-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix: dns-controller: 3999 port address already in use #9404
Conversation
Thanks for your pull request. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please follow instructions at https://git.k8s.io/community/CLA.md#the-contributor-license-agreement to sign the CLA. It may take a couple minutes for the CLA signature to be fully registered; after that, please reply here with a new comment and we'll verify. Thanks.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
Hi @vgunapati. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
264e388
to
81e89bd
Compare
/assign @rdrgmnzs |
/ok-to-test |
This probably makes sense. It will mean that dns-controller doesn't run between termination and recreation, but I think that is fine. /lgtm |
Yeah, normally I'd think pod anti-affinity, but dns-controller doesn't have strong availability requirements. |
As we only have one dns-controller pod and did not see any leader election in dns-controller logs nor impact to cluster during Recreate of dns-controller pod I have used
Please let me know if you want me to change to use podAntiAffinity |
No, this is good as-is. |
This one could be a candidate for backport. I guess dns-controller will go into crashloop on every kops upgrade otherwise. /kind bug |
I agree this should probably be backported /approve |
Travis CI issues... @vgunapati are you able to retry these jobs? https://travis-ci.org/github/kubernetes/kops/builds/700018759 if not can you ammend your commit message and force push back to your branch? we just need to trigger another travis build somehow. |
81e89bd
to
deaeba1
Compare
@rifelpet I have amended my commit without changes to code. Looks like new travis build just triggered |
hopefully that does the trick, thanks! |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: rifelpet, vgunapati The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
…04-upstream-release-1.18 Automated cherry pick of #9404: Fix: dns-controller: 3999 port address already in use
…04-upstream-release-1.17 Automated cherry pick of #9404: Fix: dns-controller: 3999 port address already in use
Fixes #4877
The main problem is using the default rolling upgrade strategy. If the
dns-controller
is created on the same node during the upgrade we are seeing this issue as this ishostNetwork
podexample:
This PR will use
Recreate
strategy to avoid this issue