PR is (a) conventional with a list of types and scopes found here, (b) states what changed, and (c) suffixes the related issues number. E.g. "fix(controller): Updates such and such. Fixes #1234".
  • I've signed my commits with DCO
  • I have written unit and/or e2e tests for my change. PRs without these are unlikely to be merged.
  • My builds are green. Try syncing with master if they are not.
  • My organization is added to USERS.md.

@shubhajyoti-bagchi-groww shubhajyoti-bagchi-groww changed the title controller: Fixed negative canary weight bug for istio trafficrouting fix: prevent negative canary weights on a replica scaledown following a canary abort for istio trafficrouting Mar 23, 2024
@shubhajyoti-bagchi-groww shubhajyoti-bagchi-groww changed the title fix: prevent negative canary weights on a replica scaledown following a canary abort for istio trafficrouting fix: prevent negative vsvc weights on a replica scaledown following a canary abort for istio trafficrouting Mar 23, 2024
Copy link

codecov bot commented Mar 23, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 82.81%. Comparing base (8405f2e) to head (b2e5fd1).
Report is 53 commits behind head on master.

Additional details and impacted files
@@            Coverage Diff             @@
##           master    #3467      +/-   ##
==========================================
+ Coverage   81.83%   82.81%   +0.97%     
==========================================
  Files         135      135              
  Lines       20688    16998    -3690     
==========================================
- Hits        16931    14077    -2854     
+ Misses       2883     2034     -849     
- Partials      874      887      +13     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

Copy link
Contributor

github-actions bot commented Mar 23, 2024

Go Published Test Results

2 142 tests   2 142 ✅  2m 51s ⏱️
  119 suites      0 💤
    1 files        0 ❌

Results for commit b2e5fd1.

♻️ This comment has been updated with latest results.

@shubhajyoti-bagchi-groww shubhajyoti-bagchi-groww changed the title fix: prevent negative vsvc weights on a replica scaledown following a canary abort for istio trafficrouting fix(controller): prevent negative vsvc weights on a replica scaledown following a canary abort for istio trafficrouting Mar 23, 2024
Copy link
Contributor

github-actions bot commented Mar 23, 2024

E2E Tests Published Test Results

  4 files    4 suites   3h 45m 52s ⏱️
109 tests 101 ✅  6 💤  2 ❌
448 runs  412 ✅ 24 💤 12 ❌

For more details on these failures, see this check.

Results for commit b2e5fd1.

♻️ This comment has been updated with latest results.

dependabot bot and others added 9 commits March 24, 2024 16:06
…m 1.36.1 to 1.36.3 (argoproj#3452)

chore(deps): bump github.com/aws/aws-sdk-go-v2/service/cloudwatch

Bumps [github.com/aws/aws-sdk-go-v2/service/cloudwatch](https://github.com/aws/aws-sdk-go-v2) from 1.36.1 to 1.36.3.
- [Release notes](https://github.com/aws/aws-sdk-go-v2/releases)
- [Commits](aws/aws-sdk-go-v2@service/ec2/v1.36.1...service/ssm/v1.36.3)

---
updated-dependencies:
- dependency-name: github.com/aws/aws-sdk-go-v2/service/cloudwatch
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <[email protected]>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Signed-off-by: shubhajyoti-bagchi-groww <[email protected]>
Signed-off-by: shubhajyoti-bagchi-groww <[email protected]>
Signed-off-by: shubhajyoti-bagchi-groww <[email protected]>
Signed-off-by: shubhajyoti-bagchi-groww <[email protected]>
Signed-off-by: shubhajyoti-bagchi-groww <[email protected]>
…1.10.0 (argoproj#3462)

chore(deps): bump slsa-framework/slsa-github-generator

Bumps [slsa-framework/slsa-github-generator](https://github.com/slsa-framework/slsa-github-generator) from 1.9.1 to 1.10.0.
- [Release notes](https://github.com/slsa-framework/slsa-github-generator/releases)
- [Changelog](https://github.com/slsa-framework/slsa-github-generator/blob/main/CHANGELOG.md)
- [Commits](slsa-framework/slsa-github-generator@v1.9.1...v1.10.0)

---
updated-dependencies:
- dependency-name: slsa-framework/slsa-github-generator
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Signed-off-by: shubhajyoti-bagchi-groww <[email protected]>
…ancingv2 from 1.30.3 to 1.30.4 (argoproj#3461)

chore(deps): bump github.com/aws/aws-sdk-go-v2/service/elasticloadbalancingv2

Bumps [github.com/aws/aws-sdk-go-v2/service/elasticloadbalancingv2](https://github.com/aws/aws-sdk-go-v2) from 1.30.3 to 1.30.4.
- [Release notes](https://github.com/aws/aws-sdk-go-v2/releases)
- [Commits](aws/aws-sdk-go-v2@service/s3/v1.30.3...service/s3/v1.30.4)

---
updated-dependencies:
- dependency-name: github.com/aws/aws-sdk-go-v2/service/elasticloadbalancingv2
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <[email protected]>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Signed-off-by: shubhajyoti-bagchi-groww <[email protected]>
Signed-off-by: shubhajyoti-bagchi-groww <[email protected]>
Copy link

sonarcloud bot commented Mar 24, 2024

Quality Gate Passed Quality Gate passed

Issues
0 New issues
0 Accepted issues

Measures
0 Security Hotspots
No data about Coverage
0.0% Duplication on New Code

See analysis details on SonarCloud

@shubhajyoti-bagchi-groww
Copy link
Contributor Author

@zachaller Would you be able to take a look at this ?

@OpenGuidou
Copy link
Contributor

Hi,
Thanks for this proposal.

If I understand well, this case occurs when the stable.AvailableReplicas > rollout.spec.Replicas, when we use HPA, right ?
If so, does the e2e test really testing this use case ?

@shubhajyoti-bagchi-groww
Copy link
Contributor Author

Hi @OpenGuidou, thanks for the response

Right, this happens in cases whenever stable.AvailableReplicas > rollout.spec.Replicas

HPA is one way where stable.AvailableReplicas > rollout.spec.Replicas without any manual intervention
However, in the issue in which we faced, we had a need to reduce the number of replicas of the rollout which was in aborted state and came across the issue.

The e2e test here focuses on breaking the existing flow using one of the scenarios, without this fix. It kind of reproduces exactly what we faced.

Copy link
Contributor

@OpenGuidou OpenGuidou left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, thanks !

@Eslam-mohammed-anwar
Copy link

we have a similar issue #3470

@zachaller zachaller merged commit 4b1cc3b into argoproj:master Mar 26, 2024
24 checks passed
@Eslam-mohammed-anwar
Copy link

@zachaller when should it be released ?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Virtual service desired wight in negative number
5 participants