-
Notifications
You must be signed in to change notification settings - Fork 554
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: add portRangeUpperBound to be exposed in the helm chart #1469
base: master
Are you sure you want to change the base?
feat: add portRangeUpperBound to be exposed in the helm chart #1469
Conversation
|
Welcome @cescribanohs! |
Hi @cescribanohs. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Add check to ensure PORT_RANGE_UPPER_BOUND
is greater than 20049.
Mostly the PR looks good.
Thanks!
pkg/driver/efs_watch_dog.go
Outdated
@@ -284,7 +285,11 @@ func (w *execWatchdog) updateConfig(efsClientSource string) error { | |||
// used on Fargate, IMDS queries suffice otherwise | |||
region := os.Getenv("AWS_DEFAULT_REGION") | |||
fipsEnabled := os.Getenv("FIPS_ENABLED") | |||
efsCfg := efsUtilsConfig{EfsClientSource: efsClientSource, Region: region, FipsEnabled: fipsEnabled} | |||
portRangeUpperBound, found := os.LookupEnv("PORT_RANGE_UPPER_BOUND") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You don't have to check the condition here, you can assign the portRangeUpperBound as you have already added it under env in the deployment helm charts.
portRangeUpperBound := os.Getenv("PORT_RANGE_UPPER_BOUND")
Also, one check should be added to ensure that portRangeUpperBound is always greater than portRangeLowerBound(20049).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Let me know if there is something else or just waiting you resolve the conversation and provide the approval.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Tagging @mskanth972 to help with approval.
Thanks!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi all, when do you think it can be approved? Many thanks
/ok-to-test |
All test are passing right now. Ty |
Hi, any approvals or comments are welcomed. Thank you |
Don't we need to update node-daemonset yaml file? |
I have updated both daemonset and deployment but in this case they will pick the default value https://github.com/kubernetes-sigs/aws-efs-csi-driver/pull/1469/files#diff-5f5292175c0b29881ee742f0daf838980f771e03b22525cc574b4763b749a0ffR291 We have pushed this changes mapping a new image instead of repo: https://kubernetes-sigs.github.io/aws-efs-csi-driver/ in our dev cluster and working ok. Do you have in mind any other tests to be performed? Thank you in advance |
Any additional comments? Can we approve this please? Thank you in advance |
can you please squash the commits? |
61cd249
to
b0fcad8
Compare
b0fcad8
to
a416c3d
Compare
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: cescribanohs The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: cescribanohs The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
0e62fa2
to
39d269f
Compare
d6e2553
to
5069002
Compare
feat: add portRangeUpperBound to be exposed in the helm chart feat: add portRangeUpperBound to be exposed in the helm chart
ab6dea3
to
63247a9
Compare
Done. Thank you |
We have a large amount of pvc deploys in our cluster and often we reach the error
Could not mount
pvc due to available portEven the port_range_upper_bound property has been increased recently
aws-efs-csi-driver/pkg/driver/efs_watch_dog.go
Line 74 in b0af6bc
For this reason, adding a new helm value that can instantiated from a
kustomize.config.k8s.io/v1beta1
component it is our goal.What testing is done?
We have deployed in our dev environment through argoCD