-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Making Kube service appProtocol field optional #7873
Making Kube service appProtocol field optional #7873
Conversation
Thanks for your pull request. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please follow instructions at https://git.k8s.io/community/CLA.md#the-contributor-license-agreement to sign the CLA. It may take a couple minutes for the CLA signature to be fully registered; after that, please reply here with a new comment and we'll verify. Thanks.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
Welcome @admgolovin! |
Hi @admgolovin. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
33c25e7
to
625d9e5
Compare
Does "optional" imply that the field is not set (by default to http/https) ? |
This feature was added in #7493. Even the author of that feature stated:
We have identified an edge case where this actually breaks things and so need to turn it off. So, in this case, the optionality of the feature is to have it on by default per the original author's intent with the ability to turn it off if needed @longwuyuan |
Can this be tested without IBM-Cloud. Say at least on a kind cluster. It would be appropriate to run at least some kind of tests, that assured non IBM-Cloud users don't see any impact at all. |
Also, if it is not too much trouble, then request that you create a issue and link it here. so that the issue tracks the details of the related information, for future searches. thanks. Sometimes directly creating PR seems ok but in my opinion, this one should have a issue that details the entire story with full specifics |
Closes #7885 |
@longwuyuan That chart has been tested in the AWS EKS cluster as well. There are no breaking changes since those |
/check-cla |
d14bec2
to
8ee72b1
Compare
b187378
to
3bc713d
Compare
26c2ccc
to
b187378
Compare
@admgolovin: The following test failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
6124355
to
78713d5
Compare
@cpanato The rebase is done. All excessive commits have been squashed. |
argh sorry @admgolovin my bad! We have just released a new version and there is another conflict. Please fix both, and ping me (here or in Slack) so we can release this and fix the problem in IBM Cloud ASAP. Thanks |
78713d5
to
c7e38f8
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: admgolovin, cpanato The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
What this PR does / why we need it:
This PR is making the appProtocol field of the Nginx ingress controller definition optional.
That is needed as not all Cloud providers could correctly work with it.
For example here is what happens when we expose our Nginx ingress-controller Kubernetes service through IBM Cloud NLB instance:
Types of changes
How Has This Been Tested?
Here is an example of the Nginx ingress Kubernetes service that is failing:
If we remove the
appProtocol
field, an IBM Cloud NLB instance will be created successfully for the Nginx ingress-controller service.We also tried to roll back into the 4.0.0 version of the Nginx ingress-controller chart (before the appProtocol field was released). And it is working for us.
Checklist: