-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
native support for ArgoRollout CRD to improve efficiency #7517
base: master
Are you sure you want to change the base?
native support for ArgoRollout CRD to improve efficiency #7517
Conversation
Hi @ZihanJiang96. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: ZihanJiang96 The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/ok-to-test |
/test pull-kubernetes-e2e-autoscaling-vpa-full |
I think a change like this needs to be handled with a little more grace. For example, when running in a cluster without ArgoRollouts setup, the following errors are created:
(well, I guess technically this is a permission issue). Is there a way to add a feature like this in a more general manner? I'm a bit worried that this change sets a precedent that more CRs will need to be added, putting more strain the very few maintainers of this project |
@ZihanJiang96: The following test failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
We've encountered this a few times now. Thanks for bringing this up. We discussed a similar issue with @voelzmo in #6431. I think it would be great to resolve this more generically such that a native integration with each framework, object, etc.. is not necessary. I wonder if we can change the behavior of the cache (as suggested in #6431 (comment)) to be per Kind rather than per object. I believe if we can do this then we won't have the need for these custom integrations. |
I've been staring at this for a little while and have a few thoughts:
My proposal:
I'm thinking of prototyping this (or if anyone sees a better solution, please feel free to chime in) and seeing how many things I break. This should remove the need to have any custom integration with VPA as a single call to |
Your plan sounds good and I'm keen to see the prototype |
Hey @raywainman thanks for sharing your thoughts here! I think it would be great if we could make this whole thing more efficient!
Yes, absolutely. As pointed out earlier, I also think that we don't need to make the calls checking
Big thumbs up, I'd really like to see this! Regarding
What the code tries to do is to find the topmost owner of a Pod which is either well-known or implements the I've seen errors in the past [1, 2] where the |
PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
What type of PR is this?
/kind feature
What this PR does / why we need it:
We also use Argo Rollout heavily, recently we enabeld VPA in most of our clusters, and we observed the VPA controllers get throttled a lot due to the frequent
/scale
call.We made the same improvement internally in a forked repo, want to contribute this back.
Which issue(s) this PR fixes:
Fixes ##7024
Special notes for your reviewer:
Does this PR introduce a user-facing change?