Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ignore 'resource being used by' error #1008

Merged
merged 1 commit into from
Jan 31, 2020
Merged

Conversation

skmatti
Copy link
Contributor

@skmatti skmatti commented Jan 28, 2020

This does the following,

  1. Removes the code block that is never reached, because the case is handled in upstream.
  2. Ignore 'resource being used by' error on healthcheck deletion because the associated backend service still uses it.

@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Jan 28, 2020
@k8s-ci-robot
Copy link
Contributor

Hi @skmatti. Thanks for your PR.

I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot k8s-ci-robot added the size/S Denotes a PR that changes 10-29 lines, ignoring generated files. label Jan 28, 2020
@rramkumar1
Copy link
Contributor

  1. Removes the code block that is never reached, because the case is handled in upstream.

@skmatti Can you point to where its handled upstream?

  1. Ignore 'resource being used by' error on healthcheck deletion because the associated backend service still uses it.

Can you explain why we would get this error in the first place? Are we sharing health checks across many backend services? I thought that was not the case.

@skmatti
Copy link
Contributor Author

skmatti commented Jan 29, 2020

  1. Removes the code block that is never reached, because the case is handled in upstream.

@skmatti Can you point to where its handled upstream?

err = composite.DeleteBackendService(b.cloud, key, version)
if err != nil {
if utils.IsHTTPErrorCode(err, http.StatusNotFound) || utils.IsInUsedByError(err) {
klog.Infof("DeleteBackendService(_, %v, %v) = %v; ignorable error", key, version, err)
return nil
}

  1. Ignore 'resource being used by' error on healthcheck deletion because the associated backend service still uses it.

Can you explain why we would get this error in the first place? Are we sharing health checks across many backend services? I thought that was not the case.

We are running into this because backend resource deletion failure due to resource being used by is interpreted as no error. The backend resource is not deleted but we are trying to delete health check associated with it. So, we get 'resource being used it' error.
No, health checks are not being shared. But, the single backend resource referencing this health check is not deleted.

@rramkumar1
Copy link
Contributor

/ok-to-test

The removal of the unneeded error checking looks good to me. I would like @spencerhance to take a look at the other change since it involves L7 ILB.

@k8s-ci-robot k8s-ci-robot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Jan 30, 2020
Copy link
Contributor

@spencerhance spencerhance left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm, thanks @skmatti

@rramkumar1
Copy link
Contributor

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Jan 31, 2020
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: rramkumar1, skmatti

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jan 31, 2020
@k8s-ci-robot k8s-ci-robot merged commit e23dcdc into kubernetes:master Jan 31, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. ok-to-test Indicates a non-member PR verified by an org member that is safe to test. size/S Denotes a PR that changes 10-29 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants