-
Notifications
You must be signed in to change notification settings - Fork 40.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
WIP: Remove the legacy networking mode #34906
WIP: Remove the legacy networking mode #34906
Conversation
Will run |
Jenkins verification failed for commit e3207bf. Full PR test history. The magic incantation to run this job again is |
I love it. This may be the first time we actually remove anything from componentconfig - @mikedanese can you think of any problems this will cause? I am editing the subject for better relnote @luxas a bunch of verify scripts failed - run update-all, please |
Jenkins GCI GCE e2e failed for commit 72c36c8. Full PR test history. The magic incantation to run this job again is |
Jenkins GCE Node e2e failed for commit 72c36c8. Full PR test history. The magic incantation to run this job again is |
Jenkins GCE e2e failed for commit 72c36c8. Full PR test history. The magic incantation to run this job again is |
Jenkins GKE smoke e2e failed for commit 72c36c8. Full PR test history. The magic incantation to run this job again is |
Jenkins Kubemark GCE e2e failed for commit 72c36c8. Full PR test history. The magic incantation to run this job again is |
Jenkins unit/integration failed for commit 72c36c8. Full PR test history. The magic incantation to run this job again is |
@@ -200,10 +198,10 @@ func (s *KubeletServer) AddFlags(fs *pflag.FlagSet) { | |||
fs.Float64Var(&s.ChaosChance, "chaos-chance", s.ChaosChance, "If > 0.0, introduce random client errors and latency. Intended for testing. [default=0.0]") | |||
fs.BoolVar(&s.Containerized, "containerized", s.Containerized, "Experimental support for running kubelet in a container. Intended for testing. [default=false]") | |||
fs.Int64Var(&s.MaxOpenFiles, "max-open-files", s.MaxOpenFiles, "Number of files that can be opened by Kubelet process. [default=1000000]") | |||
fs.BoolVar(&s.ReconcileCIDR, "reconcile-cidr", s.ReconcileCIDR, "Reconcile node CIDR with the CIDR specified by the API server. No-op if register-node or configure-cbr0 is false. [default=true]") | |||
fs.BoolVar(&s.ReconcileCIDR, "reconcile-cidr", s.ReconcileCIDR, "Reconcile node CIDR with the CIDR specified by the API server. Won't have any effect if register-node is false. [default=true]") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Since this was previously a no-op if configure-cbr0 was false, and configure-cbr0 is now always false, this is now always a no-op. (Actually... it looks like it may have been a no-op already; reconcileCBR0
in kubelet_network.go always got called if configure-cbr0 was true, regardless of the value of reconcile-cidr.)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actually my initial draft of this was removing reconcile-cidr
as well, but I think we should take it separately.
If we agree to remove that as well, I'm fine, but please in another PR to make it easier for reviewing.
Another concern is that we didn't mark reconcile-cidr
as deprecated...
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
well, if you don't remove it, the doc string that's there now is wrong; it implies that reconcile-cidr still does something if register-node is true, but it doesn't.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ping @luxas on this
@thockin :) Ok, so here's what we should sort out (in order):
If this is ok, I'm gonna rebase (will probably be needed at that time), fix up the commits and remove WIP. However, I'm traveling to London the rest of this week and will be totally offline, so some time next week I can come back and update this. But please comment on it anyway :) |
/cc @freehan |
@freehan is out on leave, assign to me to @matchstick On Mon, Oct 17, 2016 at 10:17 AM, Yu-Ju Hong notifications@github.com
|
I am LGTM on this. Consider also removing the second flag |
@k8s-bot test this [submit-queue is verifying that this PR is safe to merge] |
Automatic merge from submit-queue |
Automatic merge from submit-queue Deprecate the --reconcile-cidr flag <!-- Thanks for sending a pull request! Here are some tips for you: 1. If this is your first time, read our contributor guidelines https://github.com/kubernetes/kubernetes/blob/master/CONTRIBUTING.md and developer guide https://github.com/kubernetes/kubernetes/blob/master/docs/devel/development.md 2. If you want *faster* PR reviews, read how: https://github.com/kubernetes/kubernetes/blob/master/docs/devel/faster_reviews.md 3. Follow the instructions for writing a release note: https://github.com/kubernetes/kubernetes/blob/master/docs/devel/pull-requests.md#release-notes --> **What this PR does / why we need it**: Follows up #34906 **Special notes for your reviewer**: I'm not sure why coreos had set `--reconcile-cidr` to `false` and what the implications are now. **Release note**: <!-- Steps to write your release note: 1. Use the release-note-* labels to set the release note state (if you have access) 2. Enter your extended release note in the below block; leaving it blank means using the PR title as the release note. If no release note is required, just write `NONE`. --> ```release-note Deprecate the --reconcile-cidr kubelet flag because it has no function anymore ``` PTAL @thockin @freehan @justinsb @yujuhong @kubernetes/sig-node @kubernetes/sig-network **I will add `hack/update-all.sh` contents soon to fix builds**
The cbr0 configuration behavior this comment references was removed in kubernetes#34906
The cbr0 configuration behavior this comment references was removed in kubernetes#34906
The cbr0 configuration behavior this comment references was removed in kubernetes#34906
What this PR does / why we need it:
Removes the deprecated configure-cbr0 flag and networking mode to avoid having untested and maybe unstable code in kubelet, see: #33789
Which issue this PR fixes (optional, in
fixes #<issue number>(, #<issue_number>, ...)
format, will close that issue when PR gets merged):fixes #30589
fixes #31937
Special notes for your reviewer: There are a lot of deployments who rely on this networking mode. Not sure how we deal with that: force switch to kubenet or just delete the old deployment?
But please review the code changes first (the first commit)
Release note:
PTAL @kubernetes/sig-network @kubernetes/sig-node @mikedanese
This change is