New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
remove LegacyNodeRoleBehavior and mv ServiceNodeExclusion to GA #97543
Conversation
/test pull-kubernetes-integration |
/assign |
staging/src/k8s.io/controller-manager/pkg/features/kube_features.go
Outdated
Show resolved
Hide resolved
// labelNodeRoleExcludeBalancer specifies that the node should not be considered as a target | ||
// for external load-balancers which use nodes as a second hop (e.g. many cloud LBs which only | ||
// understand nodes). For services that use externalTrafficPolicy=Local, this may mean that | ||
// any backends on excluded nodes are not reachable by those external load-balancers. | ||
// Implementations of this exclusion may vary based on provider. This label is honored starting | ||
// in 1.16 when the ServiceNodeExclusion gate is on. | ||
// Implementations of this exclusion may vary based on provider. | ||
labelNodeRoleExcludeBalancer = "node.kubernetes.io/exclude-from-external-load-balancers" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
followup nit - we should rename this to "labelNodeExcludeBalancers" or something - "role" has no place any more :)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
want me to open a new issue and mark as a good first issue? I'm on it :D
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
#97734 :)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks!
/lgtm
/approve
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: pacoxu, thockin The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
the KEP link is now broken because we moved some files in k/e.
|
does sig-network recommend that kubeadm in 1.21 starts applying the |
KEP link updated @neolit123 |
@pacoxu hello from 1.21 release notes team! The release notes annotated in bold caught my attention:
Can you clarify that this requires users / operators to take action / warrants a spot in "Urgent upgrade notes"? If so, please prepend the release note with Thanks! |
This definitely warrants an |
Thanks @andrewsykim! I have marked this to be in |
@wilsonehusin thanks. Am I right? |
yup that works, thanks @pacoxu |
What type of PR is this?
/kind bug
/kind cleanup
/sig network
/area kubelet
What this PR does / why we need it:
According to KEP from https://github.com/kubernetes/enhancements/blob/54b409decd8d2e7f8a631fb845db58c810b4254c/keps/sig-architecture/2019-07-16-node-role-label-use.md
Master link:
https://github.com/kubernetes/enhancements/tree/master/keps/sig-architecture/1143-node-role-labels
Which issue(s) this PR fixes:
Fixes #97542
Part of #94495
@thockin @smarterclayton @rikatz
Special notes for your reviewer:
During investigating the 97542 in my kubelet log, I read the KEP and #94495 comments. It needs to be done in 1.21.
The part related to #97542 is the function of node checking.
https://github.com/kubernetes/kubernetes/pull/97543/files#diff-62d886bf35c4945f56ff8cfd3d60e9f47a0deb8f6b3d09d89f48aacf3ba7b70eL972-L977
Does this PR introduce a user-facing change?:
Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.: