Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CASMPET-7273: k8s-verify-cluster: Allow etcdbackup pods in states other than Running and Completed #631

Merged
merged 1 commit into from
Nov 21, 2024

Conversation

mharding-hpe
Copy link
Contributor

This test fails if it finds any pods in the kube-system namespace that are not Running or Completed. In most cases, this is fine, but if it happens to run while an etcdbackup job pod is starting up or terminating, then it may catch that pod in states like ContainerCreating or Terminating. Basically, there are non-error states that those pods may be found in. This PR updates the test so that when checking the kube-system namespace, it fails if:

  1. Any non-etcdbackup pod is in a state other than Running or Completed
  2. Any etcdbackup pod is in a state other than Running, Completed, ContainerCreating, Init:#/#, NotReady, Pending, PodInitializing, or Terminating.

This will avoid the false failure that Mikhail reported when opening this ticket.

I have tested this on mug and ran the test repeatedly, verifying that it now correctly handles the case where an etcdbackup pod is in one of the other valid states.

@mharding-hpe
Copy link
Contributor Author

/backport release/1.5 release/1.4

Copy link
Contributor

Backporting into branch release/1.5 was successful. New PR: #632

Copy link
Contributor

Backporting into branch release/1.4 was successful. New PR: #633

@mharding-hpe mharding-hpe merged commit efd7184 into release/1.6 Nov 21, 2024
3 checks passed
@mharding-hpe mharding-hpe deleted the CASMPET-7273-1.6 branch November 21, 2024 05:23
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants