-
Notifications
You must be signed in to change notification settings - Fork 40k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add enhanced volume and mount logging for block devices #24797
add enhanced volume and mount logging for block devices #24797
Conversation
Can one of the admins verify that this patch is reasonable to test? If so, please reply "ok to test". This message may repeat a few times in short succession due to jenkinsci/ghprb-plugin#292. Sorry. Otherwise, if this message is too spammy, please complain to ixdy. |
2 similar comments
Can one of the admins verify that this patch is reasonable to test? If so, please reply "ok to test". This message may repeat a few times in short succession due to jenkinsci/ghprb-plugin#292. Sorry. Otherwise, if this message is too spammy, please complain to ixdy. |
Can one of the admins verify that this patch is reasonable to test? If so, please reply "ok to test". This message may repeat a few times in short succession due to jenkinsci/ghprb-plugin#292. Sorry. Otherwise, if this message is too spammy, please complain to ixdy. |
@kubernetes/sig-storage |
@@ -107,6 +107,7 @@ func doMount(source string, target string, fstype string, options []string) erro | |||
command := exec.Command("mount", mountArgs...) | |||
output, err := command.CombinedOutput() | |||
if err != nil { | |||
glog.Errorf("Mount failed: %w\nMounting arguments: %s %s %s %w\nOutput: %s\n", err, source, target, fstype, options, string(output)) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Did you mean %v
instead of %w
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@saad-ali - yes, that is what I meant and will be updating accordingly
Can one of the admins verify that this patch is reasonable to test? If so, please reply "ok to test". This message may repeat a few times in short succession due to jenkinsci/ghprb-plugin#292. Sorry. Otherwise, if this message is too spammy, please complain to ixdy. |
a snippet of some logging for aws ebs:
|
@@ -267,6 +269,7 @@ func (mounter *SafeFormatAndMount) formatAndMount(source string, target string, | |||
} | |||
|
|||
// Try to mount the disk | |||
glog.Infof("attempting to mount disk: %s %s %s", fstype, source, target) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this should be V(4) since it is fairly common, and not alarming.
Can one of the admins verify that this patch is reasonable to test? If so, please reply "ok to test". This message may repeat a few times in short succession due to jenkinsci/ghprb-plugin#292. Sorry. Otherwise, if this message is too spammy, please complain to ixdy. |
This PR hasn't been active in 60 days. Will be closed in 29 days. You can add 'keep-open' label to prevent this from happening. |
This is a useful PR. In particular logging @screeley44 could you rebase and address feedback. |
@saad-ali - ack |
@saad-ali - rebased and addressed initial comments |
@saad-ali - might need the "ok-to-test" label |
@k8s-bot ok to test |
return nil | ||
} | ||
|
||
func makeGlobalPDPath(host volume.VolumeHost, volumeID string) string { | ||
// Clean up the URI to be more fs-friendly | ||
name := volumeID | ||
name = strings.Replace(name, "://", "/", -1) | ||
glog.V(4).Infof(path.Join(host.GetPluginDir(awsElasticBlockStorePluginName), "mounts", name)) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This looks wrong
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yeah, I think I was using that as debug and didn't remove it, don't think we need to log anything from here, I think I will remove
GCE e2e build/test passed for commit 11d1289. |
@k8s-bot test this [submit-queue is verifying that this PR is safe to merge] |
GCE e2e build/test passed for commit 11d1289. |
Automatic merge from submit-queue |
Commit found in the "release-1.3" branch appears to be this PR. Removing the "cherrypick-candidate" label. If this is an error find help to get your PR picked. |
…ck-of-#24797-upstream-release-1.3 Automatic merge from submit-queue Automated cherry pick of kubernetes#24797 upstream release 1.3 Cherry pick kubernetes#24797 ("add enhanced volume and mount logging for block devices") to upstream release 1.3.
Automatic merge from submit-queue add enhanced volume and mount logging for block devices Fixes kubernetes#24568 Adding better logging and debugging for block device volumes and the shared SafeFormatAndMount (aws, gce, flex, rbd, cinder, etc...)
Fixes #24568
Adding better logging and debugging for block device volumes and the shared SafeFormatAndMount (aws, gce, flex, rbd, cinder, etc...)