-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
crio: filter out systemd related components #2957
Conversation
Hi @rphillips. Thanks for your PR. I'm waiting for a google member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/ok-to-test |
@rphillips Thanks for this PR. I presume this PR is trying to fix the cadvisor related issue reported in https://bugzilla.redhat.com/show_bug.cgi?id=1978528 This fix looks good, but not sure if I got it entirely correctly or I am missing something. This fix seem to add an awareness in the If you look at the way suitable factory is selected, it just iterates over all existing implementations of that interface. So would it be possible that even after having this fix in place, which would make Since the code path going all the way into If possible, it would be great to have a unit test in /hold |
Good point. It does look like the raw handler allows just about anything. Going to close this PR. |
Do not allow registration of systemd related services.
ef7c1f3
to
1a1eae0
Compare
@@ -32,6 +32,9 @@ import ( | |||
// The namespace under which crio aliases are unique. | |||
const CrioNamespace = "crio" | |||
|
|||
// The namespace systemd runs components under. | |||
const SystemdNamespace = "system-systemd" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why is this public?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ping, no need for this to be public right?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There is not a need, but I kept the precedent from the CrioNamespace variable.
@bobbypage While this updated PR can potentially fix the issue by returning true for Considering the Let me know what do you think about this, if you are fine by it I can send a PR to fix that and then we can consider accepting this PR. |
#2999 is merged. Is there anything needed to update in this PR or is it ready to review/merge? I would like to cut release on cAdvisor soon so we can vendor it back into k/k in time for k8s1.23 code freeze. |
This is ready for review and merge. |
thanks, small nit on #2957 (comment) and this is ready to go |
Commented here #2957 (comment) ... I think we should preserve the precedent. |
LGTM |
crio: filter out systemd related components
UPSTREAM: google/cadvisor: google#2957, google#2999; crio filter out systemd events, always evaluate raw factory last
In Openshift we are seeing systemd components get added to housekeeping within the Kubelet using crio. This patch filters the
system-systemd
namespace for containers.cc @harche