-
Notifications
You must be signed in to change notification settings - Fork 6.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
split kube_feature_gates variable for different kubernetes components #8677
Conversation
Welcome @alegrey91! |
Hi @alegrey91. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Nice work @alegrey91 ! I think you can avoid a bit of verbosity with the suggestion above in a few places. /ok-to-test |
Hi @cristicalin, thanks a lot. |
In the actual code, sorry, Github batch review defeated me today, I added a review to a batch and forgot to push it. |
@@ -196,8 +196,11 @@ apiServer: | |||
{% for key in kube_kubeadm_apiserver_extra_args %} | |||
{{ key }}: "{{ kube_kubeadm_apiserver_extra_args[key] }}" | |||
{% endfor %} | |||
{% if kube_feature_gates %} | |||
{% if kube_apiserver_feature_gates is defined %} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
you could write this as
{% if kube_apiserver_feature_gates is defined %} | |
{% kube_apiserver_feature_gates | default(kube_feature_gates)) | join(',') %} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi @cristicalin, thanks for your suggestion :)
I checked the code, but something was wrong.
What do you think to use this instead?
{% if kube_apiserver_feature_gates or kube_feature_gates %}
feature-gates: "{{ kube_apiserver_feature_gates | default(kube_feature_gates) | join(',') }}"
{% endif %}
Putting the kube_apiserver_feature_gates
variable into defaults/main.yaml
.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done! Let me know if the implementation is fine ;)
The molecule failure seems like a vagrant cloud issue, if you push a change it should re-trigger that test and hopefully succeed. |
Vagrant job failures are related to an earlier issue that should not affect this change. /lgtm |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@alegrey91 Nice work 👍
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: alegrey91, floryut The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
* master: (21 commits) Add tz to kubespray image Add tag to AWS VPC subnets for automatic subnet discovery by load balancers or ingress controllers (kubernetes-sigs#8705) Enable external CA mode for control-plane deployment (kubernetes-sigs#8620) UpCloud integration (kubernetes-sigs#8653) Fixes for Hetzner terraform and Hetzner Cloud (kubernetes-sigs#8702) Add VAGRANT_ANSIBLE_TAGS for normal deployment (kubernetes-sigs#8697) Removed quotation of nerdctl_extra_flags. (kubernetes-sigs#8695) [calico] add calico apiserver (kubernetes-sigs#8690) Add support for kube-vip (kubernetes-sigs#8669) Ensure all Kubelet required kernel values are configured when enabling protectKernelDefaults (kubernetes-sigs#8692) [cert-manager] Upgrade to v1.8.0 (kubernetes-sigs#8688) fix: reset docker was not removing docker properly (kubernetes-sigs#8680) Single quotes are missing in jsonpath argument of kubectl get node (kubernetes-sigs#8683) split kube_feature_gates variable for different kubernetes components (kubernetes-sigs#8677) [crun] upgrade to 1.4.4 (kubernetes-sigs#8675) [validate-container-engine] check if kubelet is present was not working (kubernetes-sigs#8679) [containerd] upgrade versions to address CVE-2022-24769 (kubernetes-sigs#8671) [vsphere_csi] update to 2.5.1 and make external_vsphere_version 7.0u1 by default (kubernetes-sigs#8676) [runc] upgrade to 1.1.1 (kubernetes-sigs#8674) [nerdctl] upgrade to 0.18.0 (kubernetes-sigs#8672) ...
…kubernetes-sigs#8677) * feat: split kube_feature_gates variable for different kubernetes components * docs: add kube_feaute_gates componet variables
…kubernetes-sigs#8677) * feat: split kube_feature_gates variable for different kubernetes components * docs: add kube_feaute_gates componet variables
…kubernetes-sigs#8677) * feat: split kube_feature_gates variable for different kubernetes components * docs: add kube_feaute_gates componet variables
…kubernetes-sigs#8677) * feat: split kube_feature_gates variable for different kubernetes components * docs: add kube_feaute_gates componet variables
What type of PR is this?
/kind feature
What this PR does / why we need it:
Not all the components need the same configuration and we would configure them as best as possible.
An example could be the recently added feature for the kubelet component: KubeletInUserNamespace. This is not suitable for all the components, so we would use it just for kubelet.
Which issue(s) this PR fixes:
Fixes #8666
Special notes for your reviewer:
Does this PR introduce a user-facing change?: