-
Notifications
You must be signed in to change notification settings - Fork 336
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
volume leaks when PVC is deleted when associated PV is in the terminating state #546
volume leaks when PVC is deleted when associated PV is in the terminating state #546
Comments
@divyenpatel Which controller? You meant the CSI Driver controller? |
My take on this: the system works as designed at the moment. Admins should only delete a PV if they know that the underlying volume in the storage system is gone. The PV protection controller only prevents that the PV object gets removed while there is a PVC that uses the PV. It has no knowledge about the underlying volume. |
Yes |
The Reclaim Policy on PV is "Delete" here. If volume is not deleted regardless of the Reclaim Policy, what is the difference between "Delete" and "Retain" in this case? |
Discussed in today's sig-storage meeting.
|
IHAC who met this issue in their production environment. My customer provides k8s as a self service to its customers. In this service provider model, whatever change customers make to their clusters through valid k8s CL/APIs, the service provider should not have potential billing issues (they count disk usages into billing). |
CC @deepakkinni |
/assign |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
/remove-lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close |
@k8s-triage-robot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/reopen |
@pohly: Reopened this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/reopen Not fixed in external-provisioner yet, only in sig-storage-lib-external-provisioner. |
@pohly: Reopened this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Interesting, thought this was a security feature so you don't delete a PV by accident while still referenced by a PVC. |
Steps
PV can not be deleted, so
kubectl delete pv
command is not giving up terminal prompt. So I typedctl+c
to exit.Checked PV status. It went into terminating state.
The controller is not getting calls to delete the volume from the datastore. This results into leaking volume on the datastore.
Above workflow is executed using very latest external-provisioner -
v2.1.0
. This issue is also present on prior release of the external provisioner.Filing this bug to discuss about what fix we can make to prevent this orphan volume on the system.
This issue was also discussed here - #195 (comment)
cc: @xing-yang @SandeepPissay
The text was updated successfully, but these errors were encountered: