-
Notifications
You must be signed in to change notification settings - Fork 30
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
STOR-2141: add support for maxAllowedBlockVolumesPerNode #287
base: main
Are you sure you want to change the base?
Conversation
@RomanBednar: This pull request references STOR-2141 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the epic to target the "4.19.0" version, but no target version was set. In response to this: Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
4002654
to
087f333
Compare
087f333
to
1a23c7d
Compare
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: RomanBednar The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
623109c
to
ea8a387
Compare
@RomanBednar: This pull request references STOR-2141 which is a valid jira issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
@RomanBednar: This pull request references STOR-2141 which is a valid jira issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
In order to validate maximum volume attachment limit set by user NodeChecker needs access to ClusterCSIDriver which is where users set the value.
We need to check versions of all ESXI hosts in the cluster and if we detect that users set a custom volume attachment limit that is incorrect we degrade the cluster. Incorrect value is any value above 59 if any of the vSphere hosts in a cluster is not on ESXI version 8 or higher
Since NodeChecker now checks max attachment limit value it is now safe to add hooks for reflecting maxAllowedBlockVolumesPerNode field of clusterCSIDriver into deployment and daemonset as env variable.
/retest-required |
@RomanBednar: The following test failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
/assign @gnufied For review - feel free to reassign to other candidate. |
|
||
// Check if a custom value is set in the ClusterCSIDriver | ||
if clusterCSIDriver != nil && clusterCSIDriver.Spec.DriverConfig.VSphere != nil { | ||
maxVolumesPerNode = int(clusterCSIDriver.Spec.DriverConfig.VSphere.MaxAllowedBlockVolumesPerNode) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What does this return when no limit is set? 0 ??
Shouldn't all this code be behind a feature gate? |
Depends on
Manual verification
Test value limits for
maxAllowedBlockVolumesPerNode
field:Validate
maxAllowedBlockVolumesPerNode
value propagation to driver deployment asMAX_VOLUMES_PER_NODE
:Validate propagation to CSINode as allocatable count: