-
Notifications
You must be signed in to change notification settings - Fork 544
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update dev overlay to correctly set imagePullPolicy #195
Update dev overlay to correctly set imagePullPolicy #195
Conversation
Hi @ossareh. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Maintainers; please see this: #192 (comment) The gist that is linked clearly shows that the Where does this image come from? Why is it set as the development image when you use the dev overlay? I'm updating the PR to pull |
ea904b7
to
62d661f
Compare
Utilize the patchesStrategicMerge strategy to apply the image:tag update and set imagePullPolicy: Always
62d661f
to
f4c75ef
Compare
The old tag was a maintainer's personal dev image. The new (relatively) amazon/aws-efs-csi-driver:latest tag is pushed on every commit to master. Obligatory warning not to rely on dev overlay/latest tag. /lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: ossareh, wongma7 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/ok-to-test |
@wongma7, thanks for the test go ahead.
strong agree. As someone that currently relies on the latest tag in production, because there hasn't been a release in a while and we require EFS access points, I'd be interested in knowing whether there are ways that we (the community; including me :)) can help in making regular tagged releases occur. Perhaps here isn't the correct venue to discuss, just point me in the right direction :) |
@ossareh there's a bit of discussion here #152. I am aware the frequency of releases is a pain point (we have never made point releases and |
/test pull-aws-efs-csi-driver-e2e |
Isn't having
https://kubernetes.io/docs/concepts/containers/images/#updating-images |
@jqmichael; it should be as per my comment over here - but in dealing with #192 I found I was getting a completely different docker SHA until I updated the imagePullPolicy. When the problem in #192 hit us on Sunday the
Once I changed imagePullPolicy to "Always" the
With the newer SHA all of our issues went away. As I mention in the comment I linked above, I'm quite surprised by this fact. [edit]: just to be clear; my first thought when the problem happened was to fetch down the latest image. So I did the following things:
I figured the second step would definitely fetch the image, but perhaps it doesn't? Perhaps in that case because the daemonset hasn't been updated it just restarts the existing image? So perhaps it was actually the DaemonSet being updated that changed this? |
I just ran a simple test with the What I tested specifically:
|
@jqmichael Thanks for this. This works as I think it should, and as the docs point out. I clearly misdiagnosed the issue when it bit me! I'm going to wait until the conversation in #207 settles and a path is established then I'm happy to contribute changes to the helm chart to revert the pullPolicy change I made + implement whatever else is identified as helpful/necessary |
Is this a bug fix or adding new feature?
bug fix, see #192, related to #193
What is this PR about? / Why do we need it?
what is this about?
As per #193 this implements the same change w.r.t setting imagePullPolicy for the dev overlay.
why do we need it?
Kubernetes defaulting to an imagePullPolicy is sane, but for users expecting
:latest
to deliver the actual:latest
container it can be confusing. For users installingdevelopment
they'll now get the correct image and have an updatedimagePullPolicy
.What testing is done?
There are a handful of ways this can be run:
kustomize build deploy/kubernetes/overlay/dev | kubectl apply -f
kubectl kustomize deploy/kubernetes/overlay/dev | kubectl apply -f
(variant of 1)kubectl apply -k deploy/kubernetes/overlay/dev
I have tested that all three produce the same output without actually applying them to my cluster; as per #193 I use helm. I'm doing this to help out the situation reported in #192 in which @nmtulloch27 has been very helpful in testing and reporting errors.