-
Notifications
You must be signed in to change notification settings - Fork 36
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[sdk#918] Enable restore NSE name in setid #932
Conversation
Signed-off-by: Vladimir Popov <vladimir.popov@xored.com>
b62f0df
to
211ddd1
Compare
This looks good as far as it goes... but it feels like our basic underlying problem here is that the nse name that we are given by the NSE registering is not the one we actually put in the registry. I feel like we may need to simply respect the name we are given, and treat the issue of duplication as one of authorization from the upstream registry. Please note in the K8s case, a good approach to this is likely to start with simply having the NSEs register themselves with their Pod name. Thoughts? |
Do you mean simply not checking for duplication at all? Our logic for now is the following - it is OK to take NSE registration with already registered name if it has the same URL as the existing registry entry. Here is a problem with simple using pod name for the NSE registration without some additional generation in such case - in unix + restart case we will get the following:
Now there is a chain element on the Endpoint side that is responsible to generate a unique name for the NSE registration and a server chain element on the NSMgr, Registry sides that is responsible to give a feedback of uniqueness of the name:
So it solves the problem with the unix + restart case, but provides a new problem with the IP + restart case:
And this PR should solve this problem with restoring back the same name in such case. Not checking for duplication should solve both of these problems, but here can be an issue, when for some reason we have 2 Endpoints registering with the same name (probably from the different clusters, so it even can be the pod name) and it would totally break NSM work for both of these Endpoints. What do you think of this? |
@Bolodya1997 I understand the issue with NSE restart causing a different URL for the unix file socket, which means you can't match it. I do not understand
Its not clear to me at all what's happening there, other than a uuid is coming from somewhere... and appears to be being prepended to the name? |
@Bolodya1997 Is 'uuid' for you the Pod.metadata.uid ? |
@edwarnicke
|
Description
Now
setid
checks if it is able to restore NSE name from registry instead of generating a new one.Issue link
#918
How Has This Been Tested?
Types of changes