Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix etcd and ca-cert rotate issues #6952

Merged
merged 3 commits into from
Feb 14, 2023
Merged

Conversation

brandond
Copy link
Member

@brandond brandond commented Feb 13, 2023

Proposed Changes

Fix issues found by QA during pre-release testing

Types of Changes

bugfix

Verification

See linked issues

Testing

Linked Issues

User-Facing Change

NONE

Further Comments

@brandond brandond requested a review from a team as a code owner February 13, 2023 22:46
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
)

// setETCDLabelsAndAnnotations will set the etcd role label if not exists also it
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The code here only ran on apiserver+etcd nodes, while etcd-only nodes had a separate controller that managed their annotation:

func (m *metadataHandler) handleSelf(node *v1.Node) (*v1.Node, error) {

The etcd role annotation is now handled consistently, by running the etcd metadata controller on all server nodes when managed etcd is in use.

Turns out etcd-only nodes were never running **any** of the controllers,
so allowing multiple controllers didn't really fix things.

Signed-off-by: Brad Davidson <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants