-
Notifications
You must be signed in to change notification settings - Fork 38
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Clean-up ctrl result and error consideration for GlanceAPI #684
Clean-up ctrl result and error consideration for GlanceAPI #684
Conversation
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: abays The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
😆 /test glance-operator-build-deploy-kuttl |
😡 /retest |
/test glance-operator-build-deploy-kuttl |
Somehow Swift operator is getting multiple k8s services for webhook traffic [1]. As a result, at least some of them seem to be pointing to the wrong pod, and thus creation of
I don't see other service operators having the same problem with k8s service pollution. |
Ah, I think I might understand what is happening. First, the |
Ok thank you for all the details, I have to review the logs, but it should be easier given you already did that. I'm wondering why |
It looks like Prow does both an OpenStack operator install and accompanying [1] https://github.com/openshift/release/blob/0e26e4ceb3d8642eb19dd306f9c2a630d09deb41/ci-operator/config/openstack-k8s-operators/glance-operator/openstack-k8s-operators-glance-operator-main.yaml#L66-L78 ...but it seems like the KUTTL [2] runs after the basic OpenStack operator deployment [1]. So I'm confused as to how [1] is running into the Swift webhooks from [2]. |
Maybe it's actually the |
Ok, sorry. I'll review them carefully. My understanding of [1] was that [1] https://github.com/openshift/release/blob/0e26e4ceb3d8642eb19dd306f9c2a630d09deb41/ci-operator/config/openstack-k8s-operators/glance-operator/openstack-k8s-operators-glance-operator-main.yaml#L66-L78 |
/test glance-operator-build-deploy-kuttl |
I'm wondering if we really need it as we have a |
@abays as per your theory openstack-k8s-operators/install_yamls#999 should solve the webhook resource cleanup. We might want to land that patch first and re-kick this job. |
I think that will clean up the webhooks installed by OpenStack operator, but it wouldn't help with the lingering Swift webhooks created by |
Ok I see. I think we need to basically cleanup resources as part of |
It passed this time because the Swift operator somehow persisted beyond the
|
/lgtm |
Thank you @abays. I'm merging this one as it improves the error handling. Hopefully, with openstack-k8s-operators/install_yamls#1000, we should be able to see the resource cleanup from a swift perspective, and we can check it from other (still pending) PRs. |
72c189b
into
openstack-k8s-operators:main
I was looking at the GlanceAPI controller today to compare it with some new code being added in the nascent Watcher Operator. While doing so, I noticed what seemed to be inconsistencies in how we handle
ctrl.Result
anderror
considerations in some places. I don't think any of this is necessarily crucial.