-
Notifications
You must be signed in to change notification settings - Fork 268
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Configurable taint effect #273
Comments
I think this makes sense to add. We're getting a lot of configuration, so we probably need to refactor some of the config codebase to expose it in a better way than what is currently there. |
@bwagner5 I'm interested in putting in the work to add this - did that config refactor work you mentioned already happen? Also, how does specifying the effect (eg. |
@hoelzro It would be great if you could work on this! The configuration refactor has not happened yet... We broke out the configuration docs into common config, IMDS, and Queue-Processor sections which helps a bit, but in the code, it's all one giant config. Adding the Mainly thinking out loud here to gather all of the context around configuration that may happen in the future so that we don't have to rework how this taint config works There is a request in #254 about configuring specific nodes via annotations as to what NTH should do with it. I'm not sure if the Even if one of the two options in a node annotated configuration is Related to NTH configuration by node annotations, we've discussed another option for configuring actions based on event type. The Queue-processor mode of NTH supports a lot more event types than IMDS mode and it might be nice to say things like:
This type of configuration would likely be global and will probably add a lot of config key-values to further bloat the configuration. But I think it's safe to say |
@bwagner5 Thanks for the extra context! So if I just added Also, I saw that the CLA was recently removed - how does contribution work with that in mind? Do I just need to confirm that licensing my commits' changes under Apache is ok? |
Yep,
Yes, there's a line in the PR template: "By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license." |
Hey @hoelzro, just wanted to check in and see if you were still planning on contributing the taint-effect? |
Hi @bwagner5! It's still on my list - other stuff just came up and knocked it onto my backburner! |
Hello @hoelzro, is this still on your list? |
I'm still interested in working on it, but I just got back from leave, and the issue still hasn't bubbled up to the top of my backlog, I'm afraid :( |
Add TAINT_EFFECT env var and --taint-effect flag to configure the node taint effect Defaults to NoSchedule, garbage values will log a warning and default to NoSchedule. closes aws#273
Add TAINT_EFFECT env var and --taint-effect flag to configure the node taint effect Defaults to NoSchedule, garbage values will log a warning and default to NoSchedule. closes #273
It would be great if the taint applied to nodes when they are due to terminate could be configured as
NoExecute
.Currently the taint is only really useful for informational purposes as cordoning the node already applies a
NoSchedule
taint.I'd like to be able to set terminating nodes as
NoExecute
in order to stop daemonset pods gracefully (specifically to allow Consul agents to leave the cluster)Similar to kubernetes/kubernetes#75482
The text was updated successfully, but these errors were encountered: