-
Notifications
You must be signed in to change notification settings - Fork 41.1k
Rejigger API Priority and Fairness config #130459
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Rejigger API Priority and Fairness config #130459
Conversation
ac581b7
to
7cf232e
Compare
7cf232e
to
7160d8e
Compare
/cc @wojtek-t |
This PR may require API review. If so, when the changes are ready, complete the pre-review checklist and request an API review. Status of requested reviews is tracked in the API Review project. |
6605f14
to
26ac0eb
Compare
I have a problem with the new integration test. The pull-kubernetes-verify job complained about the way that the integration test flaps the Feature, saying
But https://github.com/kubernetes/component-base/blob/v0.32.3/featuregate/testing/feature_gate.go#L40 says that it cannot flap one Feature. So I am looking for a clue about whether there is a way to make an integration test like this, or I have to give up and make an E2E test instead, or a test of less-than-full servers. |
Erm, well, maybe that comment about not setting the same Feature twice in one test is just too cautious? I looked at the body of that func, and do not see a failure. I tested, and also did not get a failure. I have added a commit that switches to using that func. |
return | ||
} | ||
tCtx.Cancel("test function done") | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
can we do something like below and use the framework.StartTestServer with defaults
func TestConfigFlap(t *testing.T) {
t.Run("first", func(t *testing.T){
featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, genericfeatures.APFv134Config, false)
...
})
t.Run("second", func(t *testing.T){
featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, genericfeatures.APFv134Config, true)
...
})
t.Run("third", func(t *testing.T){
featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, genericfeatures.APFv134Config, false)
...
})
}
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Oh, of course. Done.
359f271
to
9c1a33a
Compare
Because some testing shows leader election being starved. Signed-off-by: Mike Spreitzer <mspreitz@us.ibm.com>
.. so that it takes no larger bite from system capacity than before (modulo small difference due to total nominal shares).
9c1a33a
to
a80c450
Compare
The force push to a80c450 is a rebase onto |
Make APFv134Config Alpha at 1.33
.. and use it multiple times on the same Feature in the same test. The comment on this func says it will fail in that case, but it appears to actually succeed. Examining the body of the func, I do not see why it should fail.
a80c450
to
e3e70fc
Compare
And the force-push to e3e70fc fixes a botch in that rebase. |
e3e70fc
to
5444b71
Compare
And the force-push to 5444b71 fixes a botch in the new |
.. instead of feature values.
5444b71
to
58b961e
Compare
The force-push to 58b961e changes a variable name to not trigger a sloppy linter ( |
PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
The Kubernetes project currently lacks enough active contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
What type of PR is this?
/kind cleanup
/kind bug
What this PR does / why we need it:
This PR tweaks the default configuration objects for API Priority and Fairness. There are two changes.
This PR subsumes #129646 .
Also, as suggested in #129646 (comment) , this PR introduces a FeatureGate that allows administrators to opt out of this set of configuration changes. The FeatureGate is named "APFNewConifg".
Which issue(s) this PR fixes:
Fixes #121982
Special notes for your reviewer:
Does this PR introduce a user-facing change?
Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.: