Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Hawkular support for the Initial Resources #15476

Merged
merged 1 commit into from
Feb 21, 2016

Conversation

burmanm
Copy link
Contributor

@burmanm burmanm commented Oct 12, 2015

Adds support for using Hawkular as the datasource for initial resources plugin. Follows the configuration of Heapster sink for easier migration to Heapster in the future.

fixes #13873

cc @piosz

@k8s-bot
Copy link

k8s-bot commented Oct 12, 2015

Can one of the admins verify that this patch is reasonable to test? (reply "ok to test", or if you trust the user, reply "add to whitelist")

If this message is too spammy, please complain to ixdy.

@k8s-github-robot k8s-github-robot added the size/L Denotes a PR that changes 100-499 lines, ignoring generated files. label Oct 12, 2015
@k8s-github-robot
Copy link

Labelling this PR as size/L

m := make([]metrics.Modifier, len(self.modifiers), 2+len(self.modifiers))
copy(m, self.modifiers)

if namespace != "" {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

use kapi.NamespaceAll constant

@derekwaynecarr
Copy link
Member

Took an initial pass, would also appreciate @piosz input.

descriptorTag string = "descriptor_name"
separator string = "/"

defaultServiceAccountFile = "/var/run/secrets/kubernetes.io/serviceaccount/token"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is anyone else making this assumption? shouldn't this be a flag?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yea, I've seen this assumption elsewhere. I added serviceAccountFile param to override this path.

@derekwaynecarr
Copy link
Member

Is there a corresponding PR that discusses how to configure Hawkular with Kubernetes?

@dchen1107
Copy link
Member

I have a concern on this PR: With this PR in, any changes to our monitoring schema in the future might cause the breakage to this integration, which makes test / rollout / upgrade much harder by adding another metric. Can we help with our metric plumbing proposal: https://github.com/kubernetes/kubernetes/blob/master/docs/proposals/metrics-plumbing.md so that we have a standard way to access stats? cc/ @vishh

@ncdc
Copy link
Member

ncdc commented Oct 12, 2015

@dchen1107 is it fair to say that your comment extends to the other initial resources data source types - gcm and influxdb - as well?

@vishh
Copy link
Contributor

vishh commented Oct 12, 2015

@ncdc: Yes. I have raised similar concerns in the past while introducing the other two data sources. My intention is not to derail this PR, but highlight the fact that rolling out any schema changes will be difficult with the current approach.
Since this is an experimental feature, can we instead focus on our effort on implementing metrics plumbing and work towards making this feature production quality?

@piosz
Copy link
Member

piosz commented Oct 14, 2015

@burmanm thanks for the change! Overall LGTM but I'm not familiarized with Hawkular at all. I assume @derekwaynecarr and @ncdc reviewed implementation details.

@piosz
Copy link
Member

piosz commented Oct 14, 2015

@dchen1107 @vishh
All communication with data sources will be moved to the Heapster as described in #13693 once Prediction API will be introduced. However I wouldn't expect prediction engine to use metrics API soon because we don't know yet what kind of data are required to provide reasonable prediction.

@burmanm
Copy link
Contributor Author

burmanm commented Oct 14, 2015

Squashed the commits and rebased from master.

@derekwaynecarr
Copy link
Member

@burmanm - trying to focus on a way to proceed for this PR.

I think its fair to advertise the feature as experimental. As a result, user's need to know how to experiment with the feature to even make it worthwhile to integrate in the code. Can you add an example to /examples/hawkular-initial-resources that lets a user even know how the feature can be used in practice?

@k8s-bot
Copy link

k8s-bot commented Oct 21, 2015

Can one of the admins verify that this patch is reasonable to test? (reply "ok to test", or if you trust the user, reply "add to whitelist")

If this message is too spammy, please complain to ixdy.

@k8s-bot
Copy link

k8s-bot commented Feb 9, 2016

GCE e2e test build/test passed for commit 048f9a25dc9ac93657987fdd9ebbcb3e5a948b48.

@k8s-github-robot
Copy link

@k8s-bot test this [submit-queue is verifying that this PR is safe to merge]

@k8s-bot
Copy link

k8s-bot commented Feb 9, 2016

GCE e2e build/test failed for commit 048f9a25dc9ac93657987fdd9ebbcb3e5a948b48.

@davidopp
Copy link
Member

Trying rebasing and then running hack/update-all.sh, then push that commit and see if the tests pass

@k8s-github-robot
Copy link

PR changed after LGTM, removing LGTM.

@k8s-github-robot k8s-github-robot removed the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 12, 2016
@k8s-bot
Copy link

k8s-bot commented Feb 12, 2016

GCE e2e test build/test passed for commit 6ec1c4d3fad9e071a73432994f624864d1197a4c.

@davidopp davidopp added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 12, 2016
@k8s-github-robot
Copy link

PR changed after LGTM, removing LGTM.

@k8s-github-robot k8s-github-robot removed the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 12, 2016
@k8s-bot
Copy link

k8s-bot commented Feb 12, 2016

GCE e2e build/test failed for commit 3cfb9ecf16aa63f4cb0765ffa6c8ed522cb77b90.

@k8s-bot
Copy link

k8s-bot commented Feb 12, 2016

GCE e2e test build/test passed for commit 528be97.

@burmanm
Copy link
Contributor Author

burmanm commented Feb 12, 2016

Now the integration test is failing on something like persistent_volumes_test.go, out of my hands.

@ncdc
Copy link
Member

ncdc commented Feb 15, 2016

@burmanm when something fails in a test and it's not related to code that you changed in your PR, it typically means that it's a test flake - something that passes most of the time, but also sometimes fails. The process in this case is to find an existing issue or create a new one, and then ask the bot to retest, referencing the flake issue. Like this (I found the issue):

@k8s-bot unit test this github flake: #21188

@davidopp davidopp added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 19, 2016
@k8s-github-robot
Copy link

@k8s-bot test this

Tests are more than 48 hours old. Re-running tests.

@k8s-bot
Copy link

k8s-bot commented Feb 19, 2016

GCE e2e build/test failed for commit 528be97.

@davidopp
Copy link
Member

@k8s-bot e2e test this issue: #21463

@k8s-github-robot
Copy link

@k8s-bot test this issue: #IGNORE

Tests have been pending for 24 hours

@k8s-bot
Copy link

k8s-bot commented Feb 21, 2016

GCE e2e test build/test passed for commit 528be97.

@k8s-bot
Copy link

k8s-bot commented Feb 21, 2016

GCE e2e test build/test passed for commit 528be97.

@k8s-github-robot
Copy link

@k8s-bot test this [submit-queue is verifying that this PR is safe to merge]

@k8s-bot
Copy link

k8s-bot commented Feb 21, 2016

GCE e2e test build/test passed for commit 528be97.

@k8s-github-robot
Copy link

Automatic merge from submit-queue

k8s-github-robot pushed a commit that referenced this pull request Feb 21, 2016
@k8s-github-robot k8s-github-robot merged commit 9b395b5 into kubernetes:master Feb 21, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
lgtm "Looks good to me", indicates that a PR is ready to be merged. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Support Hawkular in Initial Resources