-
Notifications
You must be signed in to change notification settings - Fork 98
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bug 1881905: Adds gatherer for PodDistributionBudget #185
Bug 1881905: Adds gatherer for PodDistributionBudget #185
Conversation
3285495
to
7c4b3a8
Compare
*policyv1beta1.PodDisruptionBudget | ||
} | ||
|
||
// Marshal implements serialization of a Pod with anonymization |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Copy/paste comment. It's just minor but is there anything we could possibly anonymize (some IDs, IP addressess and similar)?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah the comments are a mess but its WIP for a reason :D
About what to anonymize: No idea really, the ones that I saw had nothing in them that I would consider confidential. maybe the metadata.managedFields
can have some confidential info.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Here is the type definition for PDB. To me it doesn't look like there could be anything worth anonymizing. What do you think ?
https://github.com/kubernetes/kubernetes/blob/master/pkg/apis/policy/types.go
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
that was my impression as well
@0sewa0: This pull request references Bugzilla bug 1881905, which is invalid:
Comment In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/bugzilla refresh |
@0sewa0: This pull request references Bugzilla bug 1881905, which is valid. The bug has been moved to the POST state. The bug has been updated to refer to the pull request using the external bug tracker. 3 validation(s) were run on this bug
In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
currently some tests fail because: @iNecas @martinkunc @natiiix any thoughts ? |
Did this passed some local tests ? Basically you should get a cluster (quicklab) run IO and check data in /tmp folder. When you change file locally, you can try
To apply the change to see if it works. |
327f441
to
1677da2
Compare
/retest |
1 similar comment
/retest |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@0sewa0 There are quite a few commits. It's usual to squash them to reduce the number of commits in the upstream branches. 1-3 is usually okay, but 6 seems like too many for a single enhancement.
@natiiix Can't github do it ?? Gitlab made it all easy :( |
@0sewa0 GitHub can do it, but the merge bot does as the name suggests, creates a merge commit, not a squash. Sometimes it's absolutely necessary for cherry-picking because you don't want to backport documentation or configuration changes in some scenarios. |
1677da2
to
fbba8ec
Compare
/retest |
1 similar comment
/retest |
Nice, thank you @0sewa0 ! |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: 0sewa0, martinkunc The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/retest |
3 similar comments
/retest |
/retest |
/retest |
/retest Please review the full test history for this PR and help us cut down flakes. |
4 similar comments
/retest Please review the full test history for this PR and help us cut down flakes. |
/retest Please review the full test history for this PR and help us cut down flakes. |
/retest Please review the full test history for this PR and help us cut down flakes. |
/retest Please review the full test history for this PR and help us cut down flakes. |
@0sewa0: All pull requests linked via external trackers have merged: Bugzilla bug 1881905 has been moved to the MODIFIED state. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Pod disruption budgets are important enough to be included in Insights tarballs [1], and they aren't all that big, so we should pick them up as a standard part of interesting namespaces too. This will help with things like auditing issues where we failed to drain (PDB too strict) or disrupted a core workload (PDB too weak or missing). [1]: openshift/insights-operator#185
Pod disruption budgets are important enough to be included in Insights tarballs [1], and they aren't all that big, so we should pick them up as a standard part of interesting namespaces too. This will help with things like auditing issues where we failed to drain (PDB too strict) or disrupted a core workload (PDB too weak or missing). Similar to openshift/oc@c32fac0143 (pkg/cli/admin/inspect/namespace: Gather PDBs too, 2021-03-03, openshift/oc#750). [1]: openshift/insights-operator#185
No description provided.