-
Notifications
You must be signed in to change notification settings - Fork 716
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Better etcd snapshot/restore in the kubeadm upgrade
logic
#618
Comments
imo this is a documented process external to kubeadm. |
I'm more of the opinion that reliable rollbacks are an essential component of upgrading etcd, so the user might benefit from having this handled on their behalf. Not fixed to this idea though. Maybe we can discuss in next implementation meeting? |
@timothysc - so what was the verdict on this? Is the intent to vendor in the etcd client and use that for making the etcd dump? How does this align with the demo from last week, where we saw the external etcd manager? Should this just be a documented manual effort until etcdmgr is ready? Do we want to proceed with enhancing the functionality of the kubeadm upgrade command? FWIW: I agree with Jamie - if kubeadm upgrade is going to touch etcd at all, a first-class way of handling the etcd lifecycle in the context of an upgrade should be provided. High-level logic I think may be: if self-hosted etcd
if external
test some sane basic functionality like is cluster reporting healthy? |
There already exists logic right now that will snap and restore, but it's pretty brute force atm. |
We now at least have the possibility (when we upgrade godeps in v1.12) to do the snapshotting properly etcd-io/etcd#9118 |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
I'm going to close this and wait to see the community asks or reopens. This seems to be a non-issue. |
Right now we exec
cp -r
, but we should take a snapshot before upgrading, and then actually be able to roll it back seamlessly if something fails. Now we do this on acp
manner using the filesystem, but we should do this via the etcd Go client instead to make it more robust. Might require some re-vendoring/structuring of the etcd Go clientcc @xiang90 @hongchaodeng @jamiehannaford @sbezverk @timothysc @xiangpengzhao @ericchiang
The text was updated successfully, but these errors were encountered: