Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Revert upgrade to CoreDNS 1.5.0 #307

Merged
merged 2 commits into from
May 30, 2019

Conversation

prameshj
Copy link
Contributor

The new image is not running the node-cache cleanup routine which deletes iptables rules and local interface created for node-cache. This is a problem when disabling the addon, if there is left over state.

Looks like the shutdown callbacks in forward plugin are taking longer/not completing before pod is shut down. The node-cache cleanup would be called after this.
Reverting the upgrade to get the image into k/k before code freeze.
Created an issue to rootcause this and upgrade to 1.5.0 - #306

prameshj added 2 commits May 30, 2019 09:16
…ns-fix"

This reverts commit 97d5500, reversing
changes made to 24b1708.
@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label May 30, 2019
@k8s-ci-robot k8s-ci-robot added size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. approved Indicates a PR has been approved by an approver from all required OWNERS files. labels May 30, 2019
Copy link
Member

@MrHohn MrHohn left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label May 30, 2019
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: MrHohn, prameshj

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot merged commit e7a6ef7 into kubernetes:master May 30, 2019
@axot
Copy link

axot commented Jul 30, 2019

Hello, is any updates for this?

@prameshj
Copy link
Contributor Author

We need atleast prometheus version 0.9.3, but the current skydns code has a constraint on version 0.8.0. I submitted skynetservices/skydns#350 for review, but have not gotten an update. I will modify this repo to use a fork of skydns and modify it there.

@axot
Copy link

axot commented Jul 31, 2019

Thank you. How about the bug around OnProcessExit callback, it seems not works after 1.5.0?

@prameshj
Copy link
Contributor Author

prameshj commented Aug 2, 2019

Thank you. How about the bug around OnProcessExit callback, it seems not works after 1.5.0?

I haven't had a chance to debug that. Will do as part of my ongoing change. In the meantime, if you have any insights to share on the cleanup issue, that would be very helpful.

@axot
Copy link

axot commented Aug 3, 2019

I did some tries, instead of appending to the tail of caddy.OnProcessExit, but insert into the head of the list. It did not work properly, so I'm going to create a simple project to easy debug this issue, at the same time, I found there are some cases that node-cache totally not working. it may be related to hostNetwork: true, dnsPolicy: ClusterFirstWithHostNet, the condition is not clarified, I will fire an issue of this in the next week.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants