Fix kubelet-csr-approver deployment failes if kube_network_plugin=cni(generic)#11704
Conversation
|
Welcome @M-JavadHeydarpour! |
|
Hi @M-JavadHeydarpour. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
/ok-to-test
{{ <bool expr> | ternary(false, true }} can be simplified to {{ not <bool expr> }}
|
VannTen
left a comment
There was a problem hiding this comment.
One further nitpick.
Could you also squash your fix commits into the commits they are fixing (in your PR).
(Several commits are ok, but fix commits should not be in the final PR)
| chart_ref: "{{ kubelet_csr_approver_chart_ref }}" | ||
| chart_version: "{{ kubelet_csr_approver_chart_version }}" | ||
| wait: true | ||
| wait: "{{ not (kube_network_plugin == 'cni') }}" |
There was a problem hiding this comment.
| wait: "{{ not (kube_network_plugin == 'cni') }}" | |
| wait: "{{ kube_network_plugin != 'cni' }}" |
There was a problem hiding this comment.
Certainly! I’ve squashed the fix commits into the main commits as requested, so the final PR is now clean and organized without separate fix commits. Let me know if there’s anything else to adjust.
3994c78 to
12afc31
Compare
|
This is just a reminder for you: Your PR shouldn't contain any merge commits, or you will get a |
57e5c6c to
be57098
Compare
…to prevent kubelet-csr-approver installation failures
be57098 to
f62ca86
Compare
|
/lgtm
/approve
Thanks !
|
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: M-JavadHeydarpour, VannTen The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
/kind bug |
…(generic) (kubernetes-sigs#11704) * Make Helm's 'atomic' parameter configurable from role variables * Configure Helm with 'atomic' and 'wait' set to false for generic CNI to prevent kubelet-csr-approver installation failures
What this PR does / why we need it:
This PR resolves issues with the
kubelet-csr-approverdeployment failing whenkube_network_plugin=cni. The deployment fails because the node does not become ready until the CNI is manually installed after Kubespray playbooks have run. To address this, the PR modifies the Helm parameters as follows:waitandatomictofalsewhenkube_network_plugin=cnito prevent thekubelet-csr-approverjob from failing during deployment.Which issue(s) this PR fixes:
Fixes #10320
Fixes #10491
Special notes for your reviewer:
waitandatomicare conditionally set tofalsewhen using a CNI network plugin (kube_network_plugin == 'cni'), ensuring thatkubelet-csr-approverdoes not stall if CNI is installed manually.Does this PR introduce a user-facing change?: