-
Notifications
You must be signed in to change notification settings - Fork 138
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update default windows.kubelet
value to be compatible with containerd runtime
#521
Update default windows.kubelet
value to be compatible with containerd runtime
#521
Conversation
Welcome @luborpetr! |
Hi @luborpetr. Thanks for your PR. I'm waiting for a kubernetes-csi member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/ok-to-test
Pull Request Test Coverage Report for Build 2777248508
💛 - Coveralls |
/retest |
thanks for the contribution.
|
Hello @andyzhangx, we are currently using containerd 1.6.2, cluster v1.21.14-gke.700 and Windows build 10.0.17763.3046.
|
/test pull-csi-driver-smb-e2e-windows |
/retest |
this config does not work on Windows docker node:
|
Hello @andyzhangx , I don't know the test case but, why it it trying to mount |
@luborpetr the e2e test only runs against changes in |
btw, I have made a new commit to apply similar change on |
Hello @andyzhangx, Problem is that dockerd on Windows rejects volumes and mounts definition containing double backslashes in path. This is the reason for Because of that limitation and backward compatibility requirement, I can think of only one suitable solution now. The solution would look like (added
Tell me what you think @andyzhangx Btw, I have noticed other stability issue on contained Windows hosts, the |
@luborpetr that lgtm, pls make changes under |
You are right, I was not precise with my statement. Windows is not restarting pods but the individual containers got killed. |
/retest |
@andyzhangx can you please point me, where is the script, that you used for helm packages creation yesterday? |
Never mind, did that manually, looks like the tests are passing now... |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/approve
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: andyzhangx, luborpetr, vilovgh The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
What type of PR is this?
/kind bug
What this PR does / why we need it:
This PR is addressing malfunctioning liveness probes on Windows Kubernetes Nodes with containerd runtime.
Which issue(s) this PR fixes:
When previous default value of
windows.kubelet
==C:\var\lib\kubelet
was usedand liveness probe was triggered on Windows contained host,
the containerd interprets probe command as follows (notice missing backslash):
When this command is passed into the
node-driver-registrar
container the probe will fail.Example error from kubelet log:
When I triggered the command manually, to see exact reason of the failure,
I have noticed that the
csi-node-driver-registrar.exe
is misinterpreting single backslashesFixes #
Fortunately the fix is pretty simple, we need to change
windows.kubelet
toC:\\var\\lib\\kubelet
.And this is all this PR is about.
Special notes for your reviewer:
The issue has been discovered on Windows GKE v1.21, where it (in combination with other internal containerd issue) lead to cascade failures, bringing down entire nodes.
Release note: