-
Notifications
You must be signed in to change notification settings - Fork 502
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add azure disk modifier #5958
add azure disk modifier #5958
Conversation
c74cf4f
to
b58b0fa
Compare
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## master #5958 +/- ##
==========================================
+ Coverage 57.19% 59.23% +2.04%
==========================================
Files 259 263 +4
Lines 33233 45655 +12422
==========================================
+ Hits 19008 27045 +8037
- Misses 12291 16566 +4275
- Partials 1934 2044 +110
|
b58b0fa
to
3cdbac0
Compare
cred, err := azidentity.NewDefaultAzureCredential(nil) | ||
if err != nil { | ||
return fmt.Errorf("failed to obtain a credential: %v", err) | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What's the behavior without an Azure config? can we do the same check as we did for AWS in dependences.go
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- If there is no Azure config, it should not be initialized here, and no error will be reported. It's safe for tidb-opreator deployed on AKS without any Azure app authentication config.
- Because the subscription and resource group that needs to be operated cannot be obtained from places such as Node Role, it has to be obtained from the disk handler of PV the subscription and resource group. For the same AKS and a tidb-controller-manager process, this information should be the same after it is obtained once, and it will only be initialized once in the process.
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: csuzhangxc The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
[LGTM Timeline notifier]Timeline:
|
/run-pull-e2e-kind-basic |
/cherry-pick release-1.6 |
@csuzhangxc: new pull request created to branch In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the ti-community-infra/tichi repository. |
Co-authored-by: handlerww <[email protected]>
What problem does this PR solve?
This PR introduces the Azure Disk Modifier. As of Kubernetes 1.31, the VolumeModifyClass feature remains in beta and is not enabled by default on Azure. As a workaround, we have implemented the Azure Disk Modifier by drawing inspiration from this project's AWS disk modifier implementation. This enhancement allows for disk modification capabilities on Azure, aligning with the existing functionality available for AWS.
This feature will use the kubelet identity of AKS, you should grant kubelet identity permission to modify the disk.
What is changed and how does it work?
Code changes
Tests
Side effects
Related changes
Release Notes
Please refer to Release Notes Language Style Guide before writing the release note.
Manual test
Modify the storage request and storage class name, then on Azure portal the disk properties changed as expected.