Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

🐛 Ignore custom static manifests on kubeadm join #3053

Merged

Conversation

randomvariable
Copy link
Member

What this PR does / why we need it:
During experimental join retries, specifically ignore the /etc/kubernetes/manifests directory, which will allow the addition of custom static pod manifests, which is required for some Kubernetes cluster configurations, such as external KMS.

Which issue(s) this PR fixes (optional, in fixes #<issue number>(, fixes #<issue_number>, ...) format, will close the issue(s) when PR gets merged):
Fixes #3019

@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/S Denotes a PR that changes 10-29 lines, ignoring generated files. labels May 12, 2020
@k8s-ci-robot k8s-ci-robot requested review from JoelSpeed and ncdc May 12, 2020 12:57
Copy link
Contributor

@JoelSpeed JoelSpeed left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, but I'll let someone else who knows more about this label it

@vincepri
Copy link
Member

vincepri commented May 12, 2020

IIRC we're not running the e2e with the experimental flag — did we run at least one manual test with a provider?

@randomvariable
Copy link
Member Author

randomvariable commented May 12, 2020

I did it manually via CAPV, but happy to add an e2e test.

Right now, the only time we're doing a HA control plane is in the upgrade test.

Copy link
Member

@vincepri vincepri left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/approve

@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: randomvariable, vincepri

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label May 12, 2020
Copy link
Member

@fabriziopandini fabriziopandini left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm
+1 to get an e2e test for this

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label May 12, 2020
@k8s-ci-robot k8s-ci-robot merged commit e3518f4 into kubernetes-sigs:master May 12, 2020
@randomvariable randomvariable deleted the ignore-static-manifests branch September 8, 2021 18:52
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. size/S Denotes a PR that changes 10-29 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

HA cluster will not join second control-plane node when aws-encryption-provider is running
5 participants